Security and Communication Networks / 2017 / Article / Tab 2

Research Article

Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing

Table 2

DNS spoofing attack.

ATT within LAN legitimately; ATT must reside between and

(M1):ARP poisoning

The result is ATT[] for and ATT[] for

(M3):DNS_Query (ID1, DN); dest. IP = DNS spoofing
(M4):DNS_Query (ID1, DN); dest. IP =
(M5):DNS_Reply (ID1, DN, IPWS); dest. IP = IPC
(M6):DNS_Reply (ID1, DN, IPATT); dest. IP = IPC

All client HTTP traffic is sent to ATT directly

(M7):HTTP_Request (URL); dest. IP =
(M8):HTTP_Response (HTML); dest. IP =

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19.