Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses

被引:1
|
作者
Nosyk, Yevheniya [1 ]
Hureau, Olivier [1 ]
Fernandez, Simon [1 ]
Duda, Andrzej [1 ]
Korczynski, Maciej [1 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, CNRS, LIG, Grenoble, France
关键词
D O I
10.1109/EuroSPW59978.2023.00067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decades, DNS has gradually risen into one of the most important systems on the Internet. Malicious actors have long misused it in reflection and amplification DDoS attacks, but given its criticality, DNS quickly became an attractive attack target itself. There appeared a number of activities that make use of domain names and the DNS protocol to perform illegal actions, collectively referred to as DNS abuse. In this paper, we measure the landscape of DNS infrastructure vulnerabilities across millions of recursive resolvers and authoritative nameservers. We enumerate domain names deploying cache poisoning protection (DNSSEC), email authentication (SPF/DMARC), and resolvers accepting DNS requests from arbitrary clients. We show that DNS infrastructure is not sufficiently protected against cybersecurity threats and propose a set of recommendations to mitigate the existing problems. Conducted in the frame of a European Commission project, our findings will be considered for inclusion in the upcoming European Union legislation on cybersecurity.
引用
收藏
页码:546 / 557
页数:12
相关论文
共 12 条
  • [1] Weak Systems Unveiling the Vulnerabilities of Digitization
    Bory, Paolo
    Di Salvo, Philip
    TECNOSCIENZA-ITALIAN JOURNAL OF SCIENCE & TECHNOLOGY STUDIES, 2021, 12 (02): : 79 - 87
  • [2] Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking
    Mo, Dikai
    Zhu, Yujia
    Jie, Zhen
    Sun, Yong
    Liu, Qingyun
    Fang, Binxing
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6024 - 6029
  • [3] Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments
    Klement, Felix
    Brighente, Alessandro
    Polese, Michele
    Conti, Mauro
    Katzenbeisser, Stefan
    2024 IEEE 10TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT 2024, 2024, : 185 - 189
  • [4] Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software
    Rajendran, Sree Ranjani
    Dipu, Nusrat Farzana
    Tarek, Shams
    Kamali, Hadi Mardani
    Farahmandi, Farimah
    Tehranipoor, Mark
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3914 - 3926
  • [5] TUDOOR Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
    Li, Xiang
    Xu, Wei
    Liu, Baojun
    Zhang, Mingming
    Li, Zhou
    Zhang, Jia
    Chang, Deliang
    Zheng, Xiaofeng
    Wang, Chuhan
    Chen, Jianjun
    Duan, Haixin
    Li, Qi
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4459 - 4477
  • [6] Unveiling economic resilience: exploring the impact of financial vulnerabilities on economic volatility through the economic vulnerability index
    Oyadeyi, Olajide O.
    Ibukun, Cleopatra O.
    Arogundade, Sodiq
    Oyadeyi, Oluwadamilola A.
    Biyase, Mduduzi
    DISCOVER SUSTAINABILITY, 2024, 5 (01):
  • [7] Pipeline field joints: Exploring the coating technologies that protect against weak links
    Hughes, Adam Wyne
    Journal of Protective Coatings and Linings, 2014, 31 (11): : 43 - 51
  • [8] Exploring the intricacies of food disgust: Unveiling links between gender, healthy eating obsession, and disgust propensity
    Kocabas, Sule
    Sanlier, Nevin
    FOOD QUALITY AND PREFERENCE, 2024, 113
  • [9] Exploring pest mitigation research and management associated with the global wood packaging supply chain: What and where are the weak links?
    Leigh F. Greenwood
    David R. Coyle
    María E. Guerrero
    Gustavo Hernández
    Chris J. K. MacQuarrie
    Oscar Trejo
    Meghan K. Noseworthy
    Biological Invasions, 2023, 25 : 2395 - 2421
  • [10] Exploring strategies for managing maturity variations among project partners: from underperformance and controlling weak links to stretching capabilities
    Siebelink, Sander
    Voordijk, Hans J. T.
    Endedijk, Maaike D.
    Adriaanse, Arjen M.
    CONSTRUCTION MANAGEMENT AND ECONOMICS, 2025, 43 (04) : 243 - 261