Toward secure name resolution on the internet
نویسندگان
چکیده
The Domain Name System (DNS) provides crucial name resolution functions for most Internet services. As a result, DNS traffic provides an important attack vector for mass surveillance, as demonstrated by the QUANTUMDNS and MORECOWBELL programs of the NSA. This article reviews how DNS works and describes security considerations for next generation name resolution systems. We then describe DNS variations and analyze their impact on security and privacy. We also consider Namecoin, the GNU Name System and RAINS, which are more radical re-designs of name systems in that they both radically change the wire protocol and also eliminate the existing global consensus on TLDs provided by ICANN. Finally, we assess how the different systems stack up with respect to the goal of improving security and privacy of name resolution for the future Internet. © 2018 Elsevier Ltd. All rights reserved.
منابع مشابه
ارزیابی تطبیقی کارایی ساختار فراداده نظامهای شناسگر دیجیتالی
The main solution to the problems of persistency and uniqueness in identification of digital objects in a web environment is provided by using digital identifiers instead of URL. The main basis of this solution is resolution mechanism that is used in digital identifier systems. Resolution is the use of indirect names instead of URLs; what worked for the DNS (Domain Name System) in stabilizing i...
متن کاملCorefrence resolution with deep learning in the Persian Labnguage
Coreference resolution is an advanced issue in natural language processing. Nowadays, due to the extension of social networks, TV channels, news agencies, the Internet, etc. in human life, reading all the contents, analyzing them, and finding a relation between them require time and cost. In the present era, text analysis is performed using various natural language processing techniques, one ...
متن کاملC-HTTP - The Development of a Secure, Closed HTTP-based Network on the Internet
We have designed "C-HTTP" which provides secure HTTP communication mechanisms within a closed group of institutions on the Internet, where each member is protected by its own firewall. C-HTTP-based communications are made possible by the following three components: a clientside proxy, a server-side proxy and a C-HTTP name server. A client-side proxy and server-side proxy communicate with each o...
متن کاملنقش واسطه ای انگیزه های استفاده از اینترنت در رابطه بین سبک های دلبستگی و اعتیاد به اینترنت
The purpose of the present study was to examine the mediating role of internet usage motives in the relation between attachment styles and internet addiction. Statically society was all of Islamic Azad University Urmia Branch students, during 2015-2016 (1394-95.s.c.) and 204 participants were selected by multi-stage cluster sampling method and were asked to complete the Adult Attachment Invent...
متن کاملThe predictive role of attachment styles in marital disillusionment and attitudes toward infidelity among teachers
Attachment styles are considered as an important predictor of marital issues. The purpose of this study was to investigate the role of attachment styles in marital disillusionment and attitude toward infidelity. The research method was correlation. 188 teachers were selected based on measurement scale and research hypothesis by multistage cluster sampling among married teachers. Measures of adu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018