The Growth, Future and Restraints facing the Domain

The Growth, Future and
Restraints facing the Domain
Naming System (DNS)
B101 the Technology Context
1
A Solution? Or just causing problems?
Example IP address
216.237.61.99.
Current
needs suited?
DNS Conversion
Example FQDN
www.example.com
Current needs :
• ?
• ?
• ?
• ?
2
So where is the DNS heading and
what's holding it back?
Internet grows larger + Amount of users grows =
Growing number of security risks.
Security problems range from :
• Phishing
• Denial-of-service
• Cache poisoning attacks
3
The structure of the present DNS
4
Primary and Secondary servers
Primary
Secondary
•Stores a zone
file
•Responsibility
for creating,
maintaining and
updating this file
•Stores
information
about the zone
onto a hard drive
5
Under the bonnet
6
It doesn’t always go to plan
DoS Attack
DoS = denial-of-service
When a server receives
too many queries the
server can crash
7
Breaks, ECU and Clutch
• Breaks, ECU and Clutch are the 3 most
important parts of a car.
~~~~~~~~~~~Similarly in the DNS~~~~~~~~~~~
Root sever, inverse domain and
caching
• Root sever, inverse domain and caching are
the 3 most important parts of the DNS.
8
It doesn’t always go to plan
Cache poisoning
Is where a fake record of
address is submitted to
the DNS and accepted.
9
Who has the Control?
• The main organisation regulating the use of
the DNS is the Internet Corporation for
Assigned Names and Numbers (ICANN).
• Data protection act 1998 which is controlled
by the government and does have a significant
influence on the internet.
10
Are we Safe and Secure?
• The main limitation of the DNS is the security,
but is anything being done to improve it?
• Domain Naming System Security (DNSSEC)
11
The verdict
As it stands the DNS does not satisfy
current needs and has been held back for
some time.
Future
But the new security protocol along with the new
domains will allow the internet to grow into a
smarter and safer internet.
12
End credits
1)Andrews, C. (n.d.). Train Track style TILER
http://www.networkworld.com/news/tech/200 16) Shiels, M.(7.8.2008). Net address bug worse
using.Train Stations as START/STOP. Retrieved 8/102008-tech-update.html
than feared. Retrieved from
fromhttp://www.mazecreator.com/maze_creat 10)Internet overhaul wins approval.
http://news.bbc.co.uk/1/hi/technology/754655
or_gallery.php
(26.6.2008). Retrieved from
7.stm
2) Brown, M. (2011). ICANN approves plan to http://news.bbc.co.uk/1/hi/technology/747598 17) Shiels, M. (15.6.2010). Technology
allow almost any domain extension.
6.stm
milestone heralds a more secure internet.
Wired.co.uk. Retrieved from
11) Kerner, S.M. (8.3.2005). DNS-Based Phishing Retrieved from
http://www.wired.co.uk/news/archive/2011- Attacks on The Rise. Retrieved from
http://news.bbc.co.uk/1/hi/technology/874042
06/20/icann-approves-adding-more-gtlds
http://www.enterprisenetworkingplanet.com/n 6.stm
3) Brownlee, N. & Nemeth, E. .(2001). DNS
etsecur/article.php/3488266/DNSBased18) Talbot, D. (2011). Safeguards against
Measurements at a Root Server .Retrieved from Phishing-Attacks-on-The-Rise.html
"Phishing" Slow in Coming. Technology review.
http://citeseer.ist.psu.edu/viewdoc/summary?d 12) Kawamoto, D. (17.3.2006). DNS recursion Retrieved from
oi=10.1.1.154.9310
leads to nastier DoS attacks. Retrieved from
http://www.technologyreview.com/computing/
4)Crucial vote on Internet's future. (26.6.2008). http://www.zdnet.co.uk/news/security37817/
Retrieved from
management/2006/03/17/dns-recursion-leads- 19) The Domain Name System (DNS).(n.d.) In
http://news.bbc.co.uk/1/hi/technology/747488 to-nastier-dos-attacks-39257938/
the network encyclopedia. Retrieved from
9.stm
13) Lemos, R. (2009). DNS security Protocol
http://www.thenetworkencyclopedia.com/d2.a
5) Data controller/Data subject.(n.d). In Internet Gains Momentum. Technology review.
sp?ref=654
Rights Glossary. Retrieved from
Retrieved from
20) UK domain name dispute rules could
http://www.internetrights.org.uk/glossary.shtml http://www.technologyreview.com/computing/ change. (2007). Retrieved from http://www.out6) Denial-of-service attack.(n.d.). Retrieved from 23954/
law.com/page-7619
http://en.wikipedia.org/wiki/Denial-of14) Malware and cyber-crime. (n.d.). In
21) Williams, C. (29.10.2008). Mandelson's dept
service_attack
Parliament publications and records. Retrieved mulls UK internet power grab. Retrieved from
7) DNS (Domain Name System). (n.d.). Retrieved from
http://www.theregister.co.uk/2008/10/29/berr
from
http://www.publications.parliament.uk/pa/cm2 _nominet/
http://en.kioskea.net/contents/internet/dns.ph 01012/cmselect/cmsctech/writev/mal/mal18.ht22) What are zone files and zone records?.
p3
m
(2011). Retrieved from
8)Foruzan,B.A. (2007). Data communications 15) Root server.(n.d.). In PCMAG.com
http://help.godaddy.com/article/676
and networking 4th edition. McGraw Hill.
encyclopaedia. Retrieved from
13
9) Hally, B. (2008). How DNS poisoning works. http://www.pcmag.com/encyclopedia_term/0,2
Networkworld. Retrieved from
542,t=root+server&i=50620,00.asp