539, 542, 2023, Not refereed, Single Work
Tsunehiko Suzuki
2023-IOT-62, 11, 1, 6, 2023, Not refereed, Single Work
1, 5, 2023, Not refereed, Single Work
Undiminished vulnerabilities - hidden open resolvers -
Tsunehiko Suzuki
1, 4, 2022, Not refereed, Single Work
Blockchain and DHT Based Lookup System Aiming for Alternative DNS
Matsuoka Kazuma, Suzuki Tsunehiko
IEEE Conference Proceedings (IEEE Conf Proc), IEEE, 2020, 98, 105, 2020, refereed, Joint Work
A survey on the status of measures against IP fragmentation attacks on DNS
Kenya Ota
Tsunehiko Suzuki
CSEC SIG Technical Reports, IPSJ, 2019-CSEC-87, 11, 1, 7, 2019, Not refereed, Joint Work, The risk of DNS cache poisoning attacks using IP fragmentation was presented by Herzberg and Shulman in 2012 and 2013. And we showed that the attacks are feasible, and several open-source implementations were still affected by the attacks. In the wake of our proposal, measures to major open-source implementations for ignoring NS records in Authority or Additional sections of negative response at DNS cache server, and for ignoring Path MTU Discovery at DNS authoritative server were taken. Also, DNS flag day 2020 is planned to take measures against fragmentation attacks such as reducing default EDNS buffer size. If the authoritative servers that manage TLDs or multiple zones have not been taken measures, this attack increases the risk of massive hijacking at once. In this research, we survey whether authoritative servers that manage TLDs can be affected by the attacks.
119, 297, 31, 35, 2019, Not refereed, Joint Work, We re-implemented a Ruby library "VITOCHA", which can be used for programming virtual networks, using Python. The library named "Fika" has a library corresponding to conventional functions of VITOCHA and a library for developing blockchain applications. Using this, we have created an application that can simulate the effects of network routing attacks against a blockchain. Fika provides an environment for developing blockchain applications.
2019-CSEC-87, 10, 1, 8, 2019, Not refereed, Single Work, Shared DNS authoritative servers used by many users may cause various vulnerabilities by being shared. This paper shows, consider, and alert about each vulnerability - DDoS, cache poisoning, zone hijack - with several risky situations - cache combined, mixed parent / child, lame delegation, public suffix zone, orphaned cname, sibling domain - in each chapter.
2018-CE-145, 9, 1, 5, 2018, Not refereed, Single Work
Vol.J96-D, 3, 552, 561, 2013, refereed, Joint Work
An anti-spam method via real-time retransmission detection
Naoya Kitagawa, Hiroki Takakura, Tsunehiko Suzuki
The 18th IEEE International Conference on Networks (ICON2012), 0, 0, 2012, refereed, Joint Work
2012-IOT-16, 8, 1, 4, 2012, Not refereed, Single Work
96(3), 552, 561, 2011, refereed, Joint Work
9, 4, 231, 234, 2010, refereed, Joint Work
617, 618, 2010, Not refereed, Joint Work
Status of Open Resolvers
Tsunehiko Suzuki
Vol.108, No.24, 89, 91, 2008, Not refereed, Single Work, DNS cache servers (DNS open resolvers) without access controll could be misused for DDoS attack. This paper introduces the orginal tool 'DNS Amp Checker' for finding open resolvers. And using the tool, it's made clear that about 80% of DNS authoritative servers are open resolvers. So anyone can find many open resolvers. And the state is not improved in these years.
2008
DNS Security: Now and The Future
Rikitake, K., Suzuki, T. and Nakao, K.
EICE Technical Report ICSS2007-01, 3-8, 3-8, 2007, refereed, Joint Work
2007
2005
2004
2003
2002
2002
2002
2002
1994
1993
1991
1991
1990
Single Work
2025, Single Work
2024, Single Work, Not refereed
2025, Single Work
2024, Single Work, Not refereed, Nagoya
2023, Single Work, Not refereed, AXIES, Nagoya
2023, Single Work, Not refereed
2023, Single Work, Not refereed
2023, Single Work, Not refereed
2023, Single Work, Not refereed
2023, Single Work, Not refereed
2023, Single Work, Not refereed
Development of a scanner for hidden open resolvers and the investigation
2023, Single Work, Not refereed
Undiminished vulnerabilities - hidden open resolvers -
Tsunehiko Suzuki
2022, Single Work, Not refereed, I found many hidden openresolvers which are caused by reachablity of source IP address spoofing packets. This means that those networks are vulnerable for many kind of spoofing attacks. Measures to address those vulnerable sites are not very not much progress has been made. Of the 100,000 IP addresses surveyed, about 7% overall, and about 24% of those whose PTR is JP, remain vulnerable. We hope that this paper will lead to further discussion, awareness-raising, and countermeasures.
2020, Single Work, Not refereed
2020, Single Work, Not refereed
Single Work
2018, Single Work
2017, Single Work, Not refereed
2015, Single Work, Not refereed
2015, Single Work, Not refereed
2014, Single Work, Not refereed
2014, Single Work
2014, Single Work, Not refereed
2014, Single Work
2012, Single Work, Not refereed
2008, Single Work, refereed
2008
1993
1991