Kalman Filter Based DNS Cache Poisoning Attack Detection

被引:0
|
作者
Wu, Hao [1 ]
Dang, Xianglei [1 ]
Zhang, Liang [1 ]
Wang, Lidong [1 ]
机构
[1] CNCERT CC, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detection for Domain Name Systems cache poisoning attack is investigated. We exploit the fact that when attack is happening, the entropies of the query packet IP addresses of the cache server will have a decrease, to detect the cache poisoning attack. We pay attention to the detection method for the case that the entropy sequence has nonstationary dynamic at normal cases. In order to handle the nonstationarity, we first model the entropy sequence by a state space equation, and then we utilize Kalman filter to implement the attack detection. The problem is discussed for single and distributed cache poisoning attack, respectively. For the single one, we use the measurement errors to detect the anomaly. Under distributed attack, we utilize the correlation variation of the prediction errors to detect the attack event and identify the attacked cache servers. An experiment is illustrated to verify the effectiveness of our presented method.
引用
收藏
页码:1594 / 1600
页数:7
相关论文
共 50 条
  • [1] DNS Cache Poisoning Attack: Resurrections with Side Channels
    Man, Keyu
    Zhou, Xin'an
    Qian, Zhiyun
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3400 - 3414
  • [2] Adaptive caching approach to prevent DNS cache poisoning attack
    Li, Zhitang (leeying@mail.hust.edu.cn), 1600, Oxford University Press (58):
  • [3] Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack
    Hmood, Haider Salim
    Li, Zhitang
    Abdulwahid, Hasan Khalaf
    Zhang, Yang
    COMPUTER JOURNAL, 2015, 58 (04): : 973 - 985
  • [4] Collaborative Client-Side DNS Cache Poisoning Attack
    Alharbi, Fatemah
    Chang, Jie
    Zhou, Yuchen
    Qian, Feng
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 1153 - 1161
  • [5] DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
    Man, Keyu
    Qian, Zhiyun
    Wang, Zhongjie
    Zheng, Xiaofeng
    Huang, Youjun
    Duan, Haixin
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1337 - 1350
  • [6] FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack
    Hasegawa, Keita
    Kondo, Daishi
    Tode, Hideki
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 628 - 632
  • [7] Cache poisoning detection method for improving security of recursive DNS
    Ju, Yong Wan
    Song, Kwan Ho
    Lee, Eung Jae
    Shin, Yong Tae
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1961 - 1965
  • [8] A novel Kalman Filter based shilling attack detection algorithm
    Liu, Xin
    Xiao, Yingyuan
    Jiao, Xu
    Zheng, Wenguang
    Ling, Zihao
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (02) : 1558 - 1577
  • [9] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [10] Adaptive Deterrence of DNS Cache Poisoning
    Chau, Sze Yiu
    Chowdhury, Omar
    Gonsalves, Victor
    Ge, Huangyi
    Yang, Weining
    Fahmy, Sonia
    Li, Ninghui
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 171 - 191