Improving Robustness of DNS to Software Vulnerabilities

被引:0
|
作者
Khurshid, Ahmed [1 ]
Kiyak, Firat [1 ]
Caesar, Matthew [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ability to forward packets on the Internet is highly intertwined with the availability and robustness of the Domain Name System (DNS) infrastructure. Unfortunately, the DNS suffers from a wide variety of problems arising from implementation errors, including vulnerabilities, bogus queries, and proneness to attack. In this work, we present a preliminary design and early prototype implemtentation of a system that leverages diversified replication to increase tolerance of DNS to implementation errors. Our design leverages software diversity by running multiple redundant copies of software in parallel, and leverages data diversity by sending redundant requests to multiple servers. Using traces of DNS queries, we demonstrate our design can keep up with the loads of a large university's DNS traffic, while improving resilience of DNS.
引用
收藏
页码:177 / 186
页数:10
相关论文
共 50 条
  • [41] Software Security Vulnerabilities: Baselining and Benchmarking
    Rotella, Pete
    2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 3 - 10
  • [42] Code Change History and Software Vulnerabilities
    Pianco, Marcus
    Fonseca, Baldoino
    Antunes, Nuno
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 6 - 9
  • [43] Mining trends and patterns of software vulnerabilities
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Bener, Ayse Basar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 : 218 - 228
  • [44] Ethics of the software vulnerabilities and exploits market
    Wolf, Marty J.
    Fresco, Nir
    INFORMATION SOCIETY, 2016, 32 (04): : 269 - 279
  • [45] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [46] Understanding vulnerabilities in software supply chains
    Shen, Yijun
    Gao, Xiang
    Sun, Hailong
    Guo, Yu
    Empirical Software Engineering, 2025, 1 (1)
  • [47] Towards a Structured Model for Software Vulnerabilities
    Huang, Ming
    Lu, Yisha
    Zeng, Qingkai
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 543 - 547
  • [48] Improving the Robustness of JPEG Steganography With Robustness Cost
    Zhang, Jimin
    Zhao, Xianfeng
    He, Xiaolei
    Zhang, Hong
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 164 - 168
  • [49] Research on the Exploitability of Binary Software Vulnerabilities
    Tang, Xiang
    Zhou, Houlin
    Zhang, Man
    Zhang, Yuheng
    Wu, Guocheng
    Lu, Hui
    Yu, Xiang
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 403 - 407
  • [50] Market for software vulnerabilities? Think again
    Kannan, K
    Telang, R
    MANAGEMENT SCIENCE, 2005, 51 (05) : 726 - 740