Presentation 2013-11-12
On the Risk of DNS Cache Vulnerability "Ghost Domain Name"
Hiroaki KIKUCHI, Tomohiro ARIMIZU,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We study the vulnerability in domain name system, so called as "Ghost domain names" , which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Domain Name System / Ghost Domain Names / Vulnerability
Paper # ICSS2013-58
Date of Issue

Conference Information
Committee ICSS
Conference Date 2013/11/5(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) On the Risk of DNS Cache Vulnerability "Ghost Domain Name"
Sub Title (in English)
Keyword(1) Domain Name System
Keyword(2) Ghost Domain Names
Keyword(3) Vulnerability
1st Author's Name Hiroaki KIKUCHI
1st Author's Affiliation School of Interdisciplinary Mathematical Sciences, Meiji University()
2nd Author's Name Tomohiro ARIMIZU
2nd Author's Affiliation Graduate School of Engineering, Tokai University
Date 2013-11-12
Paper # ICSS2013-58
Volume (vol) vol.113
Number (no) 288
Page pp.pp.-
#Pages 4
Date of Issue