The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1 A Solution? Or just causing problems? Example IP address 216.237.61.99. Current needs suited? DNS Conversion Example FQDN www.example.com Current needs : • ? • ? • ? • ? 2 So where is the DNS heading and what's holding it back? Internet grows larger + Amount of users grows = Growing number of security risks. Security problems range from : • Phishing • Denial-of-service • Cache poisoning attacks 3 The structure of the present DNS 4 Primary and Secondary servers Primary Secondary •Stores a zone file •Responsibility for creating, maintaining and updating this file •Stores information about the zone onto a hard drive 5 Under the bonnet 6 It doesn’t always go to plan DoS Attack DoS = denial-of-service When a server receives too many queries the server can crash 7 Breaks, ECU and Clutch • Breaks, ECU and Clutch are the 3 most important parts of a car. ~~~~~~~~~~~Similarly in the DNS~~~~~~~~~~~ Root sever, inverse domain and caching • Root sever, inverse domain and caching are the 3 most important parts of the DNS. 8 It doesn’t always go to plan Cache poisoning Is where a fake record of address is submitted to the DNS and accepted. 9 Who has the Control? • The main organisation regulating the use of the DNS is the Internet Corporation for Assigned Names and Numbers (ICANN). • Data protection act 1998 which is controlled by the government and does have a significant influence on the internet. 10 Are we Safe and Secure? • The main limitation of the DNS is the security, but is anything being done to improve it? • Domain Naming System Security (DNSSEC) 11 The verdict As it stands the DNS does not satisfy current needs and has been held back for some time. Future But the new security protocol along with the new domains will allow the internet to grow into a smarter and safer internet. 12 End credits 1)Andrews, C. (n.d.). Train Track style TILER http://www.networkworld.com/news/tech/200 16) Shiels, M.(7.8.2008). Net address bug worse using.Train Stations as START/STOP. Retrieved 8/102008-tech-update.html than feared. Retrieved from fromhttp://www.mazecreator.com/maze_creat 10)Internet overhaul wins approval. http://news.bbc.co.uk/1/hi/technology/754655 or_gallery.php (26.6.2008). Retrieved from 7.stm 2) Brown, M. (2011). ICANN approves plan to http://news.bbc.co.uk/1/hi/technology/747598 17) Shiels, M. (15.6.2010). Technology allow almost any domain extension. 6.stm milestone heralds a more secure internet. Wired.co.uk. Retrieved from 11) Kerner, S.M. (8.3.2005). DNS-Based Phishing Retrieved from http://www.wired.co.uk/news/archive/2011- Attacks on The Rise. Retrieved from http://news.bbc.co.uk/1/hi/technology/874042 06/20/icann-approves-adding-more-gtlds http://www.enterprisenetworkingplanet.com/n 6.stm 3) Brownlee, N. & Nemeth, E. .(2001). DNS etsecur/article.php/3488266/DNSBased18) Talbot, D. (2011). Safeguards against Measurements at a Root Server .Retrieved from Phishing-Attacks-on-The-Rise.html "Phishing" Slow in Coming. Technology review. http://citeseer.ist.psu.edu/viewdoc/summary?d 12) Kawamoto, D. (17.3.2006). DNS recursion Retrieved from oi=10.1.1.154.9310 leads to nastier DoS attacks. Retrieved from http://www.technologyreview.com/computing/ 4)Crucial vote on Internet's future. (26.6.2008). http://www.zdnet.co.uk/news/security37817/ Retrieved from management/2006/03/17/dns-recursion-leads- 19) The Domain Name System (DNS).(n.d.) In http://news.bbc.co.uk/1/hi/technology/747488 to-nastier-dos-attacks-39257938/ the network encyclopedia. Retrieved from 9.stm 13) Lemos, R. (2009). DNS security Protocol http://www.thenetworkencyclopedia.com/d2.a 5) Data controller/Data subject.(n.d). In Internet Gains Momentum. Technology review. sp?ref=654 Rights Glossary. Retrieved from Retrieved from 20) UK domain name dispute rules could http://www.internetrights.org.uk/glossary.shtml http://www.technologyreview.com/computing/ change. (2007). Retrieved from http://www.out6) Denial-of-service attack.(n.d.). Retrieved from 23954/ law.com/page-7619 http://en.wikipedia.org/wiki/Denial-of14) Malware and cyber-crime. (n.d.). In 21) Williams, C. (29.10.2008). Mandelson's dept service_attack Parliament publications and records. Retrieved mulls UK internet power grab. Retrieved from 7) DNS (Domain Name System). (n.d.). Retrieved from http://www.theregister.co.uk/2008/10/29/berr from http://www.publications.parliament.uk/pa/cm2 _nominet/ http://en.kioskea.net/contents/internet/dns.ph 01012/cmselect/cmsctech/writev/mal/mal18.ht22) What are zone files and zone records?. p3 m (2011). Retrieved from 8)Foruzan,B.A. (2007). Data communications 15) Root server.(n.d.). In PCMAG.com http://help.godaddy.com/article/676 and networking 4th edition. McGraw Hill. encyclopaedia. Retrieved from 13 9) Hally, B. (2008). How DNS poisoning works. http://www.pcmag.com/encyclopedia_term/0,2 Networkworld. Retrieved from 542,t=root+server&i=50620,00.asp
© Copyright 2026 Paperzz