Question

In: Computer Science

4. DNS hijacking is a common technique that is used by censors (i.e., networks who perform...

4. DNS hijacking is a common technique that is used by censors (i.e., networks who perform censoring actions), where fake DNS responses can be injected. As a DNS request could traverse a number of routers along the path, each router along the path could inject a fake DNS response. In the paper “The Collateral Damage of Internet Censorship by DNS Injection”, authors use a technique similar to traceroute to identify the router that actually injects the fake DNS response. Authors deliberately decrease the TTL (time-to-live) value in the IP header to monitor ICMP packet and fake DNS response to decide the router that injects fake response. In this paper, DNS is built on UDP. However, DNS can also be built on top of TCP. This expands the attack surface for attackers. Specifically, the censors inject RST packets to both the client and the server in one TCP connection if a DNS query in this connection carries “sensitive” information. Different from UDP, TCP requires three-way handshake. Therefore, the packet that carries sensative information (e.g., a TCP-based DNS query) will be the packet that comes later than packets for three-way handshake. Let us make the following assumptions for this question 1. We assume that DNS over TCP is using a publicly-known port number. 2. Censors are stateless, which means that they will not consider whether a TCP packet belongs to an established connection. They make decision based on each individual packet instead of packets belonging to the same connection. In order to make the method discussed in “The Collateral Damage of Internet Censorship by DNS Injection” to be useful in this new setting, we need to make a few changes of this method. Question: Please verify whether each of the following changes is needed or not (1 Point). And please justify your answer (1 Points). a. When you select a target IP to send honey queries, this IP should never respond you with TCP RST packets if you send a TCP-based DNS query to this IP. b. When you send out a honey query (a TCP-based DNS query with a sensitive domain) to a target IP, you can directly send this TCP-based DNS query to this target IP without establishing a TCP connection with the target IP (i.e., through 3-way handshake). c. You should now expect RST packets from the censor rather than a forged DNS response.

Solutions

Expert Solution

the collateral damage of internet censorship by dns injection is the most popular approach involves packet injection.a censorship system observes dns requests and injects fake replies to block .first ,the dns server uses well known port 53 for all its udp activities and as its server port for tcp.it uses random port above 1023 for tcp requests.yes,dns over tcp and dns uses both tcp and udp for their reasons .dns uses tcp for zone transfer.services not intended for use by the public internet,such as most recursive name servers,should protected with ip.second,the censors are stateless,which means that they will not consider whether a tcp packet belongs to an established connection.they make decision based on each individual packet instead of packets belonging to the same connection.then the stateless firewalls also do not keep track of the status of the network as a whole or the connections made to it.packet injections popularity as a censorship mechanism arises from its ease of implementation.the censor needs to only monitor traffic and inject responses.the tcp 3 way handshake is a process which is used in a tcp/ip network to make a connection between the server and client.it is a three way step process that requires both the client and server to exchange synchronization and acknowledgement packets before the real data communication process starts. domain name server hijacking also named dns redirection is a type of dns attack in which dns queries are incorrectly resolved in order to unexpectedly redirect uusers to malicious sites.dns hijacking can be used for pharming.internet service providers also use a type of dns hijacking,to take over a users dns requests and it collect statistics and return it,whwn users access an unknown domain.route hijacking also called ip hijacking is the illegitimate takeover of groups of ip addresses by corrupting internet routing.a fake server set up by the attackers will send a fake ip and a couple of ways in which dns hijacking is used.we analyze the causes from the diversity of dns resolution paths,as well as the dynamic routing.we utilize the tool honey queries to detect affected paths.the target of the honey queries are specially selected destinations,which are hosts we knoe do not run an active server.normally no dns responses are expected for these honey queries.tcp rst packet is the remote side telling you that the connection on which previous tcp packet is sent is not recognized,may be the connection has closed,maybe the port is not open,and somethinglike these.tcp rst means that connection is not valid that is there is no associated session at remote side.yes,i expect rst packets from the censor rather than a forged dns response.


Related Solutions

The most common experimental technique to perform elemental analysis is combustion analysis, where a sample is...
The most common experimental technique to perform elemental analysis is combustion analysis, where a sample is burned in a large excess of oxygen and the combustion products are trapped in a variety of ways. A 99.99% pure, 0.4831 g sample containing only carbon, hydrogen, and nitrogen is subjected to combustion analysis, resulting in the formation of 1.353 g CO2, 0.2750 g H2O, and 0.1833 g NO. What is the empirical formula of the sample?
Question 4: The three major types of Backbone Networks are based on the devices used. In...
Question 4: The three major types of Backbone Networks are based on the devices used. In practice, it is most common to use a combination of these architectures. In your opinion what best practices do you recommend in the following? (a) Architectures. (b) Technologies. ( 10 Marks) (c) Implications for management ( 6 Marks) TOTAL
What is a common attack technique used against ARP to send traffic to wrong destination? Question...
What is a common attack technique used against ARP to send traffic to wrong destination? Question 8 options: ARP timeout None of these Static ARP entries ARP reply What is the behavior of the firewall in a situation when there are multiple eligible routing table rules for the packet source and destination? Question 10 options: DROP packet ALLOW packet Depend on last rule executed Depends on first rule executed List all the open Firewall ports for this IP address 162.241.253.120....
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on...
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on all new blocks B. Hashing/fingerprinting C. Encryption D. Storing all blocks in an content addressable object store (2) Which of the following describes sub-LUN auto-tiering? A. Placing data on tiers depending on its access pattern B. Placing data on different tiers of storage based on when the blocks were written C. Placing data on tiers of storage based on the LUN name D. Placing...
Think about a common strategy used to address a clinical condition (i.e. counseling services for weight...
Think about a common strategy used to address a clinical condition (i.e. counseling services for weight loss). What key components of the Integrated Behavioral Model and/or Transtheoretical Model are used in the strategy to effect positive behavior change? Be sure to discuss at least two components and give specific examples. Does the strategy promote self-efficacy? Why or why not? In you reply posts, offer additional components to your classmates' topic of issue or compare/contrast with a strategy used for your...
Perform a common analysis used to compare means for Exam Anxiety in students: Once you have...
Perform a common analysis used to compare means for Exam Anxiety in students: Once you have retrieved your data set, go to Analyze, then Compare Means, then Independent Samples t-test. Conduct a compare means analysis using an independent samples t-test in SPSS. The grouping variable for Exam Anxiety in students will be gender, grouped as (1, 2).
4.Which utilities can be used to perform remote management of servers? 5. What is the difference...
4.Which utilities can be used to perform remote management of servers? 5. What is the difference between the ifconfig and ifconfig commands? 6. Why should you use SSH over Telnet?
4. Common resources and the tragedy of the commons Rajiv, Yakov, and Charles are lumberjacks who...
4. Common resources and the tragedy of the commons Rajiv, Yakov, and Charles are lumberjacks who live next to a forest that is open to logging; in other words, anyone is free to use the forest for logging. Assume that these men are the only three lumberjacks who log in this forest and that the forest is large enough for all three lumberjacks to log intensively at the same time. Each year, the lumberjacks choose independently how many acres of...
4. How has collagen been used in cosmetics and why is it not common in recent...
4. How has collagen been used in cosmetics and why is it not common in recent years 5. What are the alternative to collagen injections 6. How is collagen used to prepare artificial skin for burn patients 7. Write the structures of two unusual hyroxylated amino acids that are present in collagen and why are they important component of its structure 8. What is scurry and why is it caused?
4. The National Assessment of Education Progress (NAEP) tested a sample of students who had used...
4. The National Assessment of Education Progress (NAEP) tested a sample of students who had used a computer in their mathematics classes and another sample of students who had not used a computer. The sample mean score for students using the computer was 309 with a sample standard deviation 29. For students not using computer, the sample mean was 303 and sample standard deviation was 32. Assume there were 60 students in the computer sample and 40 students in the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT