DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods
| dc.contributor.author | Chandrasekaran, K. | |
| dc.contributor.author | Divakarla, U. | |
| dc.contributor.author | Srinivasan, K.S. | |
| dc.date.accessioned | 2026-02-06T06:34:28Z | |
| dc.date.issued | 2023 | |
| dc.description.abstract | DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE. | |
| dc.identifier.citation | 2023 Cyber Research Conference - Ireland, Cyber-RCI 2023, 2023, Vol., , p. - | |
| dc.identifier.uri | https://doi.org/10.1109/Cyber-RCI59474.2023.10671556 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/29247 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Cache Poisoning | |
| dc.subject | DNS | |
| dc.subject | DNSSEC | |
| dc.subject | Malware | |
| dc.subject | Security | |
| dc.title | DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods |
