Stopping DNS Rebinding Attacks in the Browser

被引:1
|
作者
Hazhirpasand, Mohammadreza [1 ]
Ebrahim, Arash Ale [1 ]
Nierstrasz, Oscar [1 ]
机构
[1] Univ Bern, Bern, Switzerland
基金
瑞士国家科学基金会;
关键词
DNS Rebinding; Browser Security; Web Security;
D O I
10.5220/0010310705960603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS rebinding attacks circumvent the same-origin policy of browsers and severely jeopardize user privacy. Although recent studies have shown that DNS rebinding attacks pose severe security threats to users, up to now little effort has been spent to assess the effectiveness of known solutions to prevent such attacks. We have carried out such a study to assess the protective measures proposed in prior studies. We found that none of the recommended techniques can entirely halt this attack due to various factors, e.g., network layer encryption renders packet inspection infeasible. Examining the previous problematic factors, we realize that a protective measure must be implemented at the browser-level. Therefore, we propose a defensive measure, a browser plug-in called Fail-rebind, that can detect, inform, and protect users in the event of an attack. Afterwards, we discuss the merits and limitations of our method compared to prior methods. Our findings suggest that Fail-rebind does not necessitate expert knowledge, works on different OSes and smart devices, and is independent of networks and location.
引用
收藏
页码:596 / 603
页数:8
相关论文
共 50 条
  • [1] Protecting Browsers from DNS Rebinding Attacks
    Jackson, Collin
    Barth, Adam
    Bortz, Andrew
    Shao, Weidong
    Boneh, Dan
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 421 - 431
  • [2] Protecting Browsers from DNS Rebinding Attacks
    Jackson, Collin
    Barth, Adam
    Bortz, Andrew
    Shao, Weidong
    Boneh, Dan
    [J]. ACM TRANSACTIONS ON THE WEB, 2009, 3 (01)
  • [3] Two level verification for detection of DNS rebinding attacks
    Brahmasani, Siva
    Sivasankar, E.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2013, 4 (02) : 138 - 145
  • [4] Study of DNS Rebinding Attacks on Smart Home Devices
    Tatang, Dennis
    Suurland, Tim
    Holz, Thorsten
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 391 - 401
  • [5] Stopping Amplified DNS DDoS Attacks Through Distributed Query Rate Sharing
    Verma, Saurabh
    Hamieh, Ali
    Huh, Jun Ho
    Holm, Henrik
    Rajagopalan, Siva Raj
    Korczynski, Maciej
    Fefferman, Nina
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 69 - 78
  • [6] Man in the Browser Attacks
    Dougan, Timothy
    Curran, Kevin
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2012, 4 (01) : 29 - 39
  • [7] DNS based In-Browser Cryptojacking Detection
    Sachan, Rohit Kumar
    Agarwal, Rachit
    Shukla, Sandeep Kumar
    [J]. 2022 FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2022, : 259 - 266
  • [8] Detecting DNS Amplification Attacks
    Kambourakis, Georgios
    Moschos, Tassos
    Geneiatakis, Dimitris
    Gritzalis, Stefanos
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 185 - 196
  • [9] Mitigating DNS DoS Attacks
    Ballani, Hitesh
    Francis, Paul
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 189 - 198
  • [10] Browser-based attacks on Tor
    Abbott, Timothy G.
    Lai, Katherine J.
    Lieberman, Michael R.
    Price, Eric C.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2007, 4776 : 184 - 199