Show simple item record

dc.identifier.urihttp://hdl.handle.net/1951/55407
dc.identifier.urihttp://hdl.handle.net/11401/70975
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeThesis
dcterms.abstractWe use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an internet-wide, hierarchical naming system used to translate domain names such as google.com into physical IP addresses such as 208.77.188.166. The Kaminsky DNS attack is a recently discovered vulnerability in DNS that allows an intruder to hijack a domain; i.e. corrupt a DNS server so that it replies with the IP address of a malicious web server when asked to resolve the URL of a non-malicious domain such as google.com. A proposed fix for the attack is based on the idea of randomizing the source port a DNS server uses when issuing a query to another server in the DNS hierarchy.We use PRISM to introduce a Continuous Time Markov Chain representation of the Kaminsky attack and the proposed fix, and to perform the requisite probabilistic model checking. Our results, gleaned from more than 240 PRISM runs, formally validate the existence of the Kaminsky cache-poisoning attack even in the presence of an intruder with virtually no knowledge of the victim DNS server's actions. They also serve to quantify the effectiveness of the proposed fix, demonstrating an exponentially decreasing, long-tail trajectory for the probability of a successful attack with an increasing range of source-port ids, as well as an increasing attack probability with an increasing number of attempted attacks or increasing rate at which the intruder guesses the source-port id.
dcterms.available2012-05-15T18:02:55Z
dcterms.available2015-04-24T14:45:23Z
dcterms.contributorSmolka, Scott A.en_US
dcterms.contributorErez Zadok.en_US
dcterms.contributorStoller, Scotten_US
dcterms.creatorDeshpande, Tushar Suhas
dcterms.dateAccepted2012-05-15T18:02:55Z
dcterms.dateAccepted2015-04-24T14:45:23Z
dcterms.dateSubmitted2012-05-15T18:02:55Z
dcterms.dateSubmitted2015-04-24T14:45:23Z
dcterms.descriptionDepartment of Computer Scienceen_US
dcterms.formatApplication/PDFen_US
dcterms.formatMonograph
dcterms.identifierDeshpande_grad.sunysb_0771M_10119.pdfen_US
dcterms.identifierhttp://hdl.handle.net/1951/55407
dcterms.identifierhttp://hdl.handle.net/11401/70975
dcterms.issued2010-05-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2012-05-15T18:02:55Z (GMT). No. of bitstreams: 1 Deshpande_grad.sunysb_0771M_10119.pdf: 651927 bytes, checksum: 71425ded6ea56107b40dff6bcd8fff07 (MD5) Previous issue date: 1en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:45:23Z (GMT). No. of bitstreams: 3 Deshpande_grad.sunysb_0771M_10119.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) Deshpande_grad.sunysb_0771M_10119.pdf.txt: 48703 bytes, checksum: 819e37f0a23a34591c54776f5f260dfb (MD5) Deshpande_grad.sunysb_0771M_10119.pdf: 651927 bytes, checksum: 71425ded6ea56107b40dff6bcd8fff07 (MD5) Previous issue date: 1en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectComputer Science
dcterms.subjectdns, formal verification, kaminsky, prism, security
dcterms.titleModel Checking the Kaminsky DNS Cache-Poisoning Attack Using PRISM
dcterms.typeThesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record