DocumentCode :
3669270
Title :
Kalman filter based DNS cache poisoning attack detection
Author :
Hao Wu;Xianglei Dang;Liang Zhang;Lidong Wang
Author_Institution :
CNCERT/CC, China
fYear :
2015
Firstpage :
1594
Lastpage :
1600
Abstract :
Detection for Domain Name Systems cache poisoning attack is investigated. We exploit the fact that when attack is happening, the entropies of the query packet IP addresses of the cache server will have a decrease, to detect the cache poisoning attack. We pay attention to the detection method for the case that the entropy sequence has nonstationary dynamic at normal cases. In order to handle the nonstationarity, we first model the entropy sequence by a state space equation, and then we utilize Kalman filter to implement the attack detection. The problem is discussed for single and distributed cache poisoning attack, respectively. For the single one, we use the measurement errors to detect the anomaly. Under distributed attack, we utilize the correlation variation of the prediction errors to detect the attack event and identify the attacked cache servers. An experiment is illustrated to verify the effectiveness of our presented method.
Keywords :
"Servers","Entropy","IP networks","Correlation","Kalman filters","Mathematical model"
Publisher :
ieee
Conference_Titel :
Automation Science and Engineering (CASE), 2015 IEEE International Conference on
ISSN :
2161-8070
Electronic_ISBN :
2161-8089
Type :
conf
DOI :
10.1109/CoASE.2015.7294328
Filename :
7294328
Link To Document :
بازگشت