Defense against DNS Man-In-The-Middle Spoofing

被引:0
|
作者
Bai, Xiaolong [1 ]
Hu, Liang [1 ]
Song, Zixing [1 ]
Chen, Feiyan [1 ]
Zhao, Kuo [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
来源
关键词
DNS MITM; ANN;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Domain Name Server (DNS) is a key part of the Internet infrastructure. But DNS protocol is so simple that DNS interaction is quite vulnerable to a kind of man-in-the-middle spoofing attack. This paper introduces one type of defense technique based on the main features of DNS response packets. The technique employs Artificial Neural Networks (ANN), which produces excellent performance.
引用
收藏
页码:312 / 319
页数:8
相关论文
共 50 条
  • [1] Improved Defense Against Domain Name Server Man-in-the-Middle Spoofing
    Zhao, Kuo
    Bai, Xiaolong
    Wang, Feng
    Sun, Yuyu
    Hu, Liang
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2012, 9 (10) : 1750 - 1756
  • [2] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack
    Li, Xiaohong
    Li, Shuxin
    Hao, Jianye
    Feng, Zhiyong
    An, Bo
    THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
  • [3] Defense against man-in-the-middle attack in client-server systems
    Serpanos, DN
    Lipton, RJ
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 9 - 14
  • [4] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
    Hao, Guo
    Tao, Guo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
  • [5] DNS-Based Defense against IP Spoofing Attacks
    Moriyama, Eimatsu
    Takahashi, Takeshi
    Miyamoto, Daisuke
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT V, 2012, 7667 : 599 - 609
  • [6] Defense against man-in-the-middle attack in client-server systems with secure servers
    Serpanos, DN
    Lipton, RJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2966 - 2970
  • [7] Revisiting man-in-the-middle attacks against HTTPS
    Kampourakis V.
    Kambourakis G.
    Chatzoglou E.
    Zaroliagis C.
    Network Security, 2022, 2022 (03)
  • [8] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [9] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [10] Defending Against Man-In-The-Middle Attack in Repeated Games
    Li, Shuxin
    Li, Xiaohong
    Hao, Jianye
    An, Bo
    Feng, Zhiyong
    Chen, Kangjie
    Zhang, Chengwei
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748