Methodology for DNS Cache Poisoning Vulnerability Analysis Of
Total Page:16
File Type:pdf, Size:1020Kb
1 INFOCOMMUNICATIONS1> REPLACE THIS LINE JOURNAL WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLECLICK HERE TO EDIT) < > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATIONMethodology NUMBER (DOUBLECLICK for DNS Cache PoisoningHERE TO EDIT)Vulnerability < Analysis of DNS64 Implementations Methodology for DNS Cache Poisoning INFOCOMMUNICATIONS JOURNAL 6 Methodology for DNS Cache Poisoning MethodologyVulnerability for AnalysisDNS Cache of DNS64 Poisoning So the conclusion for a real noisy environment is that the [8] W. D. Zhong, C. Chen, H. Yang and P. Du, “Performance Analysis of Vulnerability Analysis of DNS64 longer the codes the better the Gold code sets are, but under a Angle Diversity Multi-Element Receiver in Indoor Multi-Cell Visible Light Communication Systems”, International Conference on VulnerabilityImplementations Analysis of DNS64 certain code length the performance of Gold codes and OOCs Transparent Optical Networks (ICTON), 2017. may be similar. Implementations [9] S. Shawky, M.A. El-Shimy, Z. A. El-Sahn, M. R. M. Rizk and M. H. Implementations Aly, “Improved VLC-based Indoor Positioning System Using a G. Lencse, and Y. Kadobayashi, VII. CONCLUSION Regression Approach with Conventional RSS Techniques”, International Wireless Communications and Mobile Computing G.G. Lencse, Lencse, and and Y. Y. Kadobayashi, Kadobayashi ,Member, IEEE In this paper the VLC related CDM problems are Conference (IWCMC), pp. 904-909, June 2017. discussed, focusing on the asynchronous mode CDM which is more suitable for a simple VLC system. The description of the [10] S. Yang, E. Jeong, D. Kim, H. Kim, Y. Son, and S. Han, “Indoor years or even decades. On the one hand, IPv6 transition three-dimensional location estimation based on LED visible light most common code set types, the unipolar OOCs and bipolar yearstechnologies or even aredecades. important On solutionsthe one hand,for several IPv6 transdifferentition communication”, Electronics Letters, vol. 49, no. 1, pp. 54–56, technologiesproblems, which are ariseimportant from solutionsthe incompatibility for several of IdiPv4fferent and PN codes, showed the benefits, disadvantages and January 2013. possibilities of these codes. Obtaining information about a problems,IPv6: they whichcan enable arise communicationfrom the incompatibility in various scenof IPv4arios and[2]. [11] S. Jung, C. Choi, S. Heo, S. Lee, and C. Park, “Received Signal CDM channel quality is not as easy as measuring RSS on a IPv6:However, they oncan the enable other communication hand, they also involvein various a hig scenh numberarios [2]. of Strength Ratio Based Optical Wireless Indoor Localization Using single RF signal. It was showed that the most common quality Light Emitting Diodes for Illumination”, IEEE International However,security issueson the other[3]. Wehand, have they alsosurveyed involve 26 a higIPv6h numbertransition of Conference on Consumer Electronics (ICCE), pp. 63–64, January securitytechnologies, issues and [3]. prioritized We have them surveyed in order to26 be IPv6 able totrans analyzeition indicator measure, the crest factor, may be misleading in some 2013. technologies,the security vulnerabilities and prioritized of them the mostin order important to be able ones to analyzefirst [2]. cases. A possible solution is proposed for this problem, introducing two novel advanced quality indicator (AQI) [12] M. Mukherjee, "Wireless Communication – Moving from RF to theDNS64 security [4] vulnerabilitiesand stateful NAT of the [5] most were important classified ones as first having [2]. measures. Computing these new measures along with the crest Optical," International Conference on Computing for Sustainable DNS64utmost importance,[4] and stateful because NAT they [5] weretogether classified provide as th heaving only Global Development (INDIACom), pp. 788-795, 2016. factor gives a better approximation to the CDM channel utmostsolution importance, for a communication because theyscenario, together which provide is very importantthe only quality. With AQI1 the noise immunity of a CDM [13] S. De Lausnay, L. De Strycker, J-P. Goemaere, N. Stevens, B. solutionnow because for a communicationof the exhaustion scenario, of the public which IPv4 is ver ady dressimportant pool, transmission using Gold codes and OOCs are compared, in Nauwelaers, “Optical CDMA Codes for an Indoor Localization nownamely, because they of enable the exhaustion IPv6only of clientsthe public to IPv4communicat addresse pool, with System using VLC”, 3rd International Workshop on Optical Wireless function of the code length. These AQIs, for example, may Communications (IWOW), pp. 50–54, September 2014. namely,IPv4only they servers. enable IPv6only clients to communicate with improve the precision of a channel quality based VLC CDM IPv4onlyWe have servers. also developed a methodology for the identification [14] R. Gold, “Optimal Binary Sequences for Spread Spectrum indoor positioning system, and allows more reliable practical ofWe potential have also security developed issues a methodology of different for theIPv6 identi tranficationsition Multiplexing”, IEEE Transactions on Information Theory, vol. 13, comparison between various code sets. no. 4, pp. 619–621, October 1967. oftechnologies potential [6].security Ref. [3]issues follows of the different STRIDE IPv6appro ach,tran sitionwhich technologiesis a general software [6]. Ref. security [3] follows solution the STRIDE and it uses appro the ach,DFD which (Data ACKNOWLEDGMENT isFlow a general Diagram) software model security of the solution systems and to facilitate it uses the th DFDe discovery (Data The authors would like to thank Dr. Kari Kärkkäinen from Flowof various Diagram) threats. model We of havethe systems found tothis facilitate approach the usediscoveryful and the University of Oulu, Finland for the freely downloadable Gábor Szabó was born in Győr, Hungary, ofamended various the threats. method We in [6],have where found we this have approach also shown use fulthat and it is bipolar pseudo-noise code bank, which was a great help for 1990. He received his M. Sc. degree from amendednecessary the to methodexamine in the[6], mostwhere important we have alsoimplementat shown thations it isof the CDM simulations. the Budapest University of Technology and necessarythe given to IPv6 examine transition the most technologies, important implementatwhether theionsy areof Economics in 2015. His research interests thesusceptible given IPv6to the transitionvarious threats technologies, that were discovwhetherered the byy using are REFERENCES include optoelectronics and visible light susceptiblethe STRIDE to theapproach. various Wethreats have that pointed were discov out thatered DNS64 by using is communication. thetheoretically STRIDE susceptibleapproach. We to have pointed out that [7], DNS64 and now is [1] B. M. Masini, A. Bazzi and A. Zanella, "Vehicular Visible Light theoreticallythe important susceptible practical to question is, whether [7],its anddifferent now Networks with Full Duplex Communications," IEEE International theimplementations important practical are actually question susceptible is, whether to itsDNS di fferentcache Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 98-103, 2017. implementationspoisoning or not. are actually susceptible to DNS cache Eszter Udvary was born in Budapest, [2] S. Randel, F. Breyer, S. C. Lee, and J. W. Walewski, “Advanced Hungary. She received her Ph. D. degree in I. INTRODUCTION poisoningThe purpose or not. of this paper is to develop a simple and efficient Modulation Schemes for Short-Range Optical Communications”, 2009 from Budapest University of I. INTRODUCTION methodologyThe purpose for of DNSthis paper cache is poisoning to develop vulnerability a simple an danalysis efficient of IEEE Journal of Selected Topics in Quantum Electronics, vol. 16, no. EVERAL [1] were developed methodologyDNS64 implementations. for DNS cache This poisoning paper is vulnerability based on our a nalysisworkshop of 5, pp. 1280–1289, 2010. Technology and Economics. Her research SEVERAL to support the transition from IPv4 to [1]IPv6, were which developed we are interests include microwave circuits, fiber DNS64paper [8], implementations. in which we Thishave paperpresented is based our on testbed our w orkshopand our [3] A. Street, P. Stavrinou, D. O’brien, and D. Edwards, “Indoor optical Scurrently to support faced the with, transition and which from is IPv4 expected to IPv6, to lastwhich for weseveral are papermethod [8], for in Transaction which we haveID prediction presented attackour testbed as well a ndas ourour wireless systems – a review”, Optical and Quantum Electronics, vol. optics and optoelectronics. currently faced with, and which is expected to last for several 29, no. 3, pp. 349–378, 1997. methodresults forfor someTransaction specific ID DNS64 prediction implementations. attack as well No asw ourwe Submitted: December 28, 2017. This work was supported by the resultsgive a morefor some detailed specific introduction DNS64 toimplementations. cache poisoning Noincludingw we [4] T. Komine and M. Nakagawa, “Integrated system of white LED International Exchange Program of the National Institute of Information and visible-light communication