DNS Security – Prevent DNS Cache Poisoning Attack using Blockchain
Mukesh Kumar Bansal1, M. Sethumadhavan2

1Mukesh Kumar Bansal, Center of Cyber Security, Amrita University, Coimbatore, India.
2Dr. M. Sethumadhavan, Head of Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Coimbatore, India.
Manuscript received on January 14, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 2151-2162 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1549029420/2020©BEIESP | DOI: 10.35940/ijitee.D1549.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The block chain is attaining popularity day to day as it is acting as distributed ledger for Cryptocurrency such as Bitcoin and ripple. This research paper has focused on the Blockchain and its working pattern with technical implementation of block creation. This technical paper is considering the prevention of DNS Cache poisoning attack in Blockchain which is known as larger class of name-based attacks. DNS Packet interceptions may be made using various attacks like Cache poisoning attack, man-in-the-middle attacks etc. As there are numerous security mechanisms to secure the Blockchain but in order to make Blockchain immune from cache poisoning attack, there is need to update the block creation module. Therefore, this research work is proposed to make reduction in probability of data corruption that can be created from different attacks. It resolves the issue of cache poisoning attacks using user defined port instead of predefined port. However, the initialization of transmission is performed here using predefined port number. In second step, the encrypted port number is decrypted to initiate communication using user defined port number. The use of port with IP address would restrict attacks during data transmission. The paper has presented the comparative analysis of existing DNS attacking prevention mechanism to proposed work. 
Keywords: Block Chain, Cache poisoning, DNS Attack, PORT
Scope of the Article: Blockchain-enabled IoT Device and Data Security and Privacy