Research Article
Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography
@ARTICLE{10.4108/eetpht.v8i4.3081, author={Sabitha Banu. A. and Dr. G. Padmavathi}, title={Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography}, journal={EAI Endorsed Transactions on Pervasive Health and Technology}, volume={8}, number={4}, publisher={EAI}, journal_a={PHAT}, year={2022}, month={8}, keywords={Domain Name Service(DNS), Man in the Middle attack(MITM), DNS MITM attack, Firefly algorithm, Elliptical Curve Cryptography(ECC)}, doi={10.4108/eetpht.v8i4.3081} }
- Sabitha Banu. A.
Dr. G. Padmavathi
Year: 2022
Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography
PHAT
EAI
DOI: 10.4108/eetpht.v8i4.3081
Abstract
A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS is a database used by millions ofcomputers to determine which address best answers a user’s query. DNS is an unencrypted protocol that may be exploited in numerous ways. The mostpopular DNS MITM attack uses DNS poisoning to intercept communications and fake them. DNS servers do not verify the IP addresses they forwardtraffic to. In DNS attacks, the attacker either targets the domain name servers or attempts to exploit system weaknesses. The Proposed FFOBLA-ECC model detects the DNS Spoofed nodes in a wireless network using the optimized firefly boosted LSTM with the help of TTL and RTR parametersreceived from the simulation environment and provides authentication between the nodes in order to mitigate it using the Elliptical curve cryptography. The proposed model results are different from the other methods and yield highly accurate results beyond 98% compared with the existing RF, ARF, and KNN methods.
Copyright © 2022 Sabitha Banu A. et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the originalwork is properly cited.