| Home  | About ScienceAsia  | Publication charge  | Advertise with us  | Subscription for printed version  | Contact us  
Editorial Board
Journal Policy
Instructions for Authors
Online submission
Author Login
Reviewer Login
Volume 50 Number 2
Volume 50 Number 1
Volume 49 Number 6
Volume 49 Number 5
Volume 49S Number 1
Volume 49 Number 4
Earlier issues
https://nagaempire7.xyz/ https://empire88t.com/ https://botak-empire5.com/ https://uncleempire19.xyz/ https://indobet11j.com/ https://mukapoker1.lol/ https://mukacasinoc.com/ https://138.197.6.28 https://138.68.168.98 https://152.42.182.182/ https://planetaryconquest.com/ https://internationalpeaceday.com/ https://weidenfeldlaw.com/ https://notariamc.com/ https://inetskate.com/ https://newdatingway.com/ https://korem083.tniad.mil.id/shop/slot-100-perak/ https://korem083.tniad.mil.id/product/slot-qris/ https://korem083.tniad.mil.id/store/bet-200-perak/ https://abkpmi.ac.id/wp-content/uploads/products/slot-qris-10k/
https://www.arabiaphone.com/ https://www.benchmarcsystems.com/ https://www.dndock.com/ https://www.virtuallytheoffice.com/ https://www.mikechomes.com/ https://www.studioelpizo.com/ https://www.musicrebellion.com/ https://www.patmcgann.com/ https://www.hotel-gufler.com/ https://www.aegeaneating.com/ https://www.peterclementbooks.com/ https://www.mahshidabbasi.com/ https://www.elizabethtoop.com/ https://www.stonedeadforever.com/ https://www.longislandsites.com/ https://www.stevenmaloff.com/ https://www.viananaturalhealing.com/ https://www.dascomputers.com/ https://www.systemf3.com/ https://www.visitguanacaste.com/ https://www.independentnepa.com/ https://www.theobooks.org/ https://www.charlieshd.com/ https://www.robertcatkinson.com/ https://www.lechevart.com/ https://www.conkerco.com/ https://www.postgal.com/ https://www.drharoldlong.com/ https://www.blackmenvent.com/ https://www.paranormalresearchonline.com/ http://www.joshkrischer.com/ https://www.riccmho.org/ https://www.iflorabella.com/ https://www.marcellatracco.com/ https://www.juliehutchinson.com/ https://www.fiestadocumentary.com/
Volume  Number 

previous article next article

Research articles

ScienceAsia (): 49-55 |doi: 10.2306/scienceasia1513-1874...049


Model checking the DNS under DNS cache-poisoning attacks using SPIN


Wei˙Zhanga,b,*, Meihong˙Yanga, Xinchang˙Zhanga, Huiling˙Shia

 
ABSTRACT:     Domain name system (DNS) security has garnered substantial interest due to DNS cache-poisoning attacks. In this article, a model checking method is employed to verify the security of the DNS protocol, especially when it is under DNS cache-poisoning attacks. The DNS protocol is first translated into a simpler model that preserves all the attack behaviour to be verified. Extended finite state machine models are given and represented in PROMELA which can be identified by SPIN; and then the whole process of model checking is proposed. The initial results on verification of the DNS under DNS cache-poisoning attacks using SPIN are also proposed. From the experimental results it can be seen that the security of DNS should be carefully considered.

Download PDF

48 Downloads 1684 Views


a Shandong˙Key˙Laboratory˙of˙Computer˙Networks, Shandong˙Computer˙Science˙Centre (National˙Supercomputer˙Centre˙in˙Jinan), Jinan˙250000, China
b College˙of˙Information˙Science˙and˙Engineering, Shandong˙University˙of˙Science˙and˙Technology, Qingdao˙266510, China

* Corresponding author, E-mail: wzhang@sdas.org

Received 31 Aug 2014, Accepted 20 Jul 2016