Protecting Browsers from DNS Rebinding Attacks

被引:28
作者
Jackson, Collin [1 ]
Barth, Adam [1 ]
Bortz, Andrew [1 ]
Shao, Weidong [1 ]
Boneh, Dan [1 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
关键词
Security; Design; Experimentation; Same-origin policy; DNS; firewall; spam; click fraud;
D O I
10.1145/1462148.1462150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS rebinding attacks subvert the same-origin policy of browsers, converting them into open network proxies. Using DNS rebinding, an attacker can circumvent organizational and personal firewalls, send spam email, and defraud pay-per-click advertisers. We evaluate the cost effectiveness of mounting DNS rebinding attacks, finding that an attacker requires less than $ 100 to hijack 100,000 IP addresses. We analyze defenses to DNS rebinding attacks, including improvements to the classic "DNS pinning," and recommend changes to browser plug-ins, firewalls, and Web servers. Our defenses have been adopted by plug-in vendors and by a number of open-source firewall implementations.
引用
收藏
页数:26
相关论文
共 58 条
[31]  
Klein Amit., 2006, HOST HEADER CANNOT B
[32]  
LAM VT, 2006, P ACM C COMP COMM SE
[33]  
MAONE G, 2007, NOSCRIPT
[34]  
MAONE G, 2007, DNS SPOOFING PINNING
[35]  
MEGACZ A, 2003, X REQUESTORIGIN
[36]  
MEGACZ A, 2002, XWT FDN SECURITY ADV
[37]  
MEYER D, 1998, 2365 IETF RFC
[38]  
*MICR, 2004, MICR WEB ENT PORT
[39]  
*MICR, 2008, SOCK CLASS SYST NET
[40]  
*MITRE, 2007, CVE20075275 MITRE