DepenDNS: Dependable Mechanism against DNS Cache Poisoning

  • Authors:
  • Hung-Min Sun;Wen-Hsuan Chang;Shih-Ying Chang;Yue-Hsun Lin

  • Affiliations:
  • Information Security Laboratory, Department of Computer Science, National Tsing Hua University, Taiwan R.O.C;Information Security Laboratory, Department of Computer Science, National Tsing Hua University, Taiwan R.O.C;Information Security Laboratory, Department of Computer Science, National Tsing Hua University, Taiwan R.O.C;Information Security Laboratory, Department of Computer Science, National Tsing Hua University, Taiwan R.O.C

  • Venue:
  • CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

DNS cache poisoning attacks have been proposed for a long time. In 2008, Kaminsky enhanced the attacks to be powerful based on nonce query method. By leveraging Kaminsky's attack, phishing becomes large-scale since victims are hard to detect attacks. Hence, DNS cache poisoning is a serious threat in the current DNS infrastructure. In this paper, we propose a countermeasure, DepenDNS, to prevent from cache poisoning attacks. DepenDNS queries multiple resolvers concurrently to verify an trustworthy answer while users perform payment transactions, e.g., auction, banking. Without modifying any resolver or authority server, DepenDNS is conveniently deployed on client side. In the end of paper, we conduct several experiments on DepenDNS to show its efficiency. We believe DepenDNS is a comprehensive solution against cache poisoning attacks.