Applying secure authentication scheme to protect DNS from rebinding attack using proxy

P. Pandiaraja, S. Parasuraman
{"title":"Applying secure authentication scheme to protect DNS from rebinding attack using proxy","authors":"P. Pandiaraja, S. Parasuraman","doi":"10.1109/ICCPCT.2015.7159255","DOIUrl":null,"url":null,"abstract":"Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware required for the domain name system to function correctly. It allows users to access websites and exchange emails. It runs a strong mechanism to provide the IP address of the internet host name. An attacker can launch rebinding attack when the DNS server sends a query to any particular server on the network. Different types of techniques have been proposed to prevent this attack that all have some pros and also cones. A new technique is proposed in this paper by using security proxy with a hash function. Rebinding attack can be avoided by using this technique. It provides a secured environment for the DNS to communicate with other DNS. While the source DNS are receiving response from any DNS it will authenticate of all the receiving packets and then sends the data to the client. It gives a secure environment for DNS communication. For this purpose 2 different algorithms are used, namely SHA-2 and AES algorithms. First a random ID will be given to the query and then the query is sent to the DNS server.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2015.7159255","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware required for the domain name system to function correctly. It allows users to access websites and exchange emails. It runs a strong mechanism to provide the IP address of the internet host name. An attacker can launch rebinding attack when the DNS server sends a query to any particular server on the network. Different types of techniques have been proposed to prevent this attack that all have some pros and also cones. A new technique is proposed in this paper by using security proxy with a hash function. Rebinding attack can be avoided by using this technique. It provides a secured environment for the DNS to communicate with other DNS. While the source DNS are receiving response from any DNS it will authenticate of all the receiving packets and then sends the data to the client. It gives a secure environment for DNS communication. For this purpose 2 different algorithms are used, namely SHA-2 and AES algorithms. First a random ID will be given to the query and then the query is sent to the DNS server.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
采用安全认证方案,保护DNS不受代理重绑定攻击
互联网对当今世界的经济和社会都至关重要。域名系统(DNS)是互联网的关键组成部分,DNS隐藏了域名系统正常运行所需的所有技术基础设施、软件和硬件。它允许用户访问网站和交换电子邮件。它运行一个强大的机制来提供互联网主机名的IP地址。攻击者可以在DNS服务器向网络上任何特定服务器发送查询时发起重绑定攻击。已经提出了不同类型的技术来防止这种攻击,所有这些技术都有一些优点和缺点。本文提出了一种采用带哈希函数的安全代理的新技术。使用此技术可以避免重绑定攻击。为DNS之间的通信提供安全的环境。当源DNS接收来自任何DNS的响应时,它将验证所有接收数据包,然后将数据发送到客户端。它为DNS通信提供了一个安全的环境。为此,使用了两种不同的算法,即SHA-2和AES算法。首先,将给查询提供一个随机ID,然后将查询发送到DNS服务器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Named entity recognition approaches: A study applied to English and Hindi language Design of asynchronous NoC using 3-port asynchronous T-routers Large-scale steganalysis using outlier detection method for image sharing application Neural network based SOM for multispectral image segmentation in RGB and HSV color space Kernel weighted FCM based MR image segmentation for brain tumor detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1