Fault-Tolerant Mesh of Trust Applied to DNS Security

نویسندگان

  • Wes Griffin
  • Russ Mundy
  • Sam Weiler
  • Dan Massey
  • Naheed Vora
چکیده

The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result in the compromise of web sites, email messages login sessions. Additionally, these weaknesses have been used as the basis for man-in-themiddle attacks on what are considered secure network protocols. This paper provides a short description of the weaknesses of the current DNS and a description of DNS security extensions that will solve the existing insecurities. Keywords, Domain Name System, DNS, infrastructure, security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Key Validation for the DNS Security Extensions

The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual ...

متن کامل

CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip

By increasing, the complexity of chips and the need to integrating more components into a chip has made network –on- chip known as an important infrastructure for network communications on the system, and is a good alternative to traditional ways and using the bus. By increasing the density of chips, the possibility of failure in the chip network increases and providing correction and fault tol...

متن کامل

Requirements Related to DNS Security (DNSSEC) Trust Anchor Rollover

Every DNS security-aware resolver must have at least one Trust Anchor to use as the basis for validating responses from DNS signed zones. For various reasons, most DNS security-aware resolvers are expected to have several Trust Anchors. For some operations, manual monitoring and updating of Trust Anchors may be feasible, but many operations will require automated methods for updating Trust Anch...

متن کامل

Fuzzy Logic-Based Secure and Fault Tolerant Job Scheduling in Grid

The uncertainties of grid sites security are main hurdle to make the job scheduling secure, reliable and fault-tolerant. Most existing scheduling algorithms use fixed-number job replications to provide fault tolerant ability and high scheduling success rate, which consume excessive resources or can not provide sufficient fault tolerant functions when grid security conditions change. In this pap...

متن کامل

A New Approach to Fault-Tolerant Routing in Mesh Interconnection Networks, Based on Deterministic Routing

Many of the calculating systems are made based on a parallel nodes architecture. In these systems, interconnection networks play a main role. Because the number of nodes is thousands, the probability of failure is high. So, developing fault-tolerant mechanisms is essential. In this paper a new fault-tolerant routing algorithm, which is based on deterministic methods, is introduced for a two dim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003