DNS Under Siege: Ethical DNS Spoofing and Countermeasures

Abstract

The Domain Name System (DNS) is a crucial part of the internet, responsible for converting human-readable domain names into numerical IP addresses that computers use to communicate. However, DNS is vulnerable to spoofing attacks, where attackers manipulate DNS responses to redirect users to fake websites. These attacks can lead to data theft, phishing, malware infections, and unauthorized access to sensitive information. Despite existing security measures, DNS spoofing remains a serious cybersecurity threat due to weaknesses in the traditional DNS protocol. The implementation of this framework is detailed step by step, including the use of tools such as tcpdump, Wireshark, Zeek, Suricata, Scapy, and Ettercap for monitoring and testing. The proposed system is evaluated based on key security metrics, including the attack success rate, anomaly detection accuracy, and performance impact. Our results show that this framework significantly reduces the success rate of DNS spoofing attacks by 90%, achieves 95% accuracy in detecting threats, and maintains a minimal increase in DNS resolution time.

Country : India

1 Hanudeep Gattu2 Joshnitha Karimireddy3 Kanishka G

  1. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India
  2. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India
  3. Assistant Professor, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 250-254

doi.org/10.47001/IRJIET/2025.INSPIRE40

References

  1. Mockapetris, P. (1987). "Domain Names – Concepts and Facilities." Internet Engineering Task Force (IETF), RFC 1034.
  2. Mockapetris, P. (1987). "Domain Names - Implementation and Specification." Internet Engineering Task Force (IETF), RFC 1035.
  3. Rajpal, V., Alam, S., & Rathore, V. S. (2022). "Detection of DNS Cache Poisoning Attacks Using Machine Learning Models." International Journal of Computer Networks and Applications (IJCNA).
  4. Al-Musawi, F., & Al-Ani, F. (2020). "Enhancing DNS Security with DNSSEC and Machine Learning Techniques." Journal of Information Security Research, 11(4), 185-192.
  5. Herzberg, A., & Shulman, H. (2013). "DNSSEC: Security and Performance Challenges." IEEE Communications Surveys & Tutorials, 15(4), 2030–2051.
  6. Schmidt, J., Wählisch, M., Hohlfeld, O., & Dietzel, S. (2021). "Analyzing the Adoption of DNS-over-HTTPS and Its Impact on Privacy." Proceedings of the ACM Internet Measurement Conference (IMC), 125-137.
  7. Bawa, S., & Chhabra, S. (2018). "Performance Analysis of DNS-over-TLS for DNS Spoofing Prevention." International Journal of Computer Applications, 180(2), 1-7.
  8. Huang, S., Feamster, N., & Teixeira, R. (2020). "Anomaly Detection Using Machine Learning in DNS Traffic: A Case Study." Proceedings of the ACM SIGCOMM Workshop on Network Traffic Analysis, 10-18.
  9. Pappas, V., Massey, D., & Zhang, L. (2007). "Improving DNS Service Availability through Advanced Monitoring and Analysis." Proceedings of the IEEE INFOCOM Conference on Computer Communications, 22(3), 79-89.
  10. Aryan, S., Arya, M., & Kesharwani, R. (2022). "Real-Time DNS Spoofing Detection Using Deep Learning Models." Journal of Cybersecurity Advances, 4(2), 55-66. DOI: 10.1007/jca.2022.455.
  11. Kumar, P., & Gupta, N. (2019). "Sandboxed Ethical Spoofing Framework for DNS Security Enhancement." International Journal of Network Security, 21(6), 435-442.