中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/44562
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 81025/81025 (100%)
Visitors : 46500511      Online Users : 494
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/44562


    Title: DNSPD: Entrap Botnets Through DNS Cache Poisoning DetectionDNSPD: Entrap Botnets Through DNS Cache Poisoning Detection
    Authors: 蔡天浩;Tien-hao Tsai
    Contributors: 資訊工程研究所
    Keywords: DNS;快取攻擊;網路殭屍;DNS;cache poisoning;botnet
    Date: 2010-07-01
    Issue Date: 2010-12-09 13:49:11 (UTC+8)
    Publisher: 國立中央大學
    Abstract: ”網域名稱伺服器快取毒害”(DNS Cache Poisoning)自1993年被提出 [1],迄今仍無法徹底解決,此攻擊會造成DNS主機的快取資料錯亂,而本該是連線到正常網站,會被導向至攻擊者的網站,導致一般使用者上當受害。而快取攻擊的原理是猜測先前送出查詢封包(query)中的資料,包含一個0~65535的亂數、連線的IP與Port Number等,回應的封包(response)若通過檢查,就會被視為是正確的答案,並儲存在快取中,以減輕下次查詢的時間;所以攻擊者通常會藉由發送大量的封包來提高猜中的機率。 我們根據此特性建構了一套有效的防範機制DNSPD,適合部署至一般大型組織、企業的網路架構來阻擋攻擊。根據觀察,這些偽造的DNS封包中,通常會含有惡意網站的IP,所以我們將IP取出,並紀錄與持續觀察是否有惡意行為,例如:釣魚網站等。而且這些IP通常也會是網路殭屍(botnet)的成員,我們更可藉由捕捉攻擊封包,建立botnet IP黑名單,提前預防其他潛藏的危機。另外,我們利用Counting Bloom filter [2]來確保DNSPD能有效的處理大量偽造封包;經過運作與測試的証實,DNSPD不僅能阻擋快取毒害的攻擊、找出botnet成員,更重要的是它對原本網路所增加的負擔極小。In this paper, we propose a network-based solution, DNSPD, to defend an organization against the notorious DNS cache poisoning attack. DNS cache poisoning has been used to attack DNS servers since 1993 [1]. Through this type of attacks, an attacker can change the IP address of a domain name to any IP address chosen by her/him. Because an attacker can not obtain the transaction number and port number of a DNS query sent by a DNS resolver, in order to forge the related DNS response with a prepared IP address, the attacker needs to send many fake DNS response to the resolver, and all the fake DNS messages may have the same IP address. Based on this observation, DNSPD solves DNS cache poisoning by detecting, recording, and confirming the IP addresses appearing in contents of fake DNS replies. As a result, DNSPD not only can block DNS cache poisoning attacks but also can identify the malicious hosts which attackers plan for redirecting target hosts’ traffic. Usually these malicious hosts are botnet members and used as phishing sites; hence, identifying these bots and disconnecting traffic to them can provide further protection to the hosts in a network. Besides, through the utilization of Bloom Counter [2] and host confirmation, DNSPD maintains its detection accuracy even when it is bombarded with tremendous fake DNS replies. Experimental results show that with low performance overhead, DSNSP can accurate block DSN cache poisoning attacks and detect the related bots.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML645View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明