Академический Документы
Профессиональный Документы
Культура Документы
Abstract: The Domain Name System (DNS) services. Many internet applications, such as
is suffering from the vulnerabilities exploited http, email and ftp, indirectly or directly de-
to launch the cache poisoning attack. Inspired pend on the security of the DNS infrastructure
by biodiversity, we design and implement a to resolve a given domain name to its corre-
non-intrusive and tolerant secure architecture sponding IP address to establishing connec-
Multi-DNS (MDNS) to deal with it. MDNS tions. Unfortunately, security was not one of
consists of Scheduling Proxy and DNS server the design considerations for DNS, and it has
pool with heterogeneous DNSs in it. And the always been an attractive target to attackers
Scheduling Proxy dynamically schedules m [1], [2], [3].
DNSs to provide service in parallel and adopts DNS cache poisoning is arguably one of the
the vote results from majority of DNSs to most damaging attacks on DNS [4]. It refers
decide valid replies. And benefit from the cen- to cases where the cache of a DNS server is
tralized control of software defined network- injected with invalid or malicious mappings
ing (SDN), we implement a proof of concept between domain names and IP addresses.
for it. Evaluation results prove the validity and There are numerous ways to poison the cache,
availability of MDNS and its intrusion/fault such as by compromising an authoritative
tolerance, while the average delay can be con- DNS or forging a reply to cheat the recursive
trolled in 0.3s. DNS. And Dan Kaminsky [3] discovered a
Keywords: DNS cache poisoning attack; novel DNS cache poisoning attack in 2008,
software defined networking; moving target while the contamination target in conventional
defense; dynamic heterogeneous redundant DNS cache poisoning is the answer resource
records, the Kaminsky attack’s target is the
I. INTRODUCTION authority resource records, which is more de-
structive.
As one of the most critical components of the Although a suite of complicated cryptology
Internet, the Domain Name System (DNS) and authorization mechanisms like DNSSEC
provides not only resolution (or mapping) [6] has been deployed to secure DNS servers
between human-friendly domain names and and clients, there are still a few problems when
Received: Jun. 30, 2017
machine-friendly IP addresses, but also fun- deploying DNSSEC on a large scale. First, Revised: Apr. 26, 2018
damental trust anchors for accessing Internet DNSSEC incurs a significant performance Editor: Jun Bi
3.2 Workflow
First, the Scheduler picks m DNSs to provide
reps
service and the Decider sends the valid replies
back to clients. Then, once any mechanism of
Fig. 2. Overview of MDNS. the Scheduler is triggered, new active DNSs
three replies with the answer (IP addresses) Scheduler Scrubber Decider
switch1
respectively, then the Decider will determine (1) select active
DNSs
(7) final answer DNS2
93.184.216.34 should be the right answer and switch2
send it to client. As for the third DNS respond- (2) request (3) multicast
(4) request
(5) replies
DNS3
...
switch1
got three replies, 1.1.1.1 from DNS1 (the red
switch2
DNS2
box), 93.184.216.34 from DNS2~3 (the blue
DNS3 Internet boxes), then Decider chose the majority an-
client switch0
switch3
swer 93.184.216.34 as the final answer sent to
switch4
DNS4 Root TLD(.com)ns.example.com the client (the yellow box).
DNS5
The results prove the intrusion/fault tol-
switch5
erance of MDNS, and it’s obvious that if we
use m active DNSs, we can tolerate up to
Fig. 6. Experiment topology. ( m +1) / 2 faulty DNSs.
15 1500 4
Normal delay of the first query
MDNS-1 average delay of 2~100 queries
average delay of 2~100 queries /ms
MDNS-3
MDNS-5
delay of the first query /ms
10 1000 3.5
time delay /ms
5
500 3
0
0 10 20 30 40 50 60 70 80 90 100 0 2.5
queries Normal MDNS-1 MDNS-3 MDNS-5
10
400
delay of the MDNS-1, MDNS-2, and MDNS-
3 increases just like figure 8(b) shows. And
300
we can see that the delay increased after t1,
like the black circles show, which is mainly
200
because the load of the controller increased
caused by the switch0 outputting the DNS
100
queries to it. And the delay increased sharply
at t3, like the green squares show, which is
0
Normal MDNS-1 MDNS-3 MDNS-3-s MDNS-5 MDNS-5-s mainly because the new DNSs didn’t have the
cache (cache miss) at first and the controller
Fig. 11. Throughput of MDNS. had to wait for all the replies. Thus, the delay