Protecting DNS services from IP spoofing

Author(s):  
Nm Sahri ◽  
Koji Okamura
Keyword(s):  
1995 ◽  
Vol 1995 (3) ◽  
pp. 6-11 ◽  
Author(s):  
Dan Thomsen

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 22764-22777 ◽  
Author(s):  
Chaoqin Zhang ◽  
Guangwu Hu ◽  
Guolong Chen ◽  
Arun Kumar Sangaiah ◽  
Ping'an Zhang ◽  
...  

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1510 ◽  
Author(s):  
Prakash Veeraraghavan ◽  
Dalal Hanna ◽  
Eric Pardede

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.


2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Hani Alquhayz ◽  
Nasser Alalwan ◽  
Ahmed Ibrahim Alzahrani ◽  
Ali H. Al-Bayatti ◽  
Mhd Saeed Sharif

Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless technologies. An alternative network, Y-Communication (Y-Comm), proposes to integrate the current wired and wireless networks, attempting to achieve the main service requirements of 5G by converging the existing networks and providing an improved service anywhere at any time. Quality of service (QoS), vertical handover, and security are some of the technical concerns resulting from this heterogeneity. In addition, it is believed that the Y-Comm convergence will have a greater influence on security than was the case with the previous long-term evolution (LTE) 4G networks and with future 5G networks. The purpose of this research is to satisfy the security recommendations for 5G mobile networks. This research provides a policy-based security management system, ensuring that end-user devices cannot be used as weapons or tools of attack, for example, IP spoofing and man-in-the-middle (MITM) attacks. The results are promising, with a low disconnection rate of less than 4% and 7%. This shows the system to be robust and reliable.


2011 ◽  
Vol 403-408 ◽  
pp. 4469-4475
Author(s):  
S. Benson Edwin Raj ◽  
V.S. Jayanthi ◽  
R. Shalini

Botnets are growing in size, number and impact. It continues to be one of the top three web threats that mankind has ever known. The botnets are the souped-up cyber engines driving nearly all criminal commerce on the Internet and are seen as relaying millions of pieces of junk e-mail, or spam. Thus, the need of the hour is the early detection and identification of the heart of network packet flooding or the C&C centre. Most of the botmasters perform DDos attacks on a target server by spoofing the source IP address. The existing botnet detection techniques rely on machine learning algorithms and do not expound the IP spoofing issue. These approaches are also found to be unsuccessful in the meticulous identification of the botmasters. Here we propose an architecture that depend on the PSO-based IP tracebacking. Our architecture also introduces the IP spoofing detector unit so as to ensure that the Traceback moves in the right direction. The approach also detects the zombies and utilizes the PSO optimization technique that aid in the identification of the C&C node. The experimental results show that our approach is successful in prompt detection of the bots.


2013 ◽  
Vol 5 (3) ◽  
pp. 153 ◽  
Author(s):  
Paulo Lopes ◽  
Paulo Salvador ◽  
António Nogueira

Sign in / Sign up

Export Citation Format

Share Document