2010
DOI: 10.1007/978-3-642-16161-2_27
|View full text |Cite
|
Sign up to set email alerts
|

The Hitchhiker’s Guide to DNS Cache Poisoning

Abstract: Abstract. DNS cache poisoning is a serious threat to today's Internet. We develop a formal model of the semantics of DNS caches, including the bailiwick rule and trust-level logic, and use it to systematically investigate different types of cache poisoning and to generate templates for attack payloads. We explain the impact of the attacks on DNS resolvers such as BIND, MaraDNS, and Unbound and their implications for several defenses against DNS cache poisoning.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
36
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 69 publications
(37 citation statements)
references
References 11 publications
(19 reference statements)
1
36
0
Order By: Relevance
“…3) Security Threats and Countermeasures: DNS attacks commonly arise from cache poisoning [128] that mainly affects nodes employing DNS bootstrapping [17] to retrieve online peers but also users of online blockchain explorers. 3 One countermeasure is a security extension of DNS, called DNSSEC, which provides authentication and data integrity.…”
Section: B Public Network / the Internetmentioning
confidence: 99%
“…3) Security Threats and Countermeasures: DNS attacks commonly arise from cache poisoning [128] that mainly affects nodes employing DNS bootstrapping [17] to retrieve online peers but also users of online blockchain explorers. 3 One countermeasure is a security extension of DNS, called DNSSEC, which provides authentication and data integrity.…”
Section: B Public Network / the Internetmentioning
confidence: 99%
“…Typical man-in-the-middle attacks on HTTPS rely on DNS rebinding [22,44] or cache poisoning [45,46] and on fooling the client into accepting a bogus, mis-issued, or compelled certificate [47,48]. The goal is for a network attacker to impersonate a trusted HTTPS server [49].…”
Section: Related Workmentioning
confidence: 99%
“…An attacker may poison the cache by compromising an authoritative DNS server or by forging a response to a recursive DNS query sent by a resolver to an authoritative server. The implementation of this attack is given in [17]. Wiener [19] proposed that information encoded in the public exponent "e" might help to factor "n".…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%