DOI QR코드

DOI QR Code

Attack Evolution of 'DNSpionage' and Countermeasures on Survey

'DNS피오나지' 공격의 진화에 따른 대응방안

  • Received : 2019.08.01
  • Accepted : 2019.09.20
  • Published : 2019.09.27

Abstract

DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

DNS는 'Domain Name System'의 약자로, 네트워크 상에서 네트워크에 연결된 장지를 구분하기 위해 IP 주소를 사용하는데, IP는 일반 사용자가 쉽게 기억하기가 어려워 IP에 해당하는 별명같은 이름을 등록하여 관리하는 시스템을 말한다. 최근 들어 이러한 DNS를 악용하는 사례가 해외에서 늘고 있으며, 'DNS피오나지' 라고 불리는 배후 세력들이 새로운 룰과 악성코드를 개발하여 진화하고 있으며, 이런 공격은 해킹 성공률을 높이며, 가짜 사이트로 유도를 하는 등 데이터를 변경하거나 위조하고 있어 피해 사례가 증가되고 있는 상황이다. 글로벌 DNS 시스템 등 점점 통제를 할 수 없는 범위로 확대되고 있어, 이를 통제하기 위해 DNS피오나지 공격에 대한 분석과 대응책을 제시하여 안전한 DNS 시스템을 구축을 제안한다.

Keywords

References

  1. A. Liska & G. Stowe. (2016). DNS network security. DNS Security, 93-119. DOI : 10.1016/b978-0-12-803306-7.00006-1
  2. A. P. Siahaan. (2017). A Review of IP and MAC Address Filtering in Wireless Network Security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473. DOI : 10.31227/osf.io/g6emr
  3. A. Liska & G. Stowe. (2016). Anycast and other DNS protocols. DNS Security, 193-206. DOI : 10.1016/b978-0-12-803306-7.00011-5
  4. C. Sun, B. Liu & L. Shi. (2008). Efficient and Low-Cost Hardware Defense Against DNS Amplification Attacks. IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. (pp. 1-5). DOI : 10.1109/glocom.2008.ecp.397
  5. E. Al-Shaer. (2014). Modeling and Verification of Firewall and IPSec Policies Using Binary Decision Diagrams. Automated Firewall Analytics, 25-48. DOI : 10.1007/978-3-319-10371-6_2
  6. B. Wang, H. Chen & B. Zhang. (2013). Design and implementation of UDP-based terminal adaptive protocol. Journal of Computer Applications, 33(4), 943-946. DOI : 10.3724/sp.j.1087.2013.00943
  7. DNS and IPv6. (2005). Pro DNS and BIND, 77-92. DOI : 10.1007/978-1-4302-0050-5_5
  8. T. Kim & H. Ju. (2011). Effective DNS server fingerprinting method. 2011 13th Asia-Pacific Network Operations and Management Symposium. (pp. 1-4). IEEE. DOI : 10.1109/apnoms.2011.6076955
  9. Document management. Change management for successful electronic document management system (EDMS) implementation. (2011). DOI : 10.3403/30181562
  10. A. M. Lopes, J. P. Andrade & J. T. Machado. (2016). Multidimensional scaling analysis of virus diseases. Computer Methods and Programs in Biomedicine, 131, 97-110. DOI : 10.1016/j.cmpb.2016.03.029
  11. M. Chen, Y. Liu, Z. Li, J. Xiao & J. Chen. (2016). A low jitter supply regulated charge pump PLL with self-calibration. Journal of Semiconductors, 37(1), 015006. DOI : 10.1088/1674-4926/37/1/015006
  12. S. Hong. (2013). Countermeasure for Anti-financial hacking. Journal of Convergence for Information Technology, 3(1), 43-48.
  13. S. Hong & S. Y. Jeong. (2018). The Analysis of CCTV Hacking and Security Countermeasure Technologies : Survey. Journal of Convergence for Information Technology, 8(6), 129-134. DOI : 10.22156/CS4SMB.2018.8.6.129
  14. P. S. Shin & J. M. Kim. (2014). Security and Hacking on Wireless Networking for Small and Medium Business : Survey. Journal of Convergence for Information Technology, 4(3), 15-20. https://doi.org/10.22156/CS4SMB.2014.4.3.015
  15. J. K. Cho. (2019). Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement. Journal of Convergence for Information Technology, 9(3), 1-7. DOI : 10.22156/CS4SMB.2019.9.3.001
  16. M. Andrews & S. Weiler. (2006). The DNSSEC Lookaside Validation (DLV) DNS Resource Record. DOI : 10.17487/rfc4431
  17. A. Liska & G. Stowe. (2016). Windows DNS security. DNS Security, 139-158. DOI : 10.1016/b978-0-12-803306-7.00008-5