Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)(2024)
摘要
DNS dynamic updates represent an inherently vulnerable mechanism deliberately
granting the potential for any host to dynamically modify DNS zone files.
Consequently, this feature exposes domains to various security risks such as
domain hijacking, compromise of domain control validation, and
man-in-the-middle attacks. Originally devised without the implementation of
authentication mechanisms, non-secure DNS updates were widely adopted in DNS
software, subsequently leaving domains susceptible to a novel form of attack
termed zone poisoning. In order to gauge the extent of this issue, our analysis
encompassed over 353 million domain names, revealing the presence of 381,965
domains that openly accepted unsolicited DNS updates. We then undertook a
comprehensive three-phase campaign involving the notification of Computer
Security Incident Response Teams (CSIRTs). Following extensive discussions
spanning six months, we observed substantial remediation, with nearly 54% of
nameservers and 98
serves as evidence that engaging with CSIRTs can prove to be an effective
approach for reporting security vulnerabilities. Moreover, our notifications
had a lasting impact, as evidenced by the sustained low prevalence of
vulnerable domains.
更多查看译文
AI 理解论文
溯源树
样例
![](https://originalfileserver.aminer.cn/sys/aminer/pubs/mrt_preview.jpeg)
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要