Comprehensive coverage

Students from Bar-Ilan uncovered attacks on the basic Internet protocols (TCP/IP)

The disclosed attacks allow a remote attacker to inject false information into communications. The attacks can be used for many purposes, including: stealing information, impersonating, and introducing hostile software, all of this, in a very effective way

Prof. Amir Herzberg, Bar-Ilan University
Two students from the Computer Science Department at Bar-Ilan University, led by Prof. Amir Herzberg, exposed attacks on the basic internet protocols. Chaya Shulman exposed attacks on the DNS naming mechanism, and Yossi Gilad exposed attacks on the basic communication protocol TCP/IP. The researchers will present one of the attacks on May 17 at the annual World Wide Web conference. This attack exploits a feature that exists in all common browsers.

The disclosed attacks allow a remote attacker to inject false information into communications. The attacks can be used for many purposes, including: stealing information, impersonating, and introducing hostile software, all of this, in a very effective way. The attacker can be in another continent or country, without control over the server/client computers, routers or other devices in the path. The attacks can harm both domestic customers and companies and organizations. The attacks can serve many attackers against different users, including for the needs of information (cyber) warfare.

The team of researchers from Bar-Ilan University informed the development bodies about the attacks, while offering solutions to correct the weaknesses and prevent them from being exploited for attacks. The most recommended protection is the adoption of appropriate cryptographic security standards, in particular TLS as well as DNSSEC.

2 תגובות

  1. How does the scientist publish such a superficial article? Not suitable... At least you would publish the general outline of the attack.

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismat to prevent spam messages. Click here to learn how your response data is processed.