Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods
    (Institute of Electrical and Electronics Engineers Inc., 2023) Chandrasekaran, K.; Divakarla, U.; Srinivasan, K.S.
    DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE.
  • Item
    D-DNS: A Decentralized Domain Name System on the Blockchain: Implementation and Assessment
    (Institute of Electrical and Electronics Engineers Inc., 2024) Divakarla, U.; Chandrasekaran, K.
    Cache poisoning and DDoS attacks are just two of the many ways that the Domain Name System (DNS), an essential part of the Internet infrastructure, can be attacked. Countermeasures have been suggested, although they are not without restrictions. This article introduces D-DNS, a domain name system built on blockchain technology that can offer effective and safe DNS services. D-DNS solves two issues with current blockchain-based DNS systems: the inefficient query handling and the computationally demanding Proof-of-Work (PoW) protocol. D-DNS accomplishes this by putting in place a domain index and a Proof-of-Stake (PoS) consensus mechanism. To evaluate the security of D-DNS versus legacy DNS in terms of attack success rate, attack cost, and attack surface, a new quantitative comparison is presented.. According to experimental results, the attack surface of D-DNS is substantially less than that of legacy DNS, the attack cost is a million times higher, and the chance of a successful attack on D-DNS is 1% of a successful attack on legacy DNS. When D-DNS query performance is compared to the most advanced commercial DNS implementations, it is demonstrated to achieve equivalent or even reduced query latency. © 2024 IEEE.