Publisher DOI: 10.1145/3442381.3450033
Title: Security of Alerting Authorities in the WWW : Measuring Namespaces, DNSSEC, and Web PKI
Language: 
Authors: Tehrani, Pouyan Fotouhi 
Osterweil, Eric 
Schiller, Jochen 
Schmidt, Thomas C.  
Wählisch, Matthias 
Editor: Leskovec, Jure 
Grobelnik, Marko 
Najork, Marc 
Tang, Jie 
Zia, Leila 
Issue Date: 2021
Publisher: Association for Computing Machinery
Book title: Proceedings of the Web Conference 2021
Part of Series: ACM Conferences 
Startpage: 2709
Endpage: 2720
Conference: Web Conference 2021 
Abstract: 
During disasters, crisis, and emergencies the public relies on online services provided by official authorities to receive timely alerts, trustworthy information, and access to relief programs.
It is therefore crucial for the authorities to reduce risks when accessing their online services.
This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication.

In this paper, we take a first look at Alerting Authorities (AA) in the US and investigate security measures related to trustworthy and secure communication.
We study the domain namespace structure, DNSSEC penetration, and web certificates.
We introduce an integrative threat model to better understand whether and how the online presence and services of AAs are harmed.
As an illustrative example, we investigate 1,388 Alerting Authorities, backed by the United States Federal Emergency Management Agency (US FEMA). We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 80\% of service providers fail to deploy measures of trustworthy service provision.
Our analysis shows two major shortcomings. First, how the DNS ecosystem is leveraged: about 50% of organizations do not own their dedicated domain names and are dependent on others, 55% opt for unrestricted-use namespaces, which simplifies phishing, and less than 0.4% of unique AA domain names are secured by DNSSEC, which can lead to DNS poisoning and possibly to certificate misissuance.
Second, how Web PKI certificates are utilized: 15% of all hosts provide none or invalid certificates, thus cannot cater to confidentiality and data integrity, 64% of the hosts provide domain validation certification that lack any identity information, and shared certificates have gained on popularity, which leads to fate-sharing and can be a cause for instability.
URI: http://hdl.handle.net/20.500.12738/12395
ISBN: 978-1-4503-8312-7
Institute: Department Informatik 
Fakultät Technik und Informatik 
Type: Chapter/Article (Proceedings)
Funded by: Bundesministerium für Bildung und Forschung 
Appears in Collections:Publications without full text

Show full item record

Page view(s)

72
checked on Dec 25, 2024

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


This item is licensed under a Creative Commons License Creative Commons