DNS Advanced Attacks and Analysis
DNS Advanced Attacks and Analysis
DNS Advanced Attacks and Analysis
adamhudaib@gmail.com
Poland
israa_hudieb@eng.hu.edu.jo
Abstract
Nowadays DNS is used to load balance, failover, and geographically redirect connections. DNS
has become so pervasive it is hard to identify a modern TCP/IP connection that does not use
DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based
design of DNS, most IT professionals don't spend much time worrying about it. If DNS is
maliciously attacked altering the addresses it gives out or taken offline the damage will be
enormous. Whether conducted for political motives, financial gain, or just the notoriety of the
attacker, the damage from a DNS attack can be devastating for the target.
In this research we will review different DNS advanced attacks and analyze them. We will survey
some of the most DNS vulnerabilities and ways of DNS attacks protection.
Keywords: DNS, DoS, Cache Poisoning, DNSSEC, DNS Hijacking.
1. INTRODUCTION
Denial of Service (DoS) attacks can be classified into two major categories. In the first one, the
adversary featly crafts packets trying to exploit vulnerabilities in the implemented software(service
or protocol) at the target side. This class of attacks includes outbreaks like the ping of death[1].
In the second one, the aggressor attempts to overwhelm critical systems resources, i.e. memory,
CPU, network bandwidth by creating numerous of well-formed but bogus requests. This type of
attack is also well known as flooding. DoS attacks are a threat to almost every service in the
Internet and DNS is no exception. These attacks against or related to DNS servers are also
classified into two types. One is to directly flood DNS servers by sending a large number of DNS
requests or other useless traffic.
Since the DNS servers cannot easily distinguish the legitimate requests from the attack traffic,
they would simply accept both of them and send the responses [2]. The effective and deployable
defense against this attack is to over-provision the network capacity and numbers of servers
[3].The other attack strategy is to exploit DNS servers to amplify attack traffic. The attacker
craftsa DNS request that gets a response significantly larger than the request itself, e.g., a 50byterequest for a 500-byte response. The amplified response is replied to a spoofed third-party
victim machine. Under this attack, both the amplifying DNS servers upstream bandwidth and
the third-party machines downstream bandwidth could be exhausted. Due to traffic amplification,
an attacker can exhaust the bandwidth of its victims even if his bandwidth is 10 times smaller
[4].An effective defense against spoofing-based DoS attacks on DNS servers requires source
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
63
address spoof detection. Assuming a DNS server can distinguish between spoofed requests from
real ones, it can selectively drop those spoofed ones with little collateral damage.
In this paper, we analyze different types of the DNS amplification attacks and ways of protection.
DNS is responsible for locating services like DC, etc. for authenticating the services on the
network There are the essential functions of a DNS:
It is responsible for locating resources like Web Servers, Mail servers, etc. on the network.
And obviously, translating Computer names to IP and vice versa.
2.
Denial of Service Attacks Denial of Service (DoS) or Distributed Denial of Service Attacks
(DDoS) are done to make your DNS service unavailable and thus create the impression
your business is offline or closed down (website, portals, VPNs, FTP, VoIP, email, etc.).
This type of attack is one of the easiest to perform and can be one of the hardest to defend
against. One of the least recognized impacts to a business that suffers a DNS outage from
a DDoS attack is the negative effect it has on your search engine rankings.
3.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
64
Denial of Service.
a. Harm and block DNS traffic.
DNS is an effective DOS attack vector for a few reasons: DNS usually uses the UDP as its
transport; most of autonomous systems allow source-spoofed packets to enter their
network; there is a lot of Open DNS Resolvers on the Internet.
The attack overloads the system by using: DNS reflectors, amplification, botnet; DDOS,
recursive malformed requests, impersonation
2.
Data Modification.
a. Query/Request Redirection.
b. DNS cache poisoning.
c. DNS ID hacking.
Query/Request redirection uses man-in-the-middle position, breaks of the chain of trust.
DNS spoofing forges a fake answer. DNS ID hacking succeeds in impersonating a DNS
server. DNS cache poisoning sends user to malicious site.
3.
Zone Enumeration.
Not really considered as an attack. Most considered as a threat as it allows attackers to
gather information Precedes an attempt at an attack.
4.
Tunnels.
Uses DNS TCP transport mechanism. DNS TCP is used for: failover transport: switch from
UDP to TCP; secondary zone transfer; DNSSEC and IPv6 traffic; EDNS is often badly
supported by customer network.
Attacks use TCP channel to tunnel other protocol and run malicious software [9].
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
65
"Many cache poisoning attacks leverage the recursive feature in order to poison the system. So
by limiting recursion to only your internal systems, you limit your exposure. While this setting will
not resolve all possible cache poisoning attack vectors, it will help you mitigate a good portion of
them," Chris Brenton, Dyn Inc.'s Director of Security [10].
The second type of DNS attack happens when attackers take over one or more authoritative DNS
servers for a domain. In 2009, Twitter suffered a separate attack by the Iranian Cyber Army. The
group altered DNS records and redirected traffic to propaganda hosted on servers they
controlled. The ability to alter DNS settings came after the Iranian Cyber Army compromised a
Twitter staffer's email account, and then used that account to authorize DNS changes. During
that incident Dyn Inc. was the registrar contacted in order to process the change request.
Defense against these types of attacks often include strong passwords, and IP-based ACLs
(acceptable client lists). Further, a solid training program that deals with social engineering will
also be effective. Unfortunately, all the time and resources in the world can be placed into
securing a webserver, but if an attacker can attack the authoritative server and point the DNS
records at a different IP address, to the rest of the world its still going to look like you've been
owned. In fact it's worse because that one attack will also permit them to redirect your email or
any other service you are offering. So hosting your authoritative server with a trusted authority is
the simplest way to resolve this problem.
The third type of DNS attack is also the most problematic to undo. It happens when an attacker
compromised the registration of the domain itself, and then uses that access to alter the DNS
servers assigned to it.
"At this time, those authoritative nameservers answered all queries for the affected domains.
What makes this attack so dangerous is whats called the TTL (time to live). Changes of this
nature are globally cached on recursive DNS servers for typically 86,400 seconds, or a full day.
Unless operators are able to purge caches, it can take an entire day (sometimes longer) for the
effects to be reversed," von Wallenstein wrote. The main advice for authoritative DNS is to host
authoritative servers within the organization, allowing for complete control [11].
2.3 Amplification Attacks
The amplification attacks are some of the largest, as measured by the number of Gigabits per
second (Gbps). That size of an attack is enough to cripple even a large web host. Even from a
cost perspective, the attack doesn't end up adding to our bandwidth bill because of the way in
which we're charged for wholesale bandwidth.
DNS Amplification Attacks are a way for an attacker to magnify the amount of bandwidth they can
target at a potential victim. Imagine you are an attacker and you control a botnet capable of
sending out 100Mbps of traffic. While that may be sufficient to knock some sites offline, it is a
relatively trivial amount of traffic in the world of DDoS. In order to increase your attack's volume,
you could try and add more compromised machines to your botnet. That is becoming increasingly
difficult. Alternatively, you could find a way to amplify your 100Mbps into something much bigger
[12].
The original amplification attack was known as a SMURF attack. A SMURF attack involves an
attacker sending ICMP requests (i.e., ping requests) to the network's broadcast address (i.e.,
X.X.X.255) of a router configured to relay ICMP to all devices behind the router. The attacker
spoofs the source of the ICMP request to be the IP address of the intended victim. Since ICMP
does not include a handshake, the destination has no way of verifying if the source IP is
legitimate. The router receives the request and passes it on to all the devices that sit behind it. All
those devices then respond back to the ping. The attacker is able to amplify the attack by a
multiple of how ever many devices are behind the router (i.e., if you have 5 devices behind the
router then the attacker is able to amplify the attack 5x, see the figure 1below).
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
66
SMURF attacks are largely a thing of the past. For the most part, network operators have
configured their routers to not relay ICMP requests sent to a network's broadcast address.
However, even as that amplification attack vector has closed, others remain wide open [13].
There are two criteria for a good amplification attack vector: 1) query can be set with a spoofed
source address (e.g., via a protocol like ICMP or UDP that does not require a handshake); and 2)
the response to the query is significantly larger than the query itself. DNS is a core, ubiquitous
Internet platform that meets these criteria and therefore has become the largest source of
amplification attacks.
DNS queries are typically transmitted over UDP, meaning that, like ICMP queries used in a
SMURF attack, they are fire and forget. As a result, their source attribute can be spoofed and the
receiver has no way of determining its veracity before responding. DNS also is capable of
generating a much larger response than query.
The key term that I used a couple times so far is "open DNS resolver." The best practice, if you're
running a recursive DNS resolver is to ensure that it only responds to queries from authorized
clients. In other words, if you're running a recursive DNS server for your company and your
company's IP space is 5.5.5.0/24 (i.e., 5.5.5.0 - 5.5.5.255) then it should only respond to queries
from that range. If a query arrives from 9.9.9.9 then it should not respond.
The problem is, many people running DNS resolvers leave them open and willing to respond to
any IP address that queries them. This is a known problem that is at least 10 years old. What has
happened recently is a number of distinct botnets appear to have enumerated the Internet's IP
space in order to discover open resolvers. Once discovered, they can be used to launch
significant DNS Amplification Attacks.
Nowadays there's been an increase in big DDoS attacks. It's in large part because the network
operators listed above have continued to allow open resolvers to run on their networks and the
attackers have begun abusing them.
2.4 DNS Hijacking
DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name
System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
67
configuration to point at a rogue DNS server under the control of an attacker, or through
modifying the behavior of a trusted DNS server so that it does not comply with internet standards.
These modifications may be made for malicious purposes such as phishing, or for self-serving
purposes by Internet service providers (ISPs) to direct users' web traffic to the ISP's own web
servers where advertisements can be served, statistics collected, or other purposes of the ISP;
and by DNS service providers to block access to selected domains as a form of censorship [14].
A number of consumer ISPs such as Cablevision's Optimum Online, Comcast, Time Warner, Cox
Communications, RCN, Rogers, Charter Communications, Verizon, Virgin Media, Frontier
Communications, Bell Sympatico, UPC, T-Online, Optus, Mediacom, ONO, TalkTalk and Bigpond
(Telstra) use DNS hijacking for their own purposes, such as displaying advertisements or
collecting statistics. This practice violates the RFC standard for DNS (NXDOMAIN) responses
and can potentially open users to cross-site scripting attacks.
The concern with DNS hijacking involves this hijacking of the NXDOMAIN response. Internet and
intranet applications rely on the NXDOMAIN response to describe the condition where the DNS
has no entry for the specified host. If one were to query the invalid domain name
(fakeexample.com), one should get an NXDOMAIN response - informing the application that the
name is invalid and taking the appropriate action (for example, displaying an error or not
attempting to connect to the server). However, if the domain name is queried on one of these
non-compliant ISPs, one would always receive a fake IP address belonging to the ISP. In a web
browser, this behavior can be annoying or offensive as connections to this IP address display the
ISP redirect page of the provider, sometimes with advertising, instead of a proper error message.
However, other applications that rely on the NXDOMAIN error will instead attempt to initiate
connections to this spoofed IP address, potentially exposing sensitive information.
Examples of functionality that breaks when an ISP hijacks DNS:
Roaming laptops that are members of a Windows Server domain will falsely be led to
believe that they are back on a corporate network because resources such as domain
controllers, email servers and other infrastructure will appear to be available. Applications
will therefore attempt to initiate connections to these corporate servers, but fail, resulting in
degraded performance, unnecessary traffic on the internet connection and timeouts.
Many small office and home networks do not have their own DNS server, relying instead
on broadcast name resolution. Many versions of Microsoft Windows default to prioritizing
DNS name resolution above NetBIOS name resolution broadcasts; therefore, when an ISP
DNS server returns a (technically valid) IP address for the name of the desired computer
on the LAN, the connecting computer uses this incorrect IP address and inevitably fails to
connect to the desired computer on the LAN. Workarounds include using the correct IP
address instead of the computer name, or the DhcpNodeType registry value to change
name resolution service ordering.
Browsers such as Firefox no longer have their 'Browse By Name' functionality (Where
keywords typed in the address bar take you to the closest matching site.).
The local DNS client built into modern operating systems will cache results of DNS
searches for performance reasons. If a client switches between a home network and a
VPN, false entries may remain cached, thereby creating a service outage on the VPN
connection.DNSBL anti-spam solutions rely on DNS; false DNS results therefore interfere
with their operation [15].
Confidential user data might be leaked by applications that are tricked by the ISP into
believing that the servers they wish to connect to are available.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
68
User choice over which search engine to consult in the event of a URL being mistyped in a
browser is removed as the ISP determines what search results are displayed to the user;
functionality of applications like the Google Toolbar do not work correctly.
Computers configured to use a split tunnel with a VPN connection will stop working
because intranet names that should not be resolved outside the tunnel over the public
Internet will start resolving to fictitious addresses, instead of resolving correctly over the
VPN tunnel on a private DNS server when an NXDOMAIN response is received from the
Internet. For example, a mail client attempting to resolve the DNS A record for an internal
mail server may receive a false DNS response that directed it to a paid-results web server,
with messages queued for delivery for days while retransmission was attempted in vain.
It breaks Web Proxy Autodiscovery Protocol (WPAD) by leading web browsers to believe
incorrectly that the ISP has a proxy server configured.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
69
Denial-of-service attacks can also lead to problems in the network 'branches' around the actual
computer being attacked. For example, the bandwidth of a router between the Internet and a LAN
may be consumed by an attack, compromising not only the intended computer, but also the entire
network or other computers on the LAN.
If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet
connectivity can be compromised without the attacker's knowledge or intent by incorrectly
configured or flimsy network infrastructure equipment.
A denial-of-service attack is characterized by an explicit attempt by attackers to prevent legitimate
users of a service from using that service. There are two general forms of DoS attacks: those that
crash services and those that flood services [18].
A DoS attack can be perpetrated in a number of ways. Attacks can fundamentally be classified
into five families:
1.
2.
3.
4.
5.
Max out the processor's usage, preventing any work from occurring.
Trigger errors in the microcode of the machine.
Trigger errors in the sequencing of instructions, so as to force the computer into an
unstable state or lock-up.
Exploit errors in the operating system, causing resource starvation and/or thrashing, i.e.
to use up all available facilities so no real work can be accomplished or it can crash the
system itself
Crash the operating system itself.
In most cases DoS attacks involve forging of IP sender addresses (IP address spoofing) so that
the location of the attacking machines cannot easily be identified and to prevent filtering of the
packets based on the source address.
A Distributed Denial of Service Attack (DDoS) occurs when multiple systems flood the bandwidth
or resources of a targeted system, usually one or more web servers. This is the result of multiple
compromised systems (for example a botnet) flooding the targeted system with traffic. When a
server is overloaded with connections, new connections can no longer be accepted. The major
advantages to an attacker of using a distributed denial-of-service attack are that multiple
machines can generate more attack traffic than one machine, multiple attack machines are
harder to turn off than one attack machine, and that the behavior of each attack machine can be
stealthier, making it harder to track and shut down. These attacker advantages cause challenges
for defense mechanisms. For example, merely purchasing more incoming bandwidth than the
current volume of the attack might not help, because the attacker might be able to simply add
more attack machines.
Malware can carry DDoS attack mechanisms; one of the better-known examples of this was
MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
70
involved hardcoding the target IP address prior to release of the malware and no further
interaction was necessary to launch the attack.
A system may also be compromised with a trojan, allowing the attacker to download a zombie
agent, or the trojan may contain one. Attackers can also break into systems using automated
tools that exploit flaws in programs that listen for connections from remote hosts. This scenario
primarily concerns systems acting as servers on the web. Stacheldraht is a classic example of a
DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to
handlers, which are compromised systems that issue commands to the zombie agents, which in
turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using
automated routines to exploit vulnerabilities in programs that accept remote connections running
on the targeted remote hosts. Each handler can control up to a thousand agents. In some cases
a machine may become part of a DDoS attack with the owner's consent, for example, in
Operation Payback, organized by the group Anonymous [19].
These collections of systems compromisers are known as botnets. DDoS tools like Stacheldraht
still use classic DoS attack methods centered on IP spoofing and amplification like smurf attacks
and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also
known as resource starvation attacks) may also be used. Newer tools can use DNS servers for
DoS purposes. Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP
address. Script kiddies use them to deny the availability of well known websites to legitimate
users. More sophisticated attackers use DDoS tools for the purposes of extortion even against
their business rivals.
Simple attacks such as SYN floods may appear with a wide range of source IP addresses, giving
the appearance of a well distributed DoS. These flood attacks do not require completion of the
TCP three way handshake and attempt to exhaust the destination SYN queue or the server
bandwidth. Because the source IP addresses can be trivially spoofed, an attack could come from
a limited set of sources, or may even originate from a single host. Stack enhancements such as
syn cookies may be effective mitigation against SYN queue flooding, however complete
bandwidth exhaustion may require involvement [20].
If an attacker mounts an attack from a single host it would be classified as a DoS attack. In fact,
any attack against availability would be classed as a Denial of Service attack. On the other hand,
if an attacker uses many systems to simultaneously launch attacks against a remote host, this
would be classified as a DDoS attack.
2.6 Prevention of The Attacks
There are some ways of DNS attacks prevention.
1. Usage of the best practices configurations.
a. Run software in secure environment.
b. Identify data flow.
c. ACLs.
d. Stealth Architecture.
2. Enabling DNSSEC.
3. Monitoring DNS Traffic.
a. Short term analysis (peak detection).
b. Long term analysis (abnormal behavior).
By server secure environment is meant: running up-to-date software version; checking that the
operating system is also having all security fixes; efficient IP comes into an appliance format with
a single upgrade process that updates: operating system, services, software.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
71
Also you must identify data flow; run caching, resolver, authoritative server. You should separate
the functions as possible and disable unwanted features It will help into preventing attacks. A
public authoritative server should never be recursive [21].
Access control list is very important too.
ACLs are used to control what information will be published. With data flow identification, you can
choose who will be able to:
There are library of SmartArchitecture DNS templates. One of them is DNS Stealth: State of the
Art Internet DNS architecture (see the figure 2).
DNSSEC is used to protect against query/request redirection. DNSSEC creates a chain of trust
between the client and the authoritative server. Based on key exchange inside specific signed
resource records.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
72
known IP ranges, utilize strong password controls, and whenever possible use two factor
authentication.
Activate DNSSEC On Your Domain Names DNSSEC counters cache poisoning attacks by
verifying the authenticity of responses received from name servers. It effectively prevents
responses from being tampered with, because in practice, signatures are almost impossible to
forge without access to the private keys.
Continuously Monitor Your Critical Services & DNS Records Utilize an advanced SIEM like the
one available from Savanture to monitor all of critical services and monitor your DNS records for
changes from outside your network. UltraTools.com provides a free DNS monitoring service that
many top organizations use. Additionally, monitoring the activity level on your services can show
when traffic suddenly gets directed away.
Promote The Use of Protected Recursive DNS Servers Usage of one of the top Recursive DNS
providers for network. Many times there is no cost to this, only a configuration change [23].
Protect DNS Service Against DDoS Attacks Usafe of one of the top Authoritative DNS providers
that provides DDoS protection for DNS service. For public facing services that require DDoS
protection, lower your DNS Time to Live (TTLs) settings to 300 (5min) so it can redirect traffic
quickly if you come under attack and need protection.
3. CONCLUSIONS
We presented our analysis for DNS attacks. We found serious logic flaws in advanced attacks
mechanisms. We discussed the weaknesses in the DNS systems and ways of its protection.
Much of the Internets DNS infrastructure remains open and unprotectedcharacterized by a lack
of dedicated security personnel, poor traffic visibility and unrestricted access to DNS recursors.
Yet security threats against DNS infrastructure are seriousand growing.
We believe that our study takes some steps in the security problem space that DNS infrastructure
has brought. We believe that our study brings some new chain of trust between the client and the
authoritative server in DNS security. In future work we are considering the security challenges
that come with other advanced DNS attacks. Fundamentally, we believe that vulnerabilities of
DNS demands new research efforts on ensuring the security quality of the systems.
4. REFERENCES
[1]
[2]
Sun Changhua, Liu Bin, Shi Lei. Efficient and low-cost hardware defense against DNS
amplification attacks. IEEE Global Telecommunications Conference, GLOBECOM 2008
[May, 2008].
[3]
[4]
Guo Fanglu, Chen Jiawu, Chiueh Tzi-Cker, Spoof detection for preventing DoS attacks
against DNS servers, 26th IEEE International Conference on Distributed Computing
Systems, ICDCS [Feb, 2006].
[5]
Kambourakis G., Moschos T., Geneiatakis D., Gritzalis S, Detecting DNS Amplification
Attacks, Critical Information Infrastructures Security, v(5141), pp. 185 196.
[6]
Bau J., Mitchell J., A security evaluation of DNSSEC with NSEC3, Citeseer [May, 2010].
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
73
[7]
Li Wei-min, Chen Lu-ying, Lei Zhen-ming, Alleviating the impact of DNS DDoS attacks ,
Proceedings of the 2010 2nd International Conference on Networks Security, Wireless
Communications and Trusted Computing (NSWCTC 2010), pp. 240-243 [Dec, 2010].
[8]
Scalzo F, Recent DNS Reflector Attacks Verisign. Internet: http://www.nanog.org/mtg0606/pdf/frank-scalzo.pdf [Dec, 2006].
[9]
Sen J, A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web
Servers, Arxiv preprint arXiv: 1103.3333 [Jul, 2011].
[10]
[11]
The Measurement Factory, Domain name servers: pervasive and critical, yet often
overlooked, The Measurement Factory DNS Survey. Internet: http://dns.measurementfactory.com/surveys/sum1.html [Nov, 2005].
[12]
Singh A, Singh B, Joseph H, Vulnerability Analysis for DNS and DHCP, Vulnerability
Analysis and Defense for the Internet, pp. 111-124 [Dec, 2008].
[13]
Beverly R and Bauer S, The spoofer project: inferring the extent of source address filtering
on the Internet, USENIX workshop on Steps to Reducing Unwanted Traffic on the Internet,
2005.272 X. Ye et al. /Journal of Computational Information Systems 9, pp. 265272 [May,
2013].
[14]
[15]
K. Rikitake, A Study of DNS Transport Protocol for Improving the Reliability, Ph.D.
dissertation, Graduate School of Information Science and Technology, Osaka University
[Oct, 2005].
[16]
[17]
[18]
H. Yang, H. Luo, Y. Yang, S. Lu, and L. Zhang, HOURS: Achieving DoS Resilience in an
Open Service Hierarchy, in Proc. IEEE DSN04 [March, 2004].
[19]
ICANN SSAC, SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks.
Internet: http://www.icann.org/committees/security/dns-ddos-advisory-31mar06.pdf [Feb,
2006].
[20]
Huiming Yu, Xiangfeng Dai, Baxliey T, Xiaohong Yuan, Bassett T, A Visualization Analysis
Tool for DNS Amplification Attack, Proceedings of the 2010 3rd International Conference
on Biomedical Engineering and Informatics (BMEI 2010) [May, 2010].
[21]
[22]
S. Murdoch and R. Anderson. Verified by Visa and MasterCard SecureCode: or, How Not
to Design Authentication. Financial Cryptography and Data Security, pp. 42-45 [Jan,
2010].
[23]
SSL: Intercepted today, decrypted tomorrow. Netcraft, pp. 10-12 [May, 2013].
Attacks/tools.
International Journal of Computer Science and Security (IJCSS), Volume (8) : Issue (2) : 2014
Internet:
74