Bert Hubert on the Domain Name System
نویسندگان
چکیده
منابع مشابه
Securing the Domain Name System
44 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/09/$26.00 © 2009 IEEE ■ SEPTEMBER/OCTOBER 2009 T he Domain Name System (DNS) 1 is the Internet’s de facto name resolution system. In fact, almost every transaction performed on the Internet is prefaced by a DNS lookup—for example, when a user types “www.bankofamerica.com” into his or her Web browser, it issues a DNS reque...
متن کاملSecuring the Domain Name System
44 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/09/$26.00 © 2009 IEEE ■ SEPTEMBER/OCTOBER 2009 T he Domain Name System (DNS) 1 is the Internet’s de facto name resolution system. In fact, almost every transaction performed on the Internet is prefaced by a DNS lookup—for example, when a user types “www.bankofamerica.com” into his or her Web browser, it issues a DNS reque...
متن کاملDomain Name System Security Extensions
Extensions to the Domain Name System (DNS) are described that provide data integrity and authentication to security aware resolvers or applications through the use of cryptographic digital signatures. These digital signatures are included in secured zones as resource records. Security can still be provided even through non-security aware DNS servers in many cases. The extensions also provide fo...
متن کاملCharacterizing Anycast in the Domain Name System
IP anycast is a central part of production DNS. While prior work has explored proximity, affinity and load balancing for some anycast services, there has been little attention to third-party discovery and enumeration of components of an anycast service. Enumeration can reveal abnormal service configurations, benign masquerading or hostile hijacking of anycast services, and can help characterize...
متن کاملUsing the Domain Name System for System Break-ins
The DARPA Internet uses the Domain Name Sys tem DNS a distributed database to map host names to network addresses and vice versa Using a vulnerability rst noticed by P V Mockapetris we demonstrate how the DNS can be abused to sub vert system security We also show what tools are useful to the attacker Possible defenses against this attack including one implemented by Berkeley in re sponse to our...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Software
سال: 2020
ISSN: 0740-7459,1937-4194
DOI: 10.1109/ms.2020.3000883