Design and Analysis of Client Control System Using DNS Control Firewall

نویسندگان

  • Bong-Hyun Kim
  • Young-Gil Park
چکیده

In this paper, the client control system designed for infringement blocking system development. In order words, infected with harmful files on your computer by using a usercentered information systems development and security through the design of a control system using DNS control firewall client access to the site randomly for acts that can block the under solving techniques. Design of the client control system was classified as Dynamic intrusion prevention system module design, Embedded domain name service system module design, Interlocking DNS service module design and Cert & Analysis module design. Finally, through simulation, an average of 14% was measured by abnormal packet ratio.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Comprehensive Picture of the Great Firewall's DNS Censorship

China’s Great Firewall passively inspects network traffic and disrupts unwanted communication by injecting forged DNS replies or TCP resets. We attempted to comprehensively examine the structure of the DNS injector, using queries from both within and outside China. Using these probes, we were able to localize the DNS monitors’ locations, extract the firewall’s DNS blacklist of approximately 15,...

متن کامل

Capability-based egress network access control by using DNS server

In conventional egress network access control (NAC) based on access control lists (ACLs), modifying the ACLs is a heavy task for administrators. To enable configuration without a large amount of administrators’ effort, we introduce capabilities to egress NAC. In our method, a user can transfer his/her access rights (capabilities) to other persons without asking administrators. To realize our me...

متن کامل

Building a Dynamic Reputation System for DNS

The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command and control infrastructures. An effective way to disrupt these attacks is to place malicious domains on a “blocklist” (or “blacklist”) or to add a filtering rule in a firewall or network intrusion detection system. To ev...

متن کامل

Load Balancing a Cluster of Web Servers using Distributed Packet Rewriting

In this paper, we present and evaluate an implementation of a prototype scalable web server. The prototype consists of a load-balanced cluster of hosts that collectively accept and service TCP connections. The host IP addresses are advertised using the Round Robin DNS (RR-DNS) technique, allowing any host to receive requests from any client. Once a client attempts to establish a TCP connection ...

متن کامل

Client-Server Access Control Method on the Policy-Based Network Management Scheme called DACS Scheme

Recently, much attention is paid to the network security including information leak through a network. As one of the important technologies about network security, there is an access control for network services. There are some methods of access control: the access control by packet filtering mechanism on the network server side, the access control by the communication control mechanism on the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013