Understanding the security risks and censorship behaviors on the exploitation of domain names

Author(s)Jin, Lin
Date Accessioned2021-12-07T13:52:18Z
Date Available2021-12-07T13:52:18Z
Publication Date2021
SWORD Update2021-08-09T22:12:31Z
AbstractDomain names are the identification of Internet services and resources, which greatly facilitate human users to access the Internet. However, adversaries also leverage domain names to pinpoint their targets and conduct malicious activities. In this dissertation, we study the security risks and censorship behaviors on the exploitation of domain names through large-scale measurements. ☐ First, we explore the security risks on the adoption of the DDoS Protection Service (DPS) through DNS resolution. The increasing prevalence of DDoS attacks on the Internet has led to the wide adoption of DPS. A DPS works by hiding the IP address of an origin server and rerouting the traffic to the DPS provider’s distributed infrastructure, where malicious traffic can be blocked. However, an exposed origin IP address nullifies the protection from DPS as adversaries can launch the DDoS attacks directly to the origin server. To investigate the problem of origin exposures in DPS, we perform a measurement study on the usage dynamics of DPS customers and reveal a new vulnerability, called residual resolution, by which a DPS provider may leak origin IP addresses when its customers terminate the service or switch to other platforms, resulting in the failure of protection from future DPS providers. ☐ Then, we evaluate the impact of the encrypted DNS on Internet censorship. Encrypted DNS protocols have been used to mitigate the problem of DNS privacy leakage and DNS manipulation. Existing studies have investigated the privacy benefits of encrypted DNS communications, yet little has been done from the perspective of censorship. Therefore, we study the impact of the encrypted DNS on Internet censorship in two aspects. On one hand, we explore the severity of DNS manipulation, which could be leveraged for Internet censorship, given the use of encrypted DNS resolvers. On the other hand, we evaluate the effectiveness of using encrypted DNS resolvers for censorship circumvention. ☐ Finally, we investigate the domain-name-based censorship on DNS, HTTP, and HTTPS through accurate and end-to-end measurements. It is challenging to conduct a large-scale censorship measurement, as it involves triggering censors through artificial requests and identifying abnormalities from corresponding responses. To achieve our goal, we propose a novel framework called Disguiser. The core of Disguiser is a control server that replies with a static payload to provide the ground truth of server responses. As such, we send requests from various types of vantage points across the world to our control server, and the censorship activities can be recognized if a vantage point receives a different response. In addition, we perform application traceroute towards our control server to explore censors’ behaviors and their deployment.en_US
AdvisorCotton, Chase
DegreePh.D.
DepartmentUniversity of Delaware, Department of Electrical and Computer Engineering
DOIhttps://doi.org/10.58088/1ssd-4r91
Unique Identifier1287762695
URLhttps://udspace.udel.edu/handle/19716/29517
Languageen
PublisherUniversity of Delawareen_US
URIhttps://login.udel.idm.oclc.org/login?url=https://www.proquest.com/dissertations-theses/understanding-security-risks-censorship-behaviors/docview/2572599946/se-2?accountid=10457
KeywordsSecurity risksen_US
KeywordsCensorship behaviorsen_US
KeywordsExploitationen_US
KeywordsDomain namesen_US
TitleUnderstanding the security risks and censorship behaviors on the exploitation of domain namesen_US
TypeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Jin_udel_0060D_14564.pdf
Size:
2.69 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description: