Kalman Filter Based DNS Cache Poisoning Attack Detection

被引:0
|
作者
Wu, Hao [1 ]
Dang, Xianglei [1 ]
Zhang, Liang [1 ]
Wang, Lidong [1 ]
机构
[1] CNCERT CC, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detection for Domain Name Systems cache poisoning attack is investigated. We exploit the fact that when attack is happening, the entropies of the query packet IP addresses of the cache server will have a decrease, to detect the cache poisoning attack. We pay attention to the detection method for the case that the entropy sequence has nonstationary dynamic at normal cases. In order to handle the nonstationarity, we first model the entropy sequence by a state space equation, and then we utilize Kalman filter to implement the attack detection. The problem is discussed for single and distributed cache poisoning attack, respectively. For the single one, we use the measurement errors to detect the anomaly. Under distributed attack, we utilize the correlation variation of the prediction errors to detect the attack event and identify the attacked cache servers. An experiment is illustrated to verify the effectiveness of our presented method.
引用
收藏
页码:1594 / 1600
页数:7
相关论文
共 50 条
  • [21] Dynamic load altering attack detection based on adaptive fading Kalman filter in smart grid
    Li J.
    Sun C.
    Yang S.
    Su Q.
    IET Generation, Transmission and Distribution, 2024, 18 (02): : 303 - 313
  • [22] Information fusion-based method for distributed domain name system cache poisoning attack detection and identification
    Wu, Hao
    Dang, Xianglei
    Wang, Lidong
    He, Longtao
    IET INFORMATION SECURITY, 2016, 10 (01) : 37 - 44
  • [23] A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques (Work in Progress)
    Jin, Yong
    Tomoishi, Masahiko
    Matsuura, Satoshi
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 225 - 227
  • [24] Network Attack Intelligent Prediction Technology Based on Kalman Filter
    He, Changyu
    Zhou, Ying
    Xu, Qiubo
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 129 - 132
  • [25] DNS Based Detection of SSH Dictionary Attack in Campus Network
    Romana, Dennis Arturo Ludena
    Musashi, Yasuo
    Takemori, Kazuya
    Kumagai, Masaya
    Kubota, Shinichiro
    Sugitani, Kenichi
    Usagawa, Tsuyoshi
    Sueyoshi, Toshinori
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2010, 13 (03): : 701 - 707
  • [26] An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks
    Wang, Zheng
    Yu, Shui
    Rose, Scott
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 793 - 807
  • [27] DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks
    Yuan, Lihua
    Kant, Krishna
    Mohapatra, Prasant
    Chuah, Chen-Nee
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2345 - 2350
  • [28] Detection and defence of DNS spoofing attack
    Yan, Boru
    Fang, Binxing
    Li, Bin
    Wang, Yao
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (21): : 130 - 132
  • [29] Dynamic load-altering attack detection based on adaptive fading Kalman filter in power systems
    Ma, Qiang
    Xu, Zheng
    Wang, Wenting
    Lin, Lin
    Ren, Tiancheng
    Yang, Shuxian
    Li, Jian
    GLOBAL ENERGY INTERCONNECTION-CHINA, 2021, 4 (02): : 184 - 192
  • [30] Dynamic load-altering attack detection based on adaptive fading Kalman filter in power systems
    Qiang Ma
    Zheng Xu
    Wenting Wang
    Lin Lin
    Tiancheng Ren
    Shuxian Yang
    Jian Li
    GlobalEnergyInterconnection, 2021, 4 (02) : 184 - 192