期刊文献+

一种基于拟态安全防御的DNS框架设计 被引量:43

A DNS Architecture Based on Mimic Security Defense
下载PDF
导出
摘要 目前针对DNS服务器的恶意攻击频发,如DNS缓存投毒攻击,而DNS安全拓展协议(DNSSEC)在大规模部署时仍面临许多难题.本文提出一种简单易部署的,具有入侵容忍能力的主动防御架构——拟态DNS(Mimic DNS,M-DNS)——保证DNS安全.该架构由选调器和包含多个异构DNS服务器的服务器池组成.首先选调器动态选取若干服务器并行处理请求,然后对各服务器的处理结果采用投票机制决定最终的有效响应.实验仿真表明,相比当前传统架构,M-DNS可以降低缓存投毒攻击成功率约10个数量级. A simple and practical approach is required immediately to safeguard the Domain Name System(DNS)because there are increasing attacks on DNS(such as DNS cache poisoning) and various problems when deploying Domain Name System Security Extensions(DNSSEC) on a large scale.In this paper,we present Mimic DNS(M-DNS),a nonintrusive,tolerant and proactive security architecture,to deal with it.M-DNS is comprised of a scheduler and a server pool which consists of several heterogeneous DNS servers.The scheduler dynamically schedules the DNS servers to handle the requests in parallel and adopts the vote results from the majority of the servers to determine valid responses.Simulation results demonstrate that compared with current traditional frameworks,approximating 10 orders of magnitude reduction in cache poisoning attack probability is acquired when employing M-DNS.
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第11期2705-2714,共10页 Acta Electronica Sinica
基金 国家自然科学基金青年基金(No.61309020 No.61602509) 国家自然科学基金创新群体项目(No.61521003) 国家重点研发计划项目(网络空间拟态防御技术机制研究)(No.2016YFB0800100 No.2016YFB0800101)
关键词 DNS DNS缓存投毒攻击 拟态安全防御 动态异构冗余 DNS DNS cache poisoning attack mimic security defense dynamic heterogeneous redundancy
  • 相关文献

参考文献6

二级参考文献20

  • 1闫伯儒,方滨兴,李斌,王垚.DNS欺骗攻击的检测和防范[J].计算机工程,2006,32(21):130-132. 被引量:22
  • 2US-CERT. Multiple DNS Implementations Vulnerable to Cache Poisoning[EB/OL]. (2008-07-08). http://www.kb.cert.org/vuls/id/ 800113.
  • 3Eastlake D. Domain Name System Security Extensions[S]. RFC 2535, 1999.
  • 4Stewart J. DNS Cache Poisoning The Next Generation[EB/OL]. (2003-01-27). http://www.secureworks.com/research/articles/cache poisoning.
  • 5US-CERT. Various DNS Service Implementations Generate Multiple Simultaneous Queries for the Same Resource Record[EB/OL]. (2002-11-19). http://www.kb.cert.org/vuls/id/457875.
  • 6BERTACCHINI M,FIERENS P I.Preliminary results on masquerader detection using compression based similarity metrics[J].Electronic Journal of SADIO,2007,7(1):31-42.
  • 7EVANS S,EILAND E,et al.MDLcompress for intrusion detection:Signature inference and masquerade attack[A].Military Communications Conference[C].Orlando:IEEE Press,2007.1-7.
  • 8LATENDRESSE M.Masquerade detection via customized grammars[J].Lecture Notes in Computer Science,2005,3548:141-159.
  • 9POSADAS R,MEX-PERERA J C,et al.Hybrid method for detecting masqueraders using session folding and hidden Markov models[J].Lecture Notes in Computer Science,2006,4293:622-631.
  • 10OKAMOTO T,ISHIDA Y.Framework of an immunity-based anomaly detection system for user behavior[J].Lecture Notes in Computer Science,2007,4694:821-829.

共引文献283

同被引文献208

引证文献43

二级引证文献113

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部