About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
phat 22(4): e3

Research Article

Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography

Download444 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eetpht.v8i4.3081,
        author={Sabitha Banu. A. and Dr. G. Padmavathi},
        title={Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology},
        volume={8},
        number={4},
        publisher={EAI},
        journal_a={PHAT},
        year={2022},
        month={8},
        keywords={Domain Name Service(DNS), Man in the Middle attack(MITM), DNS MITM attack, Firefly algorithm, Elliptical Curve Cryptography(ECC)},
        doi={10.4108/eetpht.v8i4.3081}
    }
    
  • Sabitha Banu. A.
    Dr. G. Padmavathi
    Year: 2022
    Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography
    PHAT
    EAI
    DOI: 10.4108/eetpht.v8i4.3081
Sabitha Banu. A.1,*, Dr. G. Padmavathi1
  • 1: Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, India
*Contact email: sabithabanu_cs@yahoo.com

Abstract

A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS is a database used by millions ofcomputers to determine which address best answers a user’s query. DNS is an unencrypted protocol that may be exploited in numerous ways. The mostpopular DNS MITM attack uses DNS poisoning to intercept communications and fake them. DNS servers do not verify the IP addresses they forwardtraffic to. In DNS attacks, the attacker either targets the domain name servers or attempts to exploit system weaknesses. The Proposed FFOBLA-ECC model detects the DNS Spoofed nodes in a wireless network using the optimized firefly boosted LSTM with the help of TTL and RTR parametersreceived from the simulation environment and provides authentication between the nodes in order to mitigate it using the Elliptical curve cryptography. The proposed model results are different from the other methods and yield highly accurate results beyond 98% compared with the existing RF, ARF, and KNN methods.

Keywords
Domain Name Service(DNS), Man in the Middle attack(MITM), DNS MITM attack, Firefly algorithm, Elliptical Curve Cryptography(ECC)
Received
2022-03-29
Accepted
2022-08-16
Published
2022-08-25
Publisher
EAI
http://dx.doi.org/10.4108/eetpht.v8i4.3081

Copyright © 2022 Sabitha Banu A. et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the originalwork is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL