Security enhancement for domain name system in the internet

Domain Name System (DNS) can be referred as the spine of today’s Internet world. This system is completely responsible for providing an architecture that helps in resolving millions of domain names existing throughout the world to a unique IP address, enabling the users to access the domains from an...

Full description

Saved in:
Bibliographic Details
Main Author: Narayanan Arjun
Other Authors: Ma Maode
Format: Theses and Dissertations
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/73117
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Domain Name System (DNS) can be referred as the spine of today’s Internet world. This system is completely responsible for providing an architecture that helps in resolving millions of domain names existing throughout the world to a unique IP address, enabling the users to access the domains from anywhere on the planet. The resolving of domain name to the legitimate IP address is the prime task of a DNS system. There have been many security attacks reported, that infiltrates the IP address database and redirects the users to a false domain server. One of the major security threats in DNS is the Cache Poisoning attacks, where the attacker can change the IP address in the response packet or the database in the name server. To address this cache poisoning attacks, many security enhancements have been proposed and deployed in the DNS system. In any security enhancement scheme, the security level and performance are the two major entities to be considered in implementation. The main aim of this research is to propose an ideal solution for preventing Cache Poisoning Attacks. We have discussed various cryptographic methods to address DNS cache poisoning attacks. We have also proposed an encryption algorithm for encoding the domain name, so that the security level is increased multiple times. Also, the probability of successful attack is minimised. We have also discussed on the performance and complexity of the algorithm.