首页> 外文学位 >Model checking the Kaminsky DNS cache-poisoning attack using PRISM.
【24h】

Model checking the Kaminsky DNS cache-poisoning attack using PRISM.

机译:使用PRISM模型检查Kaminsky DNS缓存中毒攻击。

获取原文
获取原文并翻译 | 示例

摘要

We use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an Internet-wide, hierarchical naming system used to translate domain names like google.com into physical IP addresses such as 208.77.188.166. The Kaminsky DNS attack is a recently discovered vulnerability in DNS that allows an intruder to hijack a domain; i.e. corrupt a DNS server so that it replies with the IP address of a malicious web server when asked to resolve the URL of a non-malicious domain such as google.com . A proposed fix for the attack is based on the idea of randomizing the source port a DNS server uses when issuing a query to another server in the DNS hierarchy.;We use PRISM to introduce a Continuous Time Markov Chain representation of the Kaminsky attack and the proposed fix, and to perform the requisite probabilistic model checking. Our results, gleaned from more than 240 PRISM runs, formally validate the existence of the Kaminsky cache-poisoning attack even in the presence of an intruder with virtually no knowledge of the victim DNS server's actions. They also serve to quantify the effectiveness of the proposed fix, demonstrating an exponentially decreasing, long-tail trajectory for the probability of a successful attack with an increasing range of source-port ids, as well as an increasing attack probability with an increasing number of attempted attacks or increasing rate at which the intruder guesses the source-port id. iii
机译:我们使用概率模型检查器PRISM来正式建模和分析高度宣传的Kaminsky DNS缓存中毒攻击。 DNS(域名系统)是整个Internet范围内的分层命名系统,用于将域名(如google.com)转换为物理IP地址(如208.77.188.166)。 Kaminsky DNS攻击是DNS中最近发现的一个漏洞,它使入侵者可以劫持域。即损坏DNS服务器,使其在被要求解析非恶意域(例如google.com)的URL时回复恶意Web服务器的IP地址。针对该攻击的建议修复方法基于以下想法:将DNS服务器向DNS层次结构中的另一台服务器发出查询时使用的源端口随机化。我们使用PRISM引入了Kaminsky攻击和建议的修复程序,并执行必要的概率模型检查。我们从240多个PRISM运行中收集的结果正式验证了Kaminsky缓存中毒攻击的存在,即使在入侵者的存在下,实际上也不知道受害者DNS服务器的行为。它们还可以量化提议的修复程序的有效性,证明随着源端口ID范围的增加,成功攻击的概率呈指数递减的长尾轨迹,并且随着攻击数量的增加,攻击概率也呈递增趋势尝试的攻击或入侵者猜测源端口ID的速率增加。 iii

著录项

  • 作者

    Deshpande, Tushar Suhas.;

  • 作者单位

    State University of New York at Stony Brook.;

  • 授予单位 State University of New York at Stony Brook.;
  • 学科 Computer Science.
  • 学位 M.S.
  • 年度 2010
  • 页码 31 p.
  • 总页数 31
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号