Defense against DNS Man-In-The-Middle Spoofing

被引:0
|
作者
Bai, Xiaolong [1 ]
Hu, Liang [1 ]
Song, Zixing [1 ]
Chen, Feiyan [1 ]
Zhao, Kuo [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
来源
关键词
DNS MITM; ANN;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Domain Name Server (DNS) is a key part of the Internet infrastructure. But DNS protocol is so simple that DNS interaction is quite vulnerable to a kind of man-in-the-middle spoofing attack. This paper introduces one type of defense technique based on the main features of DNS response packets. The technique employs Artificial Neural Networks (ANN), which produces excellent performance.
引用
收藏
页码:312 / 319
页数:8
相关论文
共 50 条
  • [21] IoT and Man-in-the-Middle Attacks
    Fereidouni, Hamidreza
    Fadeitcheva, Olga
    Zalai, Mehdi
    Security and Privacy, 2025, 8 (02)
  • [22] AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2018, 13 (01) : 59 - 80
  • [23] Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
    Svozil, K
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2005, 3 (04) : 649 - 654
  • [24] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    Journal of Cryptology, 2002, 15 : 139 - 148
  • [25] DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks
    Alicherry, Mansoor
    Keromytis, Angelos D.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 556 - 562
  • [26] Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks
    Reece, Morgan
    Lander, Theodore
    Mittal, Sudip
    Rastogi, Nidhi
    Dykstra, Josiah
    Sampson, Andy
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 47 - 52
  • [27] A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack
    Salim, Haider
    Li, Zhitang
    IT PROFESSIONAL, 2021, 23 (01) : 72 - 85
  • [28] MPTCP robustness against large-scale man-in-the-middle attacks
    Phung, Chi-Dung
    Silva, Benevid Felix
    Nogueira, Michele
    Secci, Stefano
    COMPUTER NETWORKS, 2019, 164
  • [29] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [30] Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing
    Haataja, Keijo
    Toivanen, Pekka
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4821 - 4825