This website uses cookies to ensure you have the best experience. Learn more

A Modified Approach For The Domain Name System Security

935 words - 4 pages

We have developed a secured DNS system in which even when the request from resolver has been received by the attacker, it would not be able to reply for the same. We have also shown fake server which tries to enter in the communication between the resolver and servers & grant the access. Our system also maintains log files for all the connections established in the network.
A. Equations
1. Notations:
a) SK: Secret Key
b) PUR: Root’s Public key
c) ESK: Encryption using Secret Key
d) EPUR : Encryption using Root’s Public Key

2. Resolver and DNSRootServer
a) Resolver DNSRoot: EPURi(SK, hostname)

b) DNSRoot Resolver: ESK[hmac (EPURi(SK, hostname)), IPi)]

3. Resolver and Destination Server ...view middle of the document...

Send this HMAC to top level domain. This procedure is repeated for each request from Resolver. The screenshot shows the output when it gets the request from the resolver. It has been implemented using virtual machine. DNSRootServer creates hmac and sends this hmac to next DNSServer and Resolver. (See Fig 1.4)


Fig. 1.3
B. DNSResolver
The main task of DNSResolver is take host name from client and returns its ip or vice versa. When it receives host name it will first connects to the DNSRoot Server and then reads the public key of DNSRoot Server through this connection. AES algorithm is used for the generation of secret keys. DNSResolver create Secret key using EncManager. It will encrypt the host name and secret key using public key of DNSRoot Server then send this encrypted host name and secret key to DNSRoot server. After receiving host name and secret key DNSRoot server send the top level domain’s port, address (IP) and HMAC to the DNSResolver. DNSResolver checks to see whether the desired hostname is retrieved or not, otherwise it iteratively sends IP and hostname to DNS Server, read the next domain name and IP address. Reply contains encrypted hmac and ip of witsolapur.com which is in encrypted format. (See Fig 1.5)
C. DNSServer
DNS Server are middle level servers which provides services. DNS Root Server forwards data i.e. HMAC and secret key to DNS Server using DNS Server public key. Received data is decrypted using its own private key. It stores secret key in its own database. Then it compares HMAC received from DNS Root Server with HMAC received from DNS Resolver, if it matches then it Obtains next hostname and corresponding IP from its database, else the...

Find Another Essay On A Modified Approach for the Domain Name System Security

name a business for success Essay

1140 words - 5 pages Do you ever like a brand, and everything that they have to offer, bit then you think to yourself "what a stupid name though!"? While a crappy name won't nesesarily doom a company for success, it can be a hurdle to overcome if botched. The art and science of great naming is absolutely about balancing a confluence of core concepts: Companies should focus on domain name availability, descriptiveness, trademark strength, originality, length

The Struggle for Liberation: Yvonne Vera's Without a Name

1756 words - 8 pages has been raped by a soldier during the liberation struggle, Without a Name confronts rape as a signifier of colonial invasion,” (Shaw 36). It becomes easy for women to get stuck in a dangerous trap when they are attempting to liberate themselves from colonial oppression. This trap can lead women down a path of sexual abuse. This hazard lies in male aggression toward conquering a female subject. “Ironically, the same sexuality that allows them

Meanings for the Name Farah

1213 words - 5 pages full name. It starts by the person's first name, then their father's name, followed by their grandfather's name so on and so forth until the end of time. In addition, if not all, most of them have meanings and some significance. The reasoned behind that is that Egyptians are very traditional. It is also a way to remember our ancestors and know our origin. For example, Canadians whether it is male or female, have their unique first name. Most of

A New Algorithm for Solving Fractured Domain Problem

2722 words - 11 pages ], it has since then garnered lots of interest. The goal of the racing strategy domain implemented for this paper to a network that makes this decision on which waypoint the agent should focus. The aim to ensure that each waypoint may only be awarded to one of the two players, and after a fixed amount of time the player that has “collected” the most waypoints wins. The implementation of the racing car strategy was inspired from that implemented in [3

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

The Importance of a Creative Approach for Caregivers

1244 words - 5 pages unconditional love from significant adults and autonomy and freedom.1Importance of a creative approachMoreover, it is important for caregivers to ensure that they themselves are creative and then they should follow a creative approach to the development of creativity in children. This can be done by making space and time in everyone’s lives for expressiveness, creating, and innovating. Building creative experiences can help children express and

F/CFAT : An Approach for Combined Safety and Security Analysis

1486 words - 6 pages , when FTA is applied for the safety analysis of software system a new challenge is faced. This is because for those systems it is more desirable to carry out safety analysis with fault tress before the system design stage [2]. Such an analysis provides very useful information and concrete safety requirements for subsequent system design and implementation [4]. However such an approach raises the question about the correctness of the generated

A Case For Genetically Modified Organisms

2299 words - 10 pages Genetically modified organisms (GMOs) are a positive technology in agriculture that receives a lot of criticism. In our society, GMOs have a reputation for being bad even though more evidence proves they are good. Many people don't know or are misinformed about GMOs. It is time to separate fact from fiction. Genetic engineering, also called bioengineering, inserts DNA from one plant into the DNA of another plant (Cobb 7). This transfers

A Case for Genetically Modified Babies

1257 words - 6 pages Although many people believe that babies should be born naturally, they should be born genetically modified because the modifications benefit the baby by preventing it from suffering of diseases, disabilities or birth defects. For years babies have been born naturally with no drugs or modifications and have lived a healthy happy life, however many of those babies have suffered horrible birth defects or various diseases

Security and The International System

790 words - 3 pages development rather than military forces. With nations cooperating with one another for economic progression rather than competing, traditional international instruments became less important. Military force, diplomatic pressure, and alliances are all actions for the security of a nation. With the relatively assertive United States at the head of a uni-polar international system, there was no need for significant military expenditures, and

Multilateral Security System for Northeast Asia

2042 words - 8 pages The Northeast Asian (NEA) countries have remained unconnected for decades without having a formal multi-lateral security cooperation mechanism to pursue their common interests. One of the major reasons for why NEA cannot seem to form a unifying security system is because of the conflicting interest of each of the member countries. Each member country wants to protect their own interests and is not ready to compromise on the ground of finding a

Similar Essays

The Domain Name System Essay

1729 words - 7 pages The Domain Name System A name that identifies one or more IP addresses. For example, the domain name microsoft.com represents about a dozen IP addresses. Domain names are used inURL's to identify particular Web pages. For example, in the URL http://www.hotmail.com/ the domain name is hotmail.com. Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There are only a limited number of such domains

Explaining The Domain Name System (Dns)

1032 words - 5 pages caches DNS responses. Once it's determined the IP address assigned to a domain name, it will remember it for some time. Thus next time you decide to visit coursera.org it needs to connect only to Coursera, not its DNS server first. This improves connection speed by skipping the DNS request phase. [3] The power of this system lies in the simple fact that every single computer or machine (cell phone, Xbox game, fax machine, etc) connected the Internet

Web Hosting And Domain Name System

1333 words - 6 pages steps administrators may need to take to secure the web server in the future, the first few steps outlined here will help to ensure the security of the web server. Domain Name System In simple terms, the Domain Name System (DNS) “translates Internet domain and host names to IP addresses” (Mitchell, 2014). Without DNS servers in place, hosts on the LAN will not resolve names to IP addresses. Without a DNS server available to resolve Internet

A High Security System For Databases

1855 words - 7 pages Abstract - The intent of this paper is to give users of database software, a basicunderstanding of the enhanced security capabilities achieved through Hard DiskShadowing over IP networks. The paper discusses the design and implementation of HardDisk Shadowing system over a packet switched Internet Protocol(IP) network. The systemcreates an accurate copy of critical information at two drives simultaneously thusproviding identical failover storage