Research Article

Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing

Table 2

DNS spoofing attack.

ATT within LAN legitimately; ATT must reside between and

(M1):ARP poisoning
(M2):

The result is ATT[] for and ATT[] for

(M3):DNS_Query (ID1, DN); dest. IP = DNS spoofing
(M4):DNS_Query (ID1, DN); dest. IP =
(M5):DNS_Reply (ID1, DN, IPWS); dest. IP = IPC
(M6):DNS_Reply (ID1, DN, IPATT); dest. IP = IPC

All client HTTP traffic is sent to ATT directly

(M7):HTTP_Request (URL); dest. IP =
(M8):HTTP_Response (HTML); dest. IP =