eCommons

 

Perils of Transitive Trust in the Domain Name System

dc.contributor.authorRamasubramanian, Venugopalanen_US
dc.contributor.authorSirer, Emin Gunen_US
dc.date.accessioned2007-04-04T19:44:31Z
dc.date.available2007-04-04T19:44:31Z
dc.date.issued2005-05-16en_US
dc.description.abstractThe Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results from a large scale survey of DNS that shows that these dependencies lead to a highly insecure naming system. We report specifically on three aspects of DNS security: the properties of the DNS trusted computing base, the extent and impact of existing vulnerabilities in the DNS infrastructure, and the ease with which attacks against DNS can be launched. The survey shows that a typical name depends on 46 servers on average, whose compromise can lead to domain hijacks, and names belonging to some countries depend on a few hundred nameservers. An attacker exploiting well-documented vulnerabilities in DNS can hijack more than 30% of the names appearing in the Yahoo and DMOZ.org directories. And certain nameservers, especially in educational institutions, control as much as 10% of the namespace.en_US
dc.format.extent97315 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cis/TR2005-1994en_US
dc.identifier.urihttps://hdl.handle.net/1813/5694
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titlePerils of Transitive Trust in the Domain Name Systemen_US
dc.typetechnical reporten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR2005-1994.pdf
Size:
95.03 KB
Format:
Adobe Portable Document Format