Improved Defense Against Domain Name Server Man-in-the-Middle Spoofing

被引:0
|
作者
Zhao, Kuo [1 ]
Bai, Xiaolong [1 ]
Wang, Feng [1 ]
Sun, Yuyu [1 ,2 ]
Hu, Liang [1 ]
机构
[1] Jilin Univ, Dept Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Changchun Univ, Coll Comp Sci & Technol, Changchun 130022, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
DNS; Man-in-the-Middle; Spoofing Attack; Defence; Naive Bayes Classifier;
D O I
10.1166/jctn.2012.2276
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Domain Name System, or DNS, is an important facility in the Internet. But for some reasons, DNS interaction is quite vulnerable to a kind of man-in-the-middle (MITM) spoofing attack. This paper illustrates the MITM spoofing attack and proposes a type of defense technique employing Naive Bayes (NB) Classifier. Considering three types of individual factors, then illustrates, analyzes and evaluates their performances. The 3-factor NB technique achieves the best performance with an average identifying ratio of 99.7875%. What's more, we provide a proposal on taking balance of precision and time consumption accordingly. In all, the presented NB technique is quite helpful in defense against DNS MITM spoofing attack.
引用
收藏
页码:1750 / 1756
页数:7
相关论文
共 50 条
  • [21] AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2018, 13 (01) : 59 - 80
  • [22] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    Journal of Cryptology, 2002, 15 : 139 - 148
  • [23] Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
    Svozil, K
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2005, 3 (04) : 649 - 654
  • [24] DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks
    Alicherry, Mansoor
    Keromytis, Angelos D.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 556 - 562
  • [25] Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks
    Reece, Morgan
    Lander, Theodore
    Mittal, Sudip
    Rastogi, Nidhi
    Dykstra, Josiah
    Sampson, Andy
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 47 - 52
  • [26] A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack
    Salim, Haider
    Li, Zhitang
    IT PROFESSIONAL, 2021, 23 (01) : 72 - 85
  • [27] MPTCP robustness against large-scale man-in-the-middle attacks
    Phung, Chi-Dung
    Silva, Benevid Felix
    Nogueira, Michele
    Secci, Stefano
    COMPUTER NETWORKS, 2019, 164
  • [28] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [29] Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing
    Haataja, Keijo
    Toivanen, Pekka
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4821 - 4825
  • [30] AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords
    Shen, Jaryn
    Yuen, Timothy T.
    Choo, Kim-Kwang Raymond
    Zeng, Qingkai
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 514 - 532