skip to main content
10.1007/978-3-319-04918-2_21guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Assessing DNS Vulnerability to Record Injection

Published: 10 March 2014 Publication History

Abstract

The Domain Name System (DNS) is a critical component of the Internet infrastructure as it maps human-readable names to IP addresses. Injecting fraudulent mappings allows an attacker to divert users from intended destinations to those of an attacker's choosing. In this paper, we measure the Internet's vulnerability to DNS record injection attacks–including a new attack we uncover. We find that record injection vulnerabilities are fairly common–even years after some of them were first uncovered.

References

[1]
Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. RFC 4033 (2005)
[2]
Bernstein, D.: http://cr.yp.to/djbdns/notes.html
[3]
Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: PlanetLab: An Overlay Testbed for Broad-Coverage Services. ACM CCRä33(3) (2003)
[4]
Dagon, D., Antonakakis, M., Vixie, P., Jinmei, T., Lee, W.: Increased DNS Forgery Resistance Through 0x20-bit Encoding: Security via Leet Queries. ACM CCS (2008)
[5]
Dagon, D., Provos, N., Lee, C., Lee, W.: Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. In: NDSS (2008)
[6]
Fujiwara, K.: Number of Possible DNSSEC Validators Seen at jp. In: DNS-OARC Workshop (2012)
[7]
Google Public DNS. Performance Benefits, https://developers.google.com/speed/public-dns/docs/performance
[8]
Google Public DNS. Security Benefits, https://developers.google.com/speed/public-dns/docs/security
[9]
Gudmundsson, O., Crocker, S.: Observing DNSSEC Validation in the Wild. In: Workshop on Securing and Trusting Internet Names, SATIN (2011)
[10]
Kaminsky, D.: Black Ops 2008: It's the End of the Cache As We Know It. In: Black Hat USA (2008)
[11]
Leonard, D., Loguinov, D.: Demystifying Service Discovery: Implementing an Internet-Wide Scanner. In: ACM Internet Measurement Conference (2010)
[12]
Mockapetris, P.: Domain Names Implementation and Specification. RFC 1035 (1987)
[13]
Schomp, K., Callahan, T., Rabinovich, M., Allman, M.: Client-Side DNS Infrastructure Datasets, http://dns-scans.eecs.cwru.edu/
[14]
Schomp, K., Callahan, T., Rabinovich, M., Allman, M.: On Measuring the Client-Side DNS Infrastructure. In: ACM Internet Measurement Conference (2013)
[15]
Weaver, N., Kreibich, C., Nechaev, B., Paxson, V.: Implications of Netalyzr's DNS Measurements. In: Workshop on Securing and Trusting Internet Names (SATIN) (2011)
[16]
Weaver, N., Kreibich, C., Paxson, V.: Redirecting DNS for Ads and Profit. In: Workshop on Free and Open Comm. on the Internet (2011)
[17]
Zhang, C., Huang, C., Ross, K., Maltz, D., Li, J.: Inflight Modifications of Content: Who Are The Culprits? In: LEET (2011)

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
PAM 2014: Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362
March 2014
280 pages
ISBN:9783319049175

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 March 2014

Author Tags

  1. Cache Poisoning
  2. Domain Name System (DNS)
  3. Measurement
  4. Security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media