Please use this identifier to cite or link to this item:
https://idr.nitk.ac.in/jspui/handle/123456789/17421
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | D., Pushparaj Shetty | - |
dc.contributor.advisor | Balaji, Rajendran | - |
dc.contributor.author | .., Sanjay | - |
dc.date.accessioned | 2023-03-21T06:06:16Z | - |
dc.date.available | 2023-03-21T06:06:16Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/17421 | - |
dc.description.abstract | DNS is an essential service for the smooth functioning of all Internet services includ- ing web applications, email services, messaging services, online social networks, etc. . . that works by resolving an alphabetic hostname to an IP address. Every network com- munication usually begins with a DNS mapping of the given domain name to the IP address specifically accessible by the program. Many programs stop working as soon as this mapping service is inaccessible. As a result, adversaries are keen to deny this service via bug exploits, exploiting the vulnerabilities, or by circumventing the proto- col standard function. In such instances, the attackers may use DNS server settings that lack sufficient security hardening and to do things like moving DNS zones, altering DNS resolvers to report fake IP addresses to divert customers, divert web and email traffic, or execute deadly DNS amplification attacks. DNS also plays a significant role in the overall user experience of Internet services. However, it is mostly forgotten, and is often discovered without adequate protection, or running older software versions, or is entirely insecure. Since most organizations are unaware that DNS is a key attack vector, DNS-based attacks and exploitations oc- cur. The system of DNS could appeal to an attacker for disruptive operations such as network footprinting, downloading malicious software, contact with command and con- trol servers, data exfiltration out of a network, and DNS-based reflective amplification DDoS attempts. In some cases, DNS applications face many security issues such as DoS/DDoS attacks on DNS servers, DNS cache poisoning, NXDomain (Non-existent domain), MITM (Man-in-the-Middle) attacks, and DNS ID spoofing. As a result, mon- itoring DNS traffic for threat security is very important. This research aims to provide two novel methods for securing DNS infrastructure, i.e., DNS health measurement and DNS intrusion detection. As part of the research goal, we compare the DNS query resolution latency in IPv4 versus IPv6 network stacks by setting up a three-level DNS hierarchy for the forward lookup tree and a four-level DNS hierarchy for the reverse lookup tree on a dual IP stack that includes ROOT on top-level, TLD on second, SLD on third, and subdomains on the fourth level. We also set up a dual-stack-based recursive resolver. i In this thesis, we offer a unique empirical technique for measuring the health of authoritative DNS servers — a key, essential, and significant component of the DNS in- frastructure. DNS software weaknesses, DNS latency comparison with ICMP latency, and DNSSEC validation are three new parameter classes that are proposed and evalu- ated for effective assessment of the health of authoritative DNS servers. The proposed methodology can be extensible across the components of the entire DNS infrastructure and could be used to analyze, identify, and prevent DNS abuse regularly. We present - DNS Intrusion Detection (DID), a system integrated into SNORT - a prominent open-source IDS, to detect major DNS-related attacks. We have developed novel IDS signatures for various tools used in the DNS tunneling, DNS amplification, and DNS DoS attacks. We identified the above DNS attacks carried out by different tools available on the Internet using our method. DID observed a high detection rate and a low false-positive rate during testing. | en_US |
dc.language.iso | en | en_US |
dc.publisher | National Institute of Technology Karnataka, Surathkal | en_US |
dc.subject | DNS Tunneling | en_US |
dc.subject | DNS Amplification | en_US |
dc.subject | DoS Attack | en_US |
dc.subject | IPv6 DNS Query Latency | en_US |
dc.title | Domain Name System (Dns ) Security: Health Measurement and Intrusion Detection | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | 1. Ph.D Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
177039MA500-SANJAY.pdf | 7.89 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.