Review Paper on Prevention of DNS Spoofing
Total Page:16
File Type:pdf, Size:1020Kb
Volume-4, Issue-3, June-2014, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 164-170 Review Paper on Prevention of DNS Spoofing Roopam1, Bandana Sharma2 1,2CSE, Kurukshetra University, INDIA ABSTRACT similar to: 7.9.18.26. A computer always needs to understand Today, to deceive customers financially in banks or to what numerical IP address of user alphanumeric address such their confidential data, one of the broadly used attack is internet as WWW.EXAMPLE.COM, which is accomplished through attack. Web criminals doing an internet scam through Phished DNS servers. Finally DNS listed for the Domain Name Websites that harms the user’s confidentiality. Attackers spoof delivers the answer back to the requesting computer. the data by mimicking the original Websites using DNS spoofing. 1.3 Domain Name Spoofing An essential part of the internet on whose many other protocol rely is the Domain Name System (DNS). DNS allows hosts on the A computer hacking attacks termed as DNS spoofing network to make updates to DNS records dynamically, without or also known as DNS cache poisoning, in which a data that is the need for restarting the DNS service. Server gets User’s being introduced into a Domain Name Server results in passwords, credit card numbers and any of their confidential diverting traffic to another computer and return an incorrect details by directly redirecting the user to a fake server. This can IP address. be done by injecting Fake DNS server in place of Original A DNS server is provided by the computer user's Server. In this thesis we want to prevent the DNS server from organization or an Internet Service Provider (ISP) generally DNS spoofing with efficient algorithm. The algorithm included in this thesis increases the security of url request from the attacker. used by networked computer .An organization's network This can be done by encrypting the url request by the user at deploy a DNS server to improve resolution response client side using RSA 1024 public key encryption and exactly performance by caching previously obtained query results. An double its encrypted security by appending bits generated from attacker is just need to exploit a flaw in the DNS software to blum blum shub generator at client side only. This whole accomplish a cache poisoning attack. If the request made by encrypted data then be sent to server side. DNS server doesn’t validate to ensure that they are from authoritative source the server will end up caching the Keywords- DNS, Public Key Algorithm, RSA Encryption , Blum incorrect entries locally and serve them to other users that Blum Shub Generator. make the same request. Attackers can use this technique to direct users of a website to another site of the attacker's I. INTRODUCTION choosing. Attacker needs to do is to spoof the IP address of DNS entries for a target website on a given DNS server, takes 1.1 Internet a control of his server by replacing that IP Address. Then files Internet Protocol (IP) is the standard that is used to will be created on the server he controls similar to the names link several billion devices worldwide is being used by matching the target server. A user who referenced to the computer network for the interconnection of a global system malicious server could be convinced in accepting content is termed as Internet. A broad array of electronic, wireless, coming from fake server and forced to download malicious and optical networking technologies are used to create a link content. between millions of private, public, academic, business, and 1.4 Phished Websites government networks, that create a network of network is A web site that is being created to capture any fields commonly called as internet. An extensive range of completed by the user (such as username and passwords)is information resources and services is being carried by termed as phishing websites . As soon as the user completes Internet, such as the infrastructure to support email, the inter- these fields , an attacker captures all his information. An linked hypertext documents and applications of the World attacker creates a fake web site that looks like exactly the Wide Web (WWW), , and peer-to-peer networks for file same as real web site for eg. facebook . The attacker sned his sharing and telephony. fake web site instead of original one whenever being 1.2 Domain Name Server requested by user and also trick the user into clicking a link Domain Name Server can be abbreviated as DNS, that leads to the fake site. When the user clicks to attempts to which helps in translating word based addresses of system to log on with their account information, all the information the system that should be located at that address or to the including his username and password is being stored to the numerical IP address of the computer (such as attacker record. WWW.EXAMPLE.COM to the Internet Protocol). All computers and systems on the Internet use addresses that look 164 Fig. 1.1 Phished website II. PROBLEM EXPLANATION The problem we formulated can be explained as capturing In Figure 1, clients will communicate with wrong or eavesdropping on users confidential data or misguiding destination and consequently receive incorrect IP . These them. This can be done diverting the user’s request from real destinations might be fake web servers to gain DNS server to the fake DNS server. username/password or private information of clients. Websites This DNS server problem originated when an attacker contain malicious content such as worms and viruses; fake place a fake DNS server in spite of real DNS server. This can update server for the software and operating system, and be done by placing a wrong IP address instead to original one sometime it threatens the network availability. by doing a very small modification in it. This whole process is termed as DNS spoofing. A process of stealing a confidential or secret data or user III. METHODOLOGY can be accomplished using Fake Website. A Fake website is a website, which looks similar to the real website with a slight The methodology we used in our thesis can be explained or unmarked difference with it. This difference can be as follows: A descriptive research on specific attacks that are explained as, a letter which looks similar to each other can be performed on Websites have been done by us. DNS spoofing, replaced so that user won’t be able to judge the difference now a days have become a critical issue to be resolved which between real and fake. As soon as the user start accessing the is very common and popular in web crime. Many different illegitimate website, the information like username, password, approach have been proposed against it which we discussed phone number, address etc will be sent to the fake DNS above. Giuseppe Ateniese from department of Computer server. And finally attacker will be able to steal or copy all the Science of JHU Information Security Institute and Stefan details of user for any harmful reason. Mangard from Institute for Applied Information Processing This can be explained as below: and Communications (IAIK) both proposed a new Approach to DNS SECURITY (DNSSEC). In our paper we presented a technique to prevent DNS server from attacker. This is having a 1024 pubic key which is used by RSA encryption to encrypt the url request by user. Further more Blum Blum Shub generator is used to generate 1024 binary bits and those bits are appended to the encrypted url data. Finally this whole encrypted data will be sent to server site. At server site, RSA decryption will be done to decrypt the data received from client site. And finally resulted in an original form of request. This whole methodology will help the user from being attacked by hackers. If any attacker in middle try to eavesdrop or divert the request from original DNS server then he won’t be able to judge the real request. 165 IV. RESULT RSA 1024 Encryption with blum blum shub generator: Fig 4.4 decryption time taken at server side V. CONCLUSION AND FUTURE WORK Fig 4.1 url request by user at client side Securing a DNs is a major challenge now a days therefore required to be secuired as soon as possible. The proposal to do such a change is introduced above which resulted in a positive way. The protocol or technique we introduced above make use of Public key RSA encryption with public key size 1024 with blum blum shub generator which helps in additional secuirity with minimum time. The protocol helps the user to secure his url request by given technique in comparatively less time to others. This can be seen above. Besides this we concluded that if we compare the security between the proposed architecture Fig 4.2 url request encrypted at client side showing time and others, we can see that proposed technique with public key size 1024 generate the same or more secuirity than the technique used before with 2048 key size or more. We presented a proposal, when properly implemented, and offers the higher security than others. It also degraded the time taken and improves the level of traffic of network. In future this can be done in a more dynamic way. Also one can implement the same protocol with small key size that will be able to generate comparatively more secure url request when compared with others. VI. LITERATURE SURVEY 1. G. Aghila, Professor, CDBR-SSE Lab, Department of Computer Science, Pondicherry University and V.