Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4629
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSwarnkar, Mayanken_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:00Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:00Z-
dc.date.issued2018-
dc.identifier.citationTripathi, N., Swarnkar, M., & Hubballi, N. (2018). DNS spoofing in local networks made easy. Paper presented at the 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, 1-6. doi:10.1109/ANTS.2017.8384122en_US
dc.identifier.isbn9781538623473-
dc.identifier.otherEID(2-s2.0-85049968958)-
dc.identifier.urihttps://doi.org/10.1109/ANTS.2017.8384122-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4629-
dc.description.abstractDomain Name System (DNS) is a central protocol of the internet and provides a way to resolve domain names to their corresponding IP addresses. It is one of the most critical protocols being used in the internet. However, DNS is known to be vulnerable to a popular attack called DNS poisoning. Fortunately, DNS poisoning has become difficult to launch due to introduction of techniques like source port and query identification value randomization aftermath of Kaminsky attack. In this paper, we propose a targeted DNS spoofing attack that exploits a vulnerability present in DHCP server-side IP address conflict detection technique to prevent a genuine DHCP server from offering network parameters; while sending a fake offer on its own. We discuss how proposed attack can target even a single victim client also without affecting other clients. We test the effectiveness of proposed attack in a real network setup and report the results. Further, we discuss how known detection and mitigation techniques are unable to detect the attack. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.source11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017en_US
dc.subjectNetwork securityen_US
dc.subjectServersen_US
dc.subjectCentral protocolsen_US
dc.subjectConflict detectionen_US
dc.subjectDns poisoningen_US
dc.subjectDomain name systemen_US
dc.subjectLocal networksen_US
dc.subjectMitigation techniquesen_US
dc.subjectNetwork parametersen_US
dc.subjectReal networksen_US
dc.subjectInternet protocolsen_US
dc.titleDNS spoofing in local networks made easyen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: