Security enhancement for domain name system in the internet
Domain Name System (DNS) can be referred as the spine of today’s Internet world. This system is completely responsible for providing an architecture that helps in resolving millions of domain names existing throughout the world to a unique IP address, enabling the users to access the domains from an...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/73117 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Domain Name System (DNS) can be referred as the spine of today’s Internet world. This system is completely responsible for providing an architecture that helps in resolving millions of domain names existing throughout the world to a unique IP address, enabling the users to access the domains from anywhere on the planet. The resolving of domain name to the legitimate IP address is the prime task of a DNS system. There have been many security attacks reported, that infiltrates the IP address database and redirects the users to a false domain server. One of the major security threats in DNS is the Cache Poisoning attacks, where the attacker can change the IP address in the response packet or the database in the name server. To address this cache poisoning attacks, many security enhancements have been proposed and deployed in the DNS system. In any security enhancement scheme, the security level and performance are the two major entities to be considered in implementation. The main aim of this research is to propose an ideal solution for preventing Cache Poisoning Attacks. We have discussed various cryptographic methods to address DNS cache poisoning attacks. We have also proposed an encryption algorithm for encoding the domain name, so that the security level is increased multiple times. Also, the probability of successful attack is minimised. We have also discussed on the performance and complexity of the algorithm. |
---|