Scholarworks Repository

Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System

Show simple item record

dc.contributor.author Bassil R.
dc.contributor.author Hobeica R.
dc.contributor.author Itani W.
dc.contributor.author Ghali C.
dc.contributor.author Kayssi A.
dc.contributor.author Chehab A.
dc.contributor.editor
dc.date 2012
dc.date.accessioned 2017-10-04T11:07:11Z
dc.date.available 2017-10-04T11:07:11Z
dc.date.issued 2012
dc.identifier 10.1109/ICTEL.2012.6221233
dc.identifier.isbn 9.7814673075e+012
dc.identifier.issn
dc.identifier.uri http://hdl.handle.net/10938/14402
dc.description.abstract The Domain Name System is a crucial part of the Internet's infrastructure, as it provides basic information that is vital for the proper operation of the Internet. The importance of DNS has caused it to be targeted by malicious attackers who are interested in causing damage and gaining personal benefits. Thus nowadays, DNS faces many security threats such as DNS spoofing and cache poisoning attacks. This paper presents S-DNS, an efficient security solution for thwarting cache poisoning attacks in the DNS hierarchy. The contribution of the S-DNS protocol lies in: (1) decreasing the success probability of DNS spoofing and cache poisoning by preventing man-in-the-middle attacks, (2) providing a backward compatible and simple security solution with low computation and communication overheads, (3) targeting the different DNS query interaction models from iterative, recursive, and caching schemes, and (4) employing an efficient Identity-Based Encryption key management scheme that relieves the different DNS interacting entities from the burden and complexities of traditional public-key infrastructures. © 2012 IEEE.
dc.format.extent
dc.language English
dc.relation.ispartof Publication Name: 2012 19th International Conference on Telecommunications, ICT 2012; Conference Title: 2012 19th International Conference on Telecommunications, ICT 2012; Conference Date: 23 April 2012 through 25 April 2012; Conference Location: Jounieh; Publication Year: 2012;
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System
dc.type Conference Paper
dc.contributor.affiliation Bassil, R., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Hobeica, R., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Itani, W., Department of Electrical and Computer Engineering, Beirut Arab University, Beirut 1107 2809, Lebanon
dc.contributor.affiliation Ghali, C., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Kayssi, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Chehab, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.authorAddress Bassil, R.; Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon; email: rtb01@aub.edu.lb
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail
dc.contributor.authorFaculty Faculty of Engineering and Architecture
dc.contributor.authorInitials
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited
dc.description.citedCount
dc.description.citedTotWOSCount
dc.description.citedWOSCount
dc.format.extentCount 1
dc.identifier.articleNo 6221233
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 84864228515
dc.identifier.url
dc.publisher.address
dc.relation.ispartofConference Conference Title: 2012 19th International Conference on Telecommunications, ICT 2012 : Conference Date: 23 April 2012 through 25 April 2012 , Conference Location: Jounieh.
dc.relation.ispartofConferenceCode 91386
dc.relation.ispartofConferenceDate 23 April 2012 through 25 April 2012
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc Jounieh
dc.relation.ispartofConferenceSponsor
dc.relation.ispartofConferenceTitle 2012 19th International Conference on Telecommunications, ICT 2012
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr
dc.relation.ispartOfIssue
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle 2012 19th International Conference on Telecommunications, ICT 2012
dc.relation.ispartofPubTitleAbbr Int. Conf. Telecommun., ICT
dc.relation.ispartOfSpecialIssue
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume
dc.source.ID
dc.type.publication Series
dc.subject.otherAuthKeyword DNS
dc.subject.otherAuthKeyword DNS cache poisoning
dc.subject.otherAuthKeyword DNS security
dc.subject.otherAuthKeyword Identity-Based Encryption
dc.subject.otherAuthKeyword man-in-the-middle attacks
dc.subject.otherAuthKeyword spoofing attacks
dc.subject.otherChemCAS
dc.subject.otherIndex Cache poisoning
dc.subject.otherIndex DNS
dc.subject.otherIndex DNS security
dc.subject.otherIndex Identity Based Encryption
dc.subject.otherIndex Man in the middle attacks
dc.subject.otherIndex Spoofing attacks
dc.subject.otherIndex Cryptography
dc.subject.otherIndex Information technology
dc.subject.otherIndex Internet
dc.subject.otherIndex Security systems
dc.subject.otherIndex Internet protocols
dc.subject.otherKeywordPlus
dc.subject.otherWOS


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Scholarworks


Browse

My Account