DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

被引:0
|
作者
Yuan, Lihua [1 ]
Kant, Krishna [2 ]
Mohapatra, Prasant
Chuah, Chen-Nee [1 ,3 ]
机构
[1] Univ Calif Davis, ECE, Davis, CA 95616 USA
[2] Intel Corp, Hillsboro, OR USA
[3] ECE, Davis, CA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
(1)The mapping service provided by the Domain Name System (DNS) is fundamental not only to the health of the Internet but also to the protection and integrity of the data. Recently, the DNS infrastructure has suffered several malicious attacks including DNS cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold for more insidious attacks. This paper proposes DoX, a peer-to-peer based scheme, to detect and correct inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache consistency by detecting and removing obsolete records. DoX does not require modifications to the current infrastructure and can be deployed quickly. It does not use cryptographic techniques and thus does not suffer from the key management and processing overhead issues of those techniques.
引用
收藏
页码:2345 / 2350
页数:6
相关论文
共 50 条
  • [1] Hybrid Peer-to-Peer DNS
    Sancho, Ricardo
    Pereira, Ricardo Lopes
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 977 - 981
  • [2] Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
    Chen, Ruichuan
    Lua, Eng Keong
    Crowcroft, Jon
    Guo, Wenjia
    Tang, Liyong
    Chen, Zhong
    P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 22 - +
  • [3] A peer-to-peer approach for cache sibling
    Ernst-Desmulier, JB
    Charlet, D
    Chatonnay, P
    Spies, F
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 323 - 330
  • [4] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [5] A Traffic Cache for Structure Peer-to-Peer Networks
    Lin Kuisheng
    Zhou Ya
    Huang Guimin
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 844 - +
  • [6] On Peer-to-Peer client web cache sharing
    Liu, JC
    Chu, XW
    Xu, K
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 306 - 310
  • [7] Serving DNS using a peer-to-peer lookup service
    Cox, R
    Muthitacharoen, A
    Morris, RT
    PEER-TO-PEER SYSTEMS, 2002, 2429 : 155 - 165
  • [8] On Combating Content Poisoning in Peer-to-Peer Networks
    Hawa, Mohammed
    Al-Zubi, Raed
    Darabkh, Khalid A.
    Al-Sukkar, Ghazi
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1276 - +
  • [9] Mitigating Eclipse Attacks in Peer-to-Peer Networks
    Germanus, Daniel
    Roos, Stefanie
    Strufe, Thorsten
    Suri, Neeraj
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 400 - 408
  • [10] Mitigating Peer-to-Peer Botnets by Sybil attacks
    Zhou Hangxia
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243