With the goal of improving the security of Internet protocols, we seek faster, semi-automatic methods to discover new vulnerabilities in protocols such as DNS, BGP, and others. To this end, we introduce the LLM-Assisted Protocol Attack Discovery (LAPRAD) methodology, enabling security researchers with some DNS knowledge to efficiently uncover vulnerabilities that would otherwise be hard to detect. LAPRAD follows a three-stage process. In the first, we consult an LLM (GPT-o1) that has been trained on a broad corpus of DNS-related sources and previous DDoS attacks to identify potential exploits. In the second stage, a different LLM automatically constructs the corresponding attack configurations using the ReACT approach implemented via LangChain (DNS zone file generation). Finally, in the third stage, we validate the attack's functionality and effectiveness. Using LAPRAD, we uncovered three new DDoS attacks on the DNS protocol and rediscovered two recently reported ones that were not included in the LLM's training data. The first new attack employs a bait-and-switch technique to trick resolvers into caching large, bogus DNSSEC RRSIGs, reducing their serving capacity to as little as 6%. The second exploits large DNSSEC encryption algorithms (RSA-4096) with multiple keys, thereby bypassing a recently implemented default RRSet limit. The third leverages ANY-type responses to produce a similar effect. These variations of a cache-flushing DDoS attack, called SigCacheFlush, circumvent existing patches, severely degrade resolver query capacity, and impact the latest versions of major DNS resolver implementations.
翻译:以提高互联网协议的安全性为目标,我们致力于寻求更快速、半自动化的方法来发现DNS、BGP等协议中的新漏洞。为此,我们提出了基于大语言模型的协议攻击发现(LAPRAD)方法,使具备一定DNS知识的安全研究人员能够高效地发现原本难以检测的漏洞。LAPRAD遵循三阶段流程。第一阶段,我们咨询一个在广泛DNS相关资源及历史DDoS攻击语料上训练过的大语言模型(GPT-o1),以识别潜在的漏洞利用方式。第二阶段,另一个大语言模型通过LangChain实现的ReACT方法自动构建相应的攻击配置(DNS区域文件生成)。最后在第三阶段,我们验证攻击的功能性和有效性。利用LAPRAD,我们发现了三种针对DNS协议的新型DDoS攻击,并重新发现了两种近期报道但未包含在模型训练数据中的攻击。第一种新型攻击采用诱饵调包技术,诱使解析器缓存大量伪造的DNSSEC RRSIG记录,将其服务能力降低至仅6%。第二种攻击利用具有多个密钥的大型DNSSEC加密算法(RSA-4096),从而规避了最近实施的默认RRSet限制。第三种攻击则通过ANY类型响应产生类似效果。这些被称为SigCacheFlush的缓存刷新型DDoS攻击变体,能够规避现有补丁,严重降低解析器查询能力,并影响主流DNS解析器实现的最新版本。