Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods
    (Institute of Electrical and Electronics Engineers Inc., 2023) Chandrasekaran, K.; Divakarla, U.; Srinivasan, K.S.
    DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE.
  • Item
    Secure Intelligence Development Lifecycle (SIDL) Model for Vulnerability Detection
    (Springer Science and Business Media Deutschland GmbH, 2025) Dhanush, V.; Chandra, T.S.; Divakarla, U.; Chandrasekaran, K.
    This paper presents the Secure Intelligence Development Life-Cycle, a Software Development Life-Cycle created to address the need for advanced security and intelligent technologies, such as artificial intelligence and machine learning, at the development level. It differs from standard software development models that usually involve security measures only in the later stages of development; this one integrates security measures right from the early stage of requirements gathering through design, development, and deployment. The embedding of security from the onset allows real-time vulnerability detection and response with adaptability to emerging threats. It has also improved threat detection, made better decisions, and enhanced system resilience with intelligent processes. It is most effective with sectors like healthcare, finance, and critical infrastructure for secure and complex software systems. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.