Improving Internet Security through Empirical and Qualitative Studies of Email and DNS Ecosystem
| dc.contributor.author | Ashiq Khan, Mohammad Ishtiaq | en |
| dc.contributor.committeechair | Chung, Taejoong Tijay | en |
| dc.contributor.committeemember | Fiebig, Tobias | en |
| dc.contributor.committeemember | Ji, Bo | en |
| dc.contributor.committeemember | Viswanath, Bimal | en |
| dc.contributor.committeemember | Yao, Danfeng | en |
| dc.contributor.department | Computer Science and#38; Applications | en |
| dc.date.accessioned | 2025-12-12T09:00:32Z | en |
| dc.date.available | 2025-12-12T09:00:32Z | en |
| dc.date.issued | 2025-12-11 | en |
| dc.description.abstract | Email and the Domain Name System (DNS) remain foundational pillars of Internet communication, yet their security mechanisms continue to suffer from subtle design limitations, operational misconfigurations, and systemic fragility. This dissertation presents an empirical, measurement-driven exploration of the global email and DNS security landscape, identifying recurring patterns of misconfiguration, evaluating the real-world efficacy of recent protocol defenses, and proposing practical tools to enhance their resilience. First, we examine email sender authentication, focusing on the large-scale deployment and operational correctness of Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting, and Conformance (DMARC). Drawing from over 12 months of longitudinal data encompassing 176 million domains, our study exposes widespread evaluation inconsistencies and misconfigurations that undermine authentication integrity and email deliverability. We further uncover novel attack vectors, including exploitable DNS amplification pathways within major email providers and open-source SPF validators, emphasizing the systemic risk of these seemingly mature defenses. Next, we turn to email transport security, analyzing the adoption and robustness of the SMTP Mail Transfer Agent Strict Transport Security (MTA-STS) protocol introduced by major providers such as Google and Microsoft. Despite its reliance on the well-established web PKI ecosystem, we find that 28% of MTA-STS enabled domains exhibit configuration flaws that nullify the intended transport-layer protections, underscoring the practical challenges of achieving secure email delivery even under modern standards. Finally, we investigate DNS security through the lens of DNSSEC deployment. Leveraging over 1M diagnostic records from DNSViz, we systematically classify the most frequent DNSSEC configuration errors, explore their persistence over time, and trace their operational root causes. To address these challenges, we introduce DFixer, an automated offline repair tool that aggregates cascaded error codes into root causes and generates both high-level remediation guidance and corresponding BIND command sequences. Experimental evaluation with a purpose-built erroneous zone replicator demonstrates that DFixer can automatically repair 99.99% of observed DNSSEC errors within seconds. Together, these studies reveal the gap between the theoretical robustness of Internet security protocols and their practical deployment realities. By combining large-scale empirical measurement, vulnerability analysis, and automated remediation, this dissertation advances our understanding of Internet infrastructure security and provides actionable paths toward more reliable, verifiable, and self-healing email and DNS ecosystems. | en |
| dc.description.abstractgeneral | Email and the Domain Name System (DNS) are essential to how the Internet works, but the security systems that protect them often fall short in practice. Even when standards exist, real-world mistakes, outdated setups, and overlooked weaknesses can leave users and organizations exposed to attacks. This dissertation takes a data-driven look at how well these security mechanisms actually work across the Internet. By studying hundreds of millions of domains over more than a year, it reveals that many email authentication systems that are meant to prevent spoofing and scams, are set up incorrectly or behave inconsistently. These problems not only weaken security but can also cause legitimate messages to be rejected. The research also uncovers new vulnerabilities in widely used tools that show how attackers could take advantage of these weaknesses. The work then examines a newer system designed to secure email as it travels between servers. Although this technology relies on the same security foundations used by modern websites, more than a quarter of the domains that enable it configure it incorrectly, leaving the protections ineffective. Finally, the dissertation studies DNSSEC, a protocol intended to prevent attackers from tampering with DNS responses. By analyzing over a million diagnostic records, it identifies the most common configuration errors and explains why they occur. To help fix these problems, the research introduces an automated tool that can diagnose the root causes of DNSSEC errors and generate step-by-step instructions to repair them. In testing, the tool successfully fixed nearly every observed error in just seconds. Overall, this work shows that the biggest threats to Internet security often come not from the protocols themselves, but from how they are deployed in practice. By combining large-scale measurement, vulnerability analysis, and automated repair techniques, this dissertation offers practical steps toward making Internet more reliable, secure, and resilient for everyone. | en |
| dc.description.degree | Doctor of Philosophy | en |
| dc.format.medium | ETD | en |
| dc.identifier.other | vt_gsexam:44932 | en |
| dc.identifier.uri | https://hdl.handle.net/10919/139897 | en |
| dc.language.iso | en | en |
| dc.publisher | Virginia Tech | en |
| dc.rights | Creative Commons Attribution 4.0 International | en |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
| dc.subject | Email Security | en |
| dc.subject | Email Sender Authentication | en |
| dc.subject | Email Transport Security | en |
| dc.subject | Network Measurement | en |
| dc.subject | Vulnerability Discovery | en |
| dc.subject | DNS Security | en |
| dc.title | Improving Internet Security through Empirical and Qualitative Studies of Email and DNS Ecosystem | en |
| dc.type | Dissertation | en |
| thesis.degree.discipline | Computer Science & Applications | en |
| thesis.degree.grantor | Virginia Polytechnic Institute and State University | en |
| thesis.degree.level | doctoral | en |
| thesis.degree.name | Doctor of Philosophy | en |
Files
Original bundle
1 - 1 of 1