Improved Defense Against Domain Name Server Man-in-the-Middle Spoofing

被引:0
|
作者
Zhao, Kuo [1 ]
Bai, Xiaolong [1 ]
Wang, Feng [1 ]
Sun, Yuyu [1 ,2 ]
Hu, Liang [1 ]
机构
[1] Jilin Univ, Dept Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
DNS; Man-in-the-Middle; Spoofing Attack; Defence; Naive Bayes Classifier;
D O I
10.1166/jctn.2012.2276
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Domain Name System, or DNS, is an important facility in the Internet. But for some reasons, DNS interaction is quite vulnerable to a kind of man-in-the-middle (MITM) spoofing attack. This paper illustrates the MITM spoofing attack and proposes a type of defense technique employing Naive Bayes (NB) Classifier. Considering three types of individual factors, then illustrates, analyzes and evaluates their performances. The 3-factor NB technique achieves the best performance with an average identifying ratio of 99.7875%. What's more, we provide a proposal on taking balance of precision and time consumption accordingly. In all, the presented NB technique is quite helpful in defense against DNS MITM spoofing attack.
引用
收藏
页码:1750 / 1756
页数:7
相关论文
共 50 条
  • [1] Defense against DNS Man-In-The-Middle Spoofing
    Bai, Xiaolong
    Hu, Liang
    Song, Zixing
    Chen, Feiyan
    Zhao, Kuo
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 312 - 319
  • [2] Defense against man-in-the-middle attack in client-server systems
    Serpanos, DN
    Lipton, RJ
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 9 - 14
  • [3] Defense against man-in-the-middle attack in client-server systems with secure servers
    Serpanos, DN
    Lipton, RJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2966 - 2970
  • [4] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack
    Li, Xiaohong
    Li, Shuxin
    Hao, Jianye
    Feng, Zhiyong
    An, Bo
    THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
  • [5] Towards Securing Client-Server Connections against Man-in-the-Middle Attacks
    Ordean, Mihai
    Giurgiu, Mircea
    2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 127 - 130
  • [6] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
    Hao, Guo
    Tao, Guo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
  • [7] Revisiting man-in-the-middle attacks against HTTPS
    Kampourakis V.
    Kambourakis G.
    Chatzoglou E.
    Zaroliagis C.
    Network Security, 2022, 2022 (03)
  • [8] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [9] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [10] Defending Against Man-In-The-Middle Attack in Repeated Games
    Li, Shuxin
    Li, Xiaohong
    Hao, Jianye
    An, Bo
    Feng, Zhiyong
    Chen, Kangjie
    Zhang, Chengwei
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748