首页> 外文学位 >Formal Analysis of DNS Attacks and Their Countermeasures Using Probabilistic Model Checking.
【24h】

Formal Analysis of DNS Attacks and Their Countermeasures Using Probabilistic Model Checking.

机译:使用概率模型检查对DNS攻击进行形式化分析及其对策。

获取原文
获取原文并翻译 | 示例

摘要

The Domain Name System (DNS) is an internet-wide, hierarchical naming system used to translate domain names into physical IP addresses. Any disruption of the service DNS provides can have serious consequences. We present a formal analysis of two notable threats to DNS, namely cache poisoning and bandwidth amplification, and the countermeasures designed to prevent their occurrence. Our analysis of these attacks and their countermeasures is given in the form of a cost-benefit analysis, and is based on probabilistic model checking of Continuous-Time Markov Chains. We use CTMCs to model the race between legitimate and malicious traffic in a DNS server under attack, i.e., the victim. Countermeasure benefits and costs are quantified in terms of probabilistic reachability and reward properties, which are evaluated over all possible execution paths.;The results of our analysis support substantive conclusions about the relative effectiveness of the different countermeasures under varying operating conditions. We also validate the criticism that the DNS security extensions devised to eliminate cache poisoning render DNS more vulnerable to bandwidth amplification attacks (BAAs).;We also model the DNS BAA as a two-player, turn-based, zero-sum stochastic game between an attacker and a defender. The attacker attempts to flood the victim's bandwidth with malicious traffic by choosing an appropriate number of zombies to attack. In response, the defender nondeterministically chooses among five basic BAA countermeasures, so that the victim can process as much legitimate traffic as possible. We use our game-based model of DNS BAA to generate optimal attack strategies that vary the number of zombies and the optimal defense strategies that combine the basic BAA countermeasures to optimize the attacker's and the defender's payoffs. Such payoffs are defined using probabilistic reward-based properties, and are measured in terms of the attack strategy's ability to minimize the volume of legitimate traffic that is eventually processed and the defense strategy's ability to maximize the volume of legitimate traffic that is eventually processed.
机译:域名系统(DNS)是一个Internet范围内的分层命名系统,用于将域名转换为物理IP地址。 DNS提供的服务的任何中断都可能造成严重后果。我们对DNS的两个显着威胁(即缓存中毒和带宽放大)进行了正式分析,并设计了防止其发生的对策。我们以成本效益分析的形式给出了对这些攻击及其对策的分析,并基于连续时间马尔可夫链的概率模型检验。我们使用CTMC对受攻击的DNS服务器(即受害者)中合法流量与恶意流量之间的竞争进行建模。对策收益和成本根据概率可达性和奖励属性进行量化,并在所有可能的执行路径上进行评估。我们的分析结果支持有关不同操作条件下不同对策的相对有效性的实质性结论。我们还验证了以下批评:DNS安全扩展旨在消除缓存中毒,从而使DNS更加容易受到带宽放大攻击(BAA)的影响;我们还将DNS BAA建模为两人,回合制,零和之间的随机博弈攻击者和防御者。攻击者尝试通过选择适当数量的僵尸进行攻击,以恶意流量充斥受害者的带宽。作为响应,防御者不确定地从BAA的五种基本对策中进行选择,以便受害者可以处理尽可能多的合法流量。我们使用基于游戏的DNS BAA模型来生成可改变僵尸数量的最佳攻击策略,以及结合基本BAA对策以优化攻击者和防御者收益的最佳防御策略。使用基于概率奖励的属性定义此类收益,并根据攻击策略使最终处理的合法流量量最小化的能力以及防御策略使最终处理的合法流量量最大化的能力来度量。

著录项

  • 作者

    Deshpande, Tushar Suhas.;

  • 作者单位

    State University of New York at Stony Brook.;

  • 授予单位 State University of New York at Stony Brook.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 90 p.
  • 总页数 90
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号