2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) 2019
DOI: 10.1109/nca.2019.8935025
|View full text |Cite
|
Sign up to set email alerts
|

A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…For example, the DNSSEC adds two important features to DNS, which are data origin authentication and data integrity protection. Tese two approaches are used to verify that the requests for a DNS record comes from its authoritative name server and was not spoofed or manipulated in the request process [32,33]. However, as the registry control of DNS is under ICANN [34], which means that no other organization will be able to control them, it is undeniable that the DNS is a highly centralized system, with the risks of server breakdown and man-made damage.…”
Section: Infuencementioning
confidence: 99%
“…For example, the DNSSEC adds two important features to DNS, which are data origin authentication and data integrity protection. Tese two approaches are used to verify that the requests for a DNS record comes from its authoritative name server and was not spoofed or manipulated in the request process [32,33]. However, as the registry control of DNS is under ICANN [34], which means that no other organization will be able to control them, it is undeniable that the DNS is a highly centralized system, with the risks of server breakdown and man-made damage.…”
Section: Infuencementioning
confidence: 99%
“…Third, the scheme is applied to a month's worth of DNS data from the two enterprises and compared the outcomes in contrast to blacklists and firewall logs to demonstrate the scheme's capability of spotting distributed attacks that may be missed by legacy techniques while still maintaining decent real-time performance (Lyu et al, 2021). Jin et al (2019) suggested a unique detection technique for defending against DNS cache poisoning threats using ML methods. Jin et al (2019) seeks to add a significant number of additional characteristics to the suggested technique besides the fundamental 5-tuple information of a DNS packet that has been retrieved depending on the ordinary DNS protocol and the heuristic aspects.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the role of machine learning in assessing security aspects and detecting various attacks, which has been discussed in the related work, can also be useful for our future work specifically with respect to noncompliant transitions. Jin, Tomoishi, and Matsuura [40], for example, make use of machine learning to detect cache poisoning in DNS, specifically those caused by compromised name servers. In the context of Web PKI, Dong, Kane, and Camp [41] define a set of features to describe X.509 and apply deep neural networks to detect rogue certificates.…”
Section: Related Workmentioning
confidence: 99%