首页> 外文会议>IEEE 12th International Symposium on High-Assurance Systems Engineering >Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking
【24h】

Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking

机译:使用概率模型检查对Kaminsky DNS缓存中毒攻击进行形式化分析

获取原文

摘要

We use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an internet-wide, hierarchical naming system used to translate domain names such as google.com into physical IP addresses such as 208.77.188.166. The Kaminsky DNS attack is a recently discovered vulnerability in DNS that allows an intruder to hijack a domain, i.e. corrupt a DNS server so that it replies with the IP address of a malicious web server when asked to resolve URLs within a non-malicious domain such as google.com. A proposed fix for the attack is based on the idea of randomizing the source port a DNS server uses when issuing a query to another server in the DNS hierarchy. We use PRISM to introduce a Continuous Time Markov Chain representation of the Kaminsky attack and the proposed fix, and to perform the required probabilistic model checking. Our results, gleaned from more than 240 PRISM runs, formally validate the existence of the Kaminsky cache-poisoning attack even in the presence of an intruder with virtually no knowledge of the victim DNS server's actions. They also serve to quantify the effectiveness of the proposed fix: using nonlinear least-squares curve fitting, we show that the probability of a successful attack obeys a 1/N distribution, where N is the upper limit on the range of source-port ids. We also demonstrate an increasing attack probability with an increasing number of attempted attacks or increasing rate at which the intruder guesses the source-port id.
机译:我们使用概率模型检查器PRISM来正式建模和分析高度宣传的Kaminsky DNS缓存中毒攻击。 DNS(域名系统)是互联网范围内的分层命名系统,用于将域名(例如google.com)转换为物理IP地址(例如208.77.188.166)。 Kaminsky DNS攻击是DNS中最近发现的一个漏洞,它使入侵者可以劫持一个域,即破坏DNS服务器,以便当系统要求其解析非恶意域中的URL时,它会用恶意Web服务器的IP地址进行回复。作为google.com。提出的针对该攻击的修复方法基于以下思想:将DNS服务器向DNS层次结构中的另一台服务器发出查询时使用的源端口随机化。我们使用PRISM来介绍Kaminsky攻击的连续时间马尔可夫链表示法和建议的修复程序,并执行所需的概率模型检查。我们从240多个PRISM运行中收集的结果正式验证了Kaminsky缓存中毒攻击的存在,即使在入侵者的存在下,实际上也不了解受害者DNS服务器的行为。它们还可以用来量化所提出的修正的有效性:使用非线性最小二乘曲线拟合,我们表明成功攻击的概率服从1 / N分布,其中N是源端口ID范围的上限。我们还证明,随着尝试攻击次数的增加或入侵者猜测源端口ID的速率的增加,攻击概率也随之增加。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号