Jeitner, Philipp (2022)
Security Implications of Insecure DNS Usage in the Internet.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021523
Ph.D. Thesis, Primary publication, Publisher's Version
Text
diss_jeitner_1d01c4b.pdf Copyright Information: In Copyright. Download (4MB) |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Security Implications of Insecure DNS Usage in the Internet | ||||
Language: | English | ||||
Referees: | Waidner, Prof. Dr. Michael ; Shulman, Prof. Dr. Haya ; Schinzel, Prof. Dr. Sebastian | ||||
Date: | 2022 | ||||
Place of Publication: | Darmstadt | ||||
Collation: | x, 121 Seiten | ||||
Date of oral examination: | 13 June 2022 | ||||
DOI: | 10.26083/tuprints-00021523 | ||||
Abstract: | The Domain Name System (DNS) provides domain-to-address lookup-services used by almost all internet applications. Because of this ubiquitous use of the DNS, attacks against the DNS have become more and more critical. However, in the past, studies of DNS security have been mostly conducted against individual protocols and applications. In this thesis, we perform the first comprehensive evaluation of DNS-based attacks against a wide range of internet applications, ranging from time-synchronisation via NTP over internet resource management to security mechanisms. We show how to attack those applications by exploiting various weaknesses in the DNS. These attacks are based on both, already known weaknesses which are adapted to new attacks, as well as previously unknown attack vectors which have been found during the course of this thesis. We evaluate our attacks and provide the first taxonomy of DNS applications, to show how adversaries can systematically develop attacks exploiting the DNS. We analyze the attack surface created by our attacks in the internet and find that a significant number of applications and systems can be attacked. We work together with the developers of the vulnerable applications to develop patches and general countermeasures which can be applied by various parties to block our attacks. We also provide conceptual insights into the root causes allowing our attacks to help with the development of new applications and standards. The findings of this thesis are published in in 4 full-paper publications and 2 posters at international academic conferences. Additionally, we disclose our finding to developers which has lead to the registration of 8 Common Vulnerabilities and Exposures identifiers (CVE IDs) and patches in 10 software implementations. To raise awareness, we also presented our findings at several community meetings and via invited articles. |
||||
Alternative Abstract: |
|
||||
Status: | Publisher's Version | ||||
URN: | urn:nbn:de:tuda-tuprints-215236 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > Security in Information Technology | ||||
Date Deposited: | 19 Jul 2022 10:04 | ||||
Last Modified: | 18 Nov 2022 11:42 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/21523 | ||||
PPN: | 497909421 | ||||
Export: |
View Item |