Dissertationen zum Thema „Multicast Domain Name System“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-48 Dissertationen für die Forschung zum Thema "Multicast Domain Name System" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Biolek, Martin. „Klientská aplikace protokolu DNS s grafickým rozhraním pro účely výuky“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442404.
Der volle Inhalt der QuelleFontanella, Shaun. „Indexing Geographic Information Using the Domain Name System“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345531139.
Der volle Inhalt der QuelleSchomp, Kyle Graham. „Complexity and Security of the Domain Name System“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1453329135.
Der volle Inhalt der QuelleMontes, Io. „Legal framework for domain names /“. [S.l.] : [s.n.], 2005. http://aleph.unisg.ch/hsgscan/hm00153322.pdf.
Der volle Inhalt der QuelleKarstensen, Lasse. „Skjult IP-kommunikasjon basert på Domain Name System (DNS)“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11320.
Der volle Inhalt der QuelleAhmed, Sarah 1975. „A scalable Byzantine fault tolerant secure domain name system“. Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8936.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 98-101).
The domain name system is the standard mechanism on the Internet to advertise and access important information about hosts. At its inception, DNS was not designed to be a secure protocol. The biggest security hole in DNS is the lack of support for data integrity authentication, source authentication, and authorization. To make DNS more robust, a security extension of the domain name system (DNSSEC) was proposed by the Internet Engineering task force (IETF) in late 1997. The basic idea of the DNS security extension is to provide data integrity and origin authentication by means of cryptographic digital signatures. However, the proposed extension suffers from some security flaws. In this thesis, we discuss the security problems of DNS and its security extension. As a solution, we present the design and implementation of a Byzantine-fault-tolerant domain name system. The system consists of 3f+1 tightly coupled name servers and guarantees safety and liveness properties assuming no more than f replicas are faulty within a small window of vulnerability. To authenticate communication between a client and a server to provide per-query data authentication, we propose to use symmetric key cryptography. To address scalability concerns, we propose a hierarchical organization of name servers with a hybrid of iterative and recursive query resolution approaches. The issue of cache inconsistency is addressed by designing a hierarchical cache with an invalidation protocol using leases. Because of the use of hierarchical state partitioning and caching to achieve scalability in DNS, we develop an efficient protocol that allows replicas in a group to request operations from another group using very few messages. We show that the scalable Byzantine-fault tolerant domain name system, while providing a much higher degree of security and reliability, performs as well or even better than an implementation of the DNS security extension.
by Sarah Ahmed.
M.Eng.
Eckhard, Rolf Andreas. „Das Domain-Name-System : eine kritische Bestandsaufnahme aus kartellrechtlicher Sicht /“. Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/spk/sbb/recht/toc/332838439.pdf.
Der volle Inhalt der QuelleSnyder, Mark E. „Critical infrastructure protection and the Domain Name Service (DNS) system“. Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.
Der volle Inhalt der QuelleVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
Sit, Emil 1977. „A study of caching in the Internet Domain Name System“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86513.
Der volle Inhalt der QuelleFilippi, Geoffrey George. „A High-Availability Architecture for the Dynamic Domain Name System“. Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32869.
Der volle Inhalt der QuelleDNS, DDNS, BGP, anycast, DHCP, replication, LDAP, multi-master, high-availability, reliability
The Domain Name System (DNS) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using the Dynamic Host Configuration Protocol (DHCP) can have their assigned IP addresses updated in a Dynamic DNS (DDNS). DNS and DDNS are critical components of the Internet. Most applications use host names rather than IP addresses, allowing the underlying operating system (OS) to translate these host names to IP addresses on behalf of the application. When the DDNS service is unavailable, applications that use DNS cannot contact the hosts served by that DDNS server. Unfortunately, the current DDNS implementation cannot continue to operate under failure of a master DNS server. Although a slave DNS server can continue to translate names to addresses, new IP addresses or changes to existing IP addresses cannot be added. Therefore, those new hosts cannot be reached by the DDNS.
A new architecture is presented that eliminates this single point of failure. In this design, instead of storing resource records in a flat text file, all name servers connect to a Lightweight Directory Access Protocol (LDAP) directory to store and retrieve resource records. These directory servers replicate all resource records across each other using a multi-master replication mechanism. The DHCP servers can add records to any of the functioning DNS servers in event of an outage. In this scheme, all DNS servers use the anycast Border Gateway Protocol (BGP). This allows any of the DNS servers to answer queries sent to a single IP address. The DNS clients always use the same IP address to send queries. The routing system removes routes to non-functional name servers and delivers the request to the closest (according to network metrics) available DNS server.
This thesis also describes a concrete implementation of this system that was created to
demonstrate the viability of this solution. A reference implementation was built in a laboratory to
represent an Internet Service Provider (ISP) with three identical regions. This implementation
was built using Quagga as the BGP routing software running on a set of core routers and on each
of the DNS servers. The Berkeley Internet Name Daemon (BIND) was used as an
implementation of the DNS. The BIND Simplified Database Backend (SDB) interface was used
to allow the DNS server to store and retrieve resource records in an LDAP directory. The Fedora
Directory Server was used as a multi-master LDAP directory. DHCP service was provided by
the Internet Systems Consortium's (ISC) DHCP server.
The objectives for the design were high-availability, scalability and consistency. These
properties were analyzed using the metrics of downtime during failover, replication overhead,
and latency of replication. The downtime during failover was less than one second. The precision
of this metric was limited by the synchronization provided by the Network Time Protocol (NTP)
implementation used in the laboratory. The network traffic overhead for a three-way replication
was shown to be only 3.5 times non-replicated network traffic. The latency of replication was
also shown to be less than one second. The results show the viability of this approach and
indicate that this solution should be usable over a wide area network, serving a large number of
clients.
Master of Science
Radwan, Marwan Mohammed Mahmoud. „The domain name system advisor : a model-based quality assurance framework“. Thesis, University of Leicester, 2017. http://hdl.handle.net/2381/40135.
Der volle Inhalt der QuelleKrumpholz, Otfried. „Rechtsfragen von Domain-Namen : eine empirische und dogmatische Untersuchung zivilrechtlicher Probleme, die durch die Benutzung von Domain-Namen im Internet aufgeworfen werden, insbesondere im Namens- und Kennzeichenrecht /“. Frankfurt am Main [u.a.] : Lang, 2003. http://www.gbv.de/dms/spk/sbb/recht/toc/365197262.pdf.
Der volle Inhalt der QuelleFlorstedt, Jens. „www.kennzeichenidentitaet.de : zur Kollision von Kennzeichen bei Internet-Domain-Namen /“. Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/spk/sbb/recht/toc/332347907.pdf.
Der volle Inhalt der QuelleBuri, Ueli. „Die Verwechselbarkeit von Internet Domain Names : nach schweizerischen Firmen-, Marken-, Namens- und Lauterbarkeitsrecht /“. Bern : Stämpfli, 2000. http://www.gbv.de/dms/spk/sbb/recht/toc/311257828.pdf.
Der volle Inhalt der QuelleAlavi, Ali. „The use of domain name system for dynamic references in an online library“. Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/37716.
Der volle Inhalt der QuelleKanz, Christine. „Zum Kennzeichenrecht im Internet : eine Untersuchung der Verletzungsansprüche des Kennzeicheninhabers unter Berücksichtigung deutscher und amerikanischer Spruchpraxis /“. Frankfurt am Main [u.a.] : Lang, 2002. http://www.gbv.de/dms/sbb-berlin/34909425X.pdf.
Der volle Inhalt der QuelleWilliams, Elizabeth A. „The Globalisation Of Regulation And Its Impact On The Domain Name System : Domain Names And A New Regulatory Economy“. Queensland University of Technology, 2003. http://eprints.qut.edu.au/15901/.
Der volle Inhalt der QuellePare, Daniel J. „Internet governance in transition : just who is the master of this domain?“ Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324190.
Der volle Inhalt der QuelleKunze, Andreas. „Private Nutzungsrechte an Internetdomains im System des Namens- und Kennzeichenrechts“. Baden-Baden Nomos, 2009. http://d-nb.info/995316325/04.
Der volle Inhalt der QuelleMei, Yuanxun. „Anti-phishing system : Detecting phishing e-mail“. Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2089.
Der volle Inhalt der QuelleBecause of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.
The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts. Another goal is to design an anti-phishing system which can detect the phishing e-mails and then perform some operations to protect the users. Since this is a big project, I will focus on the mail detecting part that is to analyze the detected phishing emails and extract details from these mails.
A list of the most important information of this phishing mail is extracted, which contains “mail subject”, “ mail received date”, “targeted user”, “the links”, and “expiration and creation date of the domain”. The system can presently extract this information from 40% of analyzed e-mails.
Castillo-Pérez, Sergio. „Contributions to Privacy and Anonymity on the Internet Domain Name System and Second-Generation Onion Routing“. Doctoral thesis, Universitat Autònoma de Barcelona, 2017. http://hdl.handle.net/10803/403775.
Der volle Inhalt der QuelleTodos los días nuestra actividad en Internet deja rastros de nosotros mismos y de nuestra forma de vida a través del almacenamiento de una gran cantidad de información personal, convirtiéndose en lo que llamamos nuestra identidad digital. Hoy en día, el seguimiento de las actividades de los usuarios correlacionado con tales identidades digitales se ha convertido en uno de los principales intereses de no sólo compañías privadas, sino también de gobiernos. La naturaleza de este interés obedece a diferentes motivaciones: comerciales, políticas, vigilancia o censura entre otras. Además, el crecimiento exponencial de los datos disponibles y las capacidades de procesarlos ha conducido a una situación aún peor. En respuesta a estas circunstancias, la demanda de tecnologías que preservan la privacidad y el anonimato se ha incrementado por parte de los usuarios preocupados. En esta línea, en el mar de datos que llamamos Internet, algunos de los protocolos subyacentes que soportan su funcionamiento están en detrimento de la preservación de las propiedades de privacidad mencionadas. El sistema de nombres de dominio (DNS) es un claro ejemplo, especialmente si consideramos que casi todas las actividades en Internet comienzan por una petición DNS. De hecho, cuando el sistema DNS fue diseñado a principios de los ochenta no se pretendió garantizar la privacidad de las peticiones realizadas por personas. En este sentido, su diseño subyacente está siendo insuficiente para hacer frente a los cambios e innovaciones de la Internet de hoy. Por el contrario, durante los últimos años, la red Tor se ha convertido en una de las redes superpuestas más populares para la anonimización de tráfico TCP. Tor es un sistema de anonimato de baja latencia que se puede instalar como una aplicación de usuario final en una amplia gama de sistemas operativos, lo que permite redirigir el tráfico a través de una serie de túneles de anonimización virtuales. De esta manera, los usuarios pueden utilizar los servicios de red a través de Internet sin comprometer su privacidad. Además, se emplea como herramienta extremadamente eficaz para eludir la censura, lo que posibilita a sus usuarios conectarse a recursos bloqueados. Esta tesis doctoral se centra precisamente en contribuir en estos dos temas antes mencionados —el protocolo DNS y la red Tor— a través del estudio de los problemas de privacidad y anonimato, y reforzando las soluciones actuales. De forma más precisa, nuestros esfuerzos de investigación se centran en (1) El abuso del protocolo DNS realizado por parte de botnets y cómo podemos detectar tales fines maliciosos, (2) La falta de privacidad del protocolo DNS y cómo podemos mejorarla, y (3) De que manera podemos incrementar el rendimiento de la red Tor mientras que la seguridad se preserva.
Everyday all our activity in Internet leaves traces of ourselves and of our way of life through the storing of a big amount of personal data, becoming what we call our digital identity. Nowadays, the tracking of the user activities correlated with such digital identities has become one of the principal interest of not only private companies, but also governments. The nature of such interest can obey to different motivations: business, politics, surveillance or censorship among others. Moreover, the exponential growth of the available data and the capabilities to process it has lead to a worst situation. In response to these circumstances, the demand of privacy-preserving and anonymous technologies has been increased on the part of concerned users. In this line, in the sea of data which we call Internet, some of the underlying protocols that are underpinning its operation are detrimental to the safeguarding of the aforementioned privacy properties. The Domain Name System (DNS) is clearly an example of one of such protocols, specially if we consider that almost every activity on the Internet starts with a DNS query. In fact, when DNS was designed inthe early eighties it was not intended to guarantee the privacy of people’s queries. In that sense, its underlying design is becoming insufficient to face the changes and innovations of today’s Internet. In contrast, during the recent years, the Tor network has become one of the most popular overlay networks for anonymising TCP traffic. Tor is a low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems, allowing to redirect the traffic through a series of anonymising virtual tunnels. In such a way, users can use network services over Internet without compromising their privacy. Also, it is employed as en extremely effective censorship circumvention tool, allowing to its users to connect against blocked resources. This dissertation is precisely focused on contributing to these two aforementioned topics —the DNS protocol and the Tor network— by studying the related privacy and anonymity problems and reinforcing current solutions. More precisely, our research efforts are centered on (1) The abuse of the DNS protocol performed by botnets and how we can detect such malicious purpose, (2) The lack of privacy of the DNS protocol and how we can improve it, and (3) How we can enhance the performance of the Tor network while security is preserved.
Victors, Jesse. „The Onion Name System| Tor-powered distributed DNS for tor hidden services“. Thesis, Utah State University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598486.
Der volle Inhalt der QuelleTor hidden services are anonymous servers of unknown location and ownership who can be accessed through any Tor-enabled web browser. They have gained popularity over the years, but still suffer from major usability challenges due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced distributed DNS that allows users to reference a hidden service by a meaningful globally-unique verifiable domain name chosen by the hidden service operator. We introduce a new distributed self-healing public ledger and construct OnioNS as an optional backwards-compatible plugin for Tor on top of existing hidden service infrastructure. We simplify our design and threat model by embedding OnioNS within the Tor network and provide mechanisms for authenticated denial-of-existence with minimal networking costs. Our reference implementation demonstrates that OnioNS successfully addresses the major usability issue that has been with Tor hidden services since their introduction in 2002.
Nekuža, Karel. „Nasazení DNSSEC na klientské straně“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377019.
Der volle Inhalt der QuelleLundström, Jonatan. „Orphaned DNS Records“. Thesis, Luleå tekniska universitet, Datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86428.
Der volle Inhalt der QuelleThis document is a technical report on the development of a Lambda function, the purpose of which is to look for orphaned (dangling) Domain Name System (DNS) records in AWS’ Route 53. These records can open up serious vulnerabilities as they have the potential to misdirect clients to end-points other than the one they think they are accessing; something which can be the cause of malicious intent. This is particularly an issue in cloud platforms that offer the ability to lease IPs from their own pool of addresses, as said addresses go back into the pool once they are released by the lessee. These addresses are then able to be leased by anyone with access to AWS and could, as such, lease addresses until they happen upon one that has a corresponding orphaned record somewhere and redirect sensitive data to themselves. The resulting function is written in Python 3.9.4 and integrated into AWS via Lambda. It functions by assuming roles in specified accounts in order to fetch DNS records and Elastic IPs from these accounts, which it then tries to match in order to determine whether or not they are orphaned. Any orphaned records found are then compiled into a list containing the account ID and URL of each record which is then sent out to the appropriate parties through AWS SNS.
Likarish, Peter F. „Early detection of malicious web content with applied machine learning“. Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Der volle Inhalt der QuelleAlipour, Hamid Reza. „An Anomaly Behavior Analysis Methodology for Network Centric Systems“. Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/305804.
Der volle Inhalt der QuelleFilipová, Fuchsová Regina. „Dynamika obchodního modelu v telekomunikacích“. Doctoral thesis, Vysoká škola ekonomická v Praze, 2002. http://www.nusl.cz/ntk/nusl-77117.
Der volle Inhalt der QuelleFau, Jean. „La régulation du conflit impliquant le nom de domaine : articulation des sources“. Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22017.
Der volle Inhalt der QuelleDomain names are polymorphic objects, whose nature is both technical and semantic. The question of their regulation has quickly become, with the rapid growth of the Domain Name System, a major challenge for the lawmaker. A certain default of state law favored the development of what one might call a private supplementary corpus. This is notably the case for extrajudicial domain name dispute resolution mechanisms promoted by the ICANN. These various transnational mechanisms form a coherent whole, in constant evolution, which can be described as a real lex domainia. This concept, however, necessarily implies a pluralistic conception of law - where public, private and hybrid systems cohabit -, which invites legal theorists to rethink the sources theory. This thesis contributes to the understanding of the nature and the articulation of these various normative spheres. These should not be regarded as closed and hermetic spaces ; permeabilities exist between them, that draw a transnational regulation pattern with plural sources. This is, according to the author, a perfect illustration of the mesh theory
Kim, Dae Wook. „Data-Driven Network-Centric Threat Assessment“. Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Der volle Inhalt der QuelleBricteux, Caroline. „Régulation de l'Internet par les noms de domaine. Le régime juridique et institutionnel de l'ICANN“. Doctoral thesis, Universite Libre de Bruxelles, 2019. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/284381.
Der volle Inhalt der QuelleDoctorat en Sciences juridiques
info:eu-repo/semantics/nonPublished
Pires, Luis Paulo Gon?alves. „Alta disponibilidade: uma abordagem com DNS e Proxy Reverso em Multi-Cloud“. Pontif?cia Universidade Cat?lica de Campinas, 2016. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/904.
Der volle Inhalt der QuelleMade available in DSpace on 2017-02-01T13:15:39Z (GMT). No. of bitstreams: 1 LUIS PAULO GONCALVES PIRES.pdf: 3166033 bytes, checksum: 043d546bf3a8212c07798369bfcc2f7f (MD5) Previous issue date: 2016-12-15
Pontif?cia Universidade Cat?lica de Campinas ? PUC Campinas
While there is considerable enthusiasm for the migration of on-premise data centers to cloud computing services, there is still some concern about the availability of these same services. This is due, for example, to historical incidents such as that in 2011, when a crash on Amazon's servers caused sites of several of its customers to go down for almost 36 hours. In view of this, it becomes necessary to develop strategies to guarantee the availability offered by the providers. In the present work, a solution is proposed, which implements high availability in Multi-Cloud environments, through the distribution of DNS access and the use of reverse proxy. A financial analysis was also carried out, taking into account market values in Cloud Computing services, which showed that the proposed solution may even be advantageous with respect to the traditional one. Specifically, a Multi-Cloud system, consisting of two Clouds with 99.90% availability each, provides total availability of 99.999%, and it costs 34% less than a single Cloud with 99.95% availability. The simulation results, obtained in a virtualized environment, using two Clouds, with availability of 99.49% and 99.43%, showed a system availability of 99.9971%. In this way, using Multi-Cloud systems it is possible to obtain high availability systems, from lower availability Clouds, according to user?s needs, besides saving with provider services costs.
A despeito de haver consider?vel entusiasmo quanto ? migra??o de data-centers on-primese para servi?os de Cloud Computing, ainda existe certo receio no que se refere ? disponibilidade destes mesmos servi?os. Isso se deve, por exemplo, a incidentes hist?ricos como o ocorrido em 2011, quando uma falha nos servidores da Amazon fez com que sites de v?rios de seus clientes ficassem fora do ar por quase 36 horas. Em vista disso, torna-se necess?rio desenvolver estrat?gias para garantir a disponibilidade oferecida pelos provedores. No presente trabalho, descreve-se uma solu??o que implementa alta disponibilidade em ambientes Multi-Cloud, mediante a distribui??o de acesso por DNS e a utiliza??o de proxy reverso. Realizou-se tamb?m uma an?lise financeira, levando-se em conta valores de mercado em servi?os de Cloud Computing, o que mostrou que a solu??o proposta pode ser mesmo vantajosa com a rela??o ? solu??o tradicional. Especificamente, um sistema Multi-Cloud, composto por duas Clouds com disponibilidade de 99,90%, que prov? disponibilidade total de 99,999%, custa 34% menos do que uma ?nica Cloud com disponibilidade de 99,95%. Os resultados de simula??o, obtidos em ambiente virtualizado, utilizando-se duas Clouds, com disponibilidades de 99,49% e 99,43%, alcan?aram disponibilidade 99,9971%. Desta forma, utilizando-se sistemas Multi-Cloud ? poss?vel se obter sistemas de alta disponibilidade, de acordo necessidade do usu?rio, a partir de Clouds de mais baixa disponibilidade, al?m de ser poss?vel economizar com os custos dos servi?os do provedor.
Scarlato, Michele. „Sicurezza di rete, analisi del traffico e monitoraggio“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Der volle Inhalt der QuelleTang, Chang-Hung, und 唐長鴻. „On Domain Name System of Private Domain“. Thesis, 2003. http://ndltd.ncl.edu.tw/handle/70940346081650567113.
Der volle Inhalt der Quelle淡江大學
資訊管理學系
91
Most of TCP/IP applications on Internet use domain name as identification with both sites. But, the Domain Name System we use nowadays is not suitable for applications over private domain. So, at first this topic has some discussions about addressing and naming on Internet, and restriction to applications on private domain supported by domain name system. And, how to support domain name of private domain is provided, and their features and adaptation are pointed out. At last, this topic will provide a new architecture, Private Domain Name System, aiding Domain Name System in order to support applications for private domain. Besides, Virtual TCP Connection is developed as the aided module in this research in order to implement PDNS.
Jeng-Wei, Lin. „Internationalized Domain Name Resolution System and Its Localization“. 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2801200503272900.
Der volle Inhalt der QuelleTang, Wei-Li, und 唐瑋勵. „Design of Tunneling VoIP through Domain Name System“. Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14220392125234766580.
Der volle Inhalt der Quelle國立暨南國際大學
資訊工程學系
98
Domain Name System (DNS) is an essential service in Internet. It has been widely deployed in almost every network. We usually use DNS to resolve hostnames and IP addresses, but the functionality of DNS is not limited to resolution between name and address. There is various host information that DNS can provide. As its high availability and bidirectional communication characteristic, we consider other practical applications of DNS. The concept of DNS tunneling has been implemented by hackers to discuss exceptional usages and vulnerabilities in the design of DNS. Many implementations were designed to transmit IP packets over DNS, and widely used in restricted network environments. However, in some situations the capabilities of DNS service may differ drastically and DNS tunneling may become useless. In this thesis, we consider Voice over Internet Protocol (VoIP) which has recently become a popular service. We study the technical issues in transmitting VoIP traffic over DNS in various network environments, especially in Public Wireless LAN. This thesis introduces a dedicated DNS tunneling design and shows the voice traffic can be transmitted in a strict manner with high performance.
Kara, Abdullah Mert. „Malicious Payload Distribution Channels in Domain Name System“. Thesis, 2013. http://spectrum.library.concordia.ca/978079/1/Kara_MASc_S2014.pdf.
Der volle Inhalt der QuelleCHEN, JYUN-HONG, und 陳俊宏. „Domain Name System Amplification Attack Resolution and Defense“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/46avda.
Der volle Inhalt der Quelle國立雲林科技大學
資訊管理系
105
Domain Name System Amplification Attack (DNS) has been a very common attack type in recent years. As the network grows, it is easy to achieve Denial of Service (DoS) attacks. Paralyze the victim's network, so that the victims can not be normal operation. But also can set the power of the crowd at the same time decentralized distributed denial of service attacks (Distributed Denial of Service, DDoS) is to allow users a headache. Many DNS servers have solutions to this problem, such as the ACL (Access Control List) restriction, the close recursive query function, and so on, can be effectively attacked or exploited to attack the DNS attack attacks. Of the DNS server for adequate protection. But for the end user does not provide good protection measures. In this paper, we study the protection rules of the DNS server and the intrusion detection system based on DNS and the open source intrusion detection system, and combine the characteristics of the attack packets to make the intrusion detection system provide the security of end-user protection DNS amplification attack. Protection. In this paper, an effective DNS amplification attack prevention rule is formulated, so that the internal network server or the end user can have a good security environment not to be amplified attack. This rule can be combined with the intrusion detection system inline mode (Inline Mode) with the firewall can be the actual block (drop, block ... and other actions), or just observe and does not affect the actual flow of the detection mode (Sniffer Mode) , Are can be used with the demand environment. Keywords:DNS, Amplification Attack, DDOS, Snort, intrusion detection systems
Lin, Jeng-Wei, und 林正偉. „Internationalized Domain Name Resolution System and Its Localization“. Thesis, 2005. http://ndltd.ncl.edu.tw/handle/89817967506255460856.
Der volle Inhalt der Quelle國立臺灣大學
資訊工程學研究所
93
In recent years, many attempts have been made to lower the linguistic barriers for non-native English speakers wishing to access the Internet. However, traditional Internet domain names are restricted to being composed of ASCII letters, digits, and hyphens – abbreviated as LDH. In 1999, Internationalized Domain Names, (IDN), were introduced to allow an individual or organization to register a domain name in any major language – from Chinese to Russian to Arabic. In March 2003, IETF published three RFC (Requests for Comments) documents, referred to as IDNA, nameprep, and punycode, as the IETF Internet standard for IDN. These documents specify a name-preparation process for converting a Unicode IDN to an ASCII Compatible Encoding (ACE) string. Once an IDN is registered in an IDN registry, the latter stores the ACE string in the domain name server. When an IDNA-aware application looks for a host using its IDN, the application converts the IDN to an ACE string so that the current DNS can resolve the ACE string into the host''s IP address. However, some domain name strings embedded in multilingual content do not have any charset encoding tag, so they cannot be appropriately converted to the corresponding Unicode IDNs and, thus, the ACE strings. Although, IDNA can use the current DNS without modifying domain name servers and resolvers, it does require that an IDNA-compliant module be integrated into every Internet application in order to process IDNs properly. Through our participation in IDN-related activities, we observed that many Internet applications allow the use of non-ASCII characters in domain name slots. This motivated us to design an IDN server proxy architecture that provides IDN resolution in multiple encodings. In this architecture, ACE IDNs are stored in the domain name servers; hence, traditional domain name servers can be used without modification. An IDN server proxy, called Octopus, is employed on the domain name server side to facilitate servers by providing non-ACE IDN resolution. On receipt of a DNS query packet, Octopus converts the non-ACE IDN to ACE. The ACE string is then forwarded to backend domain name servers (where the traditional domain names and ACE IDNs are stored) for further processing. Based on the design and implementation of Octopus, we initiated a CDN trial service to further investigate the interoperability of Internet applications when CDNs are used. We studied several types of errors that cause unsuccessful WWW access via IDNs, such as improper web server configuration, generic multilingual text processing errors, etc. Solutions were then developed, including the use of an IDN-aware web redirection server. While Internet services can be significantly improved by introducing IDNs, the use of characters that have similar appearances and/or meanings has the potential to cause confusion. The introduction of IDNs has raised serious consumer concerns about the likelihood of widespread user confusion, new opportunities for cybersquatting, etc. IDNA does not address linguistic issues, such as Han character variants. Two Han characters are said to be variants of each other if they have the same meaning and are pronounced the same. A variant IDN derived from an IDN by replacing some characters with their variants should match the original IDN. In April 2004, IETF published RFC 3743, referred to the JET Guidelines, for the registration and administration of Chinese, Japanese, and Korean IDNs. The JET Guidelines suggest that zone administrators model the concept of equivalent IDLs (Internationalized Domain Labels) as an atomic IDL package based on zone-specific Language Variant Table (LVT) mechanisms. However, the Guidelines do not address various technical implementation issues. For example, an issue of scalability arises when the number of variant IDLs is large. We propose a resolution protocol that resolves the variant IDLs in an IDL package into its registered IDL with the help a small number of VarIdx RRs (resource records). In this process, each VarIdx RR uses a variant expression to enumerate some of the variant IDLs. An indexing function is designed to give the same variant index to the variant IDLs enumerated by a variant expression. This allows Internet applications to use one of the variant IDLs to look up the VarIdx RRs and find the registered IDL. We have studied different indexing functions. Experiment results show that, although individual zones may have their own rules about permitted characters and the variant relationships of these characters, an indexing function does exist for global use. We set up a redirection service that enables users to access the WWW via variant IDNs. The domain name servers are configured to return the IP address of the redirection server to the client when the queried domain name is not registered. The user request is then sent to the redirection server, which computes the variant index of the unregistered label and looks up the VarIdx RRs. If the right VarIdx RR is located, the server redirects the user request to the new URL by replacing the variant IDL with the registered IDL. Experiment results show that our resolution protocol successfully enables Internet access via variant IDNs. In this research, we first extend the functionality of the current DNS by providing IDN resolution in multiple encodings, and then extend it further by providing variant IDN resolution. Our study also suggests useful practices for software vendors to develop INDA-compliant Internet applications. While extending the functionality of DNS, we retain backward compatibility and reuse existing software as much as possible. Our study provides useful reference for software engineers to extend the functionality of a widely deployed system.
Lu, Yi-Shen, und 盧奕伸. „The Email solution on the Private Domain Name System“. Thesis, 2006. http://ndltd.ncl.edu.tw/handle/05948743973776549572.
Der volle Inhalt der Quelle淡江大學
資訊管理學系碩士班
94
The Domain Name System that we use to identify host address on Internet nowadays is not suitable for applications over private domain. Hence, a new architecture called Private Domain Name System (PDNS) has been designed and produced to support applications of private domain. But, there is not any Email solution on PDNS architecture; in other words, all private domains on PDNS architecture can’t send Email to each other. This thesis points out the difficulty and restriction of send/receive Email which has private domain name (ex. use non-English languages) using current Email technology, and try to find a way compatible with current Email environment and let people no need to change original behavior and can send/receive such special Emails. At last, this thesis will design and offer a complete Email solution which is base on TCP/IP network and use SMTP protocol as Email transmission standard for user can send/receive Email that is using private domain name. In the solution, a new system called PDMA has been developed to connect Mailbox server, PDNS system and the client MUA s/w in the all mail system structure, responsible for the main Email transmission work. If any error happened during the Email transmitting, PDMA will send NDR (Not Delivery Report) to original Email sender. In order to support using non-English language Email address, this thesis also provides Mailbox server function for PDMA to store such special Email address to user mailbox file. In order to enable PDNS system to support PDMA to transmit the Email, this thesis also increases and develops two new functions on PDNS system. The solution provided by this thesis let network administrator dispose the Private Domain Mail System well fast under the environment of existing network; Let users no need extra education or training, can read/write/receive/send Private Domain Email easily; people also can utilize the theory in this thesis to implement Email address witch is defined by themselves, even if the Email address is defined with non-English languages, so Multi-Language Mail System can be implemented by the theory of this thesis. At last the implementation of "Chinese address Mail System" is provided to make an example for needing unit for referential use.
Chun-ying, Chiu, und 邱俊穎. „PWD-A Proxy-based Helping System for Chinese Web and Domain Name System“. Thesis, 2001. http://ndltd.ncl.edu.tw/handle/18795722501434329916.
Der volle Inhalt der Quelle國立中央大學
資訊工程研究所
89
World Wide Web has been the most popular service on the rapid growing Internet. Various native languages and characters could be delivered and shown on the web pages. But multi-language is not supported in current name resolving protocol-DNS which is the fundermantal base of Internet. Also the access of non-English users to the Internet with the popularity of computer network results in the highly requirement of using their native language on the Internet. Standard Chinese is written in two forms: Traditional Chinese (TC) and Simplified Chinese (SC) because of its historical background. The browsing of Chinese web pages via Chinese domain names causes lots of problems, which are (1) failure browsing between different forms of Chinese domain names and environments, (2) the uneasy way of Chinese URL input, and (3) the display of TC/SC content encoding and fonts. Multi-lingual DNS is under development for years, and remains drafts standard until today. In this paper, we focus on the problem related to the Chinese domain names, and analyze the problem source and existing solutions to the compatibility problems. The translation between TC and SC is very complicated; we refer to other studies and summarize the work as well. According to the Chinese domain names, web pages and the demand of online TC/SC translation, we applied a Chinese domain name registration and mapping method to set up a series approach to resolve Chinese domain name for the visiting between TC/SC URLs and web sites. We also implement a proxy-based helping system—PWD, composed of three major parts, Proxy, Web, and DNS. It helps users to use Chinese DNS and TC/SC web browsing. We illustrate the detail of system design and implementation compared to other systems. Our system is flexible and capable of changing its composition modules, which makes it more compatible and easier to use. In spite of the online TC/SC translation functionality, PWD provides a user interface for selecting the Chinese Web by mouse clicking.
Chen, Chia-wei, und 陳嘉偉. „Development of IP and Domain Name FilterUsing ARM9 Based Embedded System“. Thesis, 2010. http://ndltd.ncl.edu.tw/handle/36496365399030000655.
Der volle Inhalt der Quelle朝陽科技大學
資訊工程系碩士班
98
There are many pornographic or violence websites on the internet. This thesis designed a filter to screen the children from those bad websites. The device is not only an IP sharing router but also an IP and Country Code Top Level Domain (ccTLD) filter. The filter built on ARM9 based embedded system which using the S3C2410 chip and the Linux 2.6 operation system was portinged on it. The main filtering software used is the iptables and L7-filter classifier. The iptables can filter the predefined blacklist and L7-filter classifier can screen out the domain name belong the specific country (counter code top level domain). This filter was designed for general family to perform IP sharing and filter to screen out the pornographic or violence websites. This system using web based management interface which using the mini_httpd web server and the cgi programs to control the setting.
LIN, HAO-HSIANG, und 林皓翔. „Analyzing Domain Name System Log Data to Detect Suspicious Malicious Websites“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/yya8v7.
Der volle Inhalt der Quelle國立高雄大學
資訊管理學系碩士班
106
The growth of Internet technology brings a lot of convenience to people. There is an increasing number of people are becoming dependent on Internet. Browsing and getting information from Internet plays an important role in many people’s lives. Due to the Internet’s construction is getting more and more complicated, people are exposed to many security threats. Many victim hosts are infected by malware when users are surfing the web. In order to keep computers safe and secure on the Internet, finding a way to detect and identify the potential malware websites is necessary. In this paper, we propose an approach that uses the DNS query log data and implements the sequential pattern mining method to analyze any suspicious malware websites, suspicious intruded websites and infected victim hosts by import an exist malware domain name list. This approach could detect and identify the malware websites and suspicious intruded websites which are hidden by using the result of sequential pattern mining. By using the result of this research, the local area network administrator could recognize that how safe the users surfing on the local area network.
Chen, Yu. „IDNS [i.e. Incremental Domain Name System] : an efficient approach to portability and mobility support /“. Diss., 2002. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3075326.
Der volle Inhalt der QuelleTsai, Chih-Hong, und 蔡志宏. „The Internet Governance on Domain Name Legal System--Focus on ICANN and Its Operation“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/vecs7q.
Der volle Inhalt der Quelle國立交通大學
科技法律研究所
106
The Internet Governance on Domain Name Legal System — Focus on ICANN and Its Operation Abstract Domain Name is an essential core resource in the Internet. In its current operation, ICANN has played an indispensable role in whether and how to assign the domain name and how to maintain its just order of use. However, ICANN is not an international organization established by international law, but a non-profit private legal entity registered in California, U.S. Why this private legal entity established by a single nation can own such important authority in the global internet? The issue awareness of the dissertation is what the basis of its legal reason is, and what attitude to this phenomenon of each sovereign state shall adopt. In this regard, the dissertation explores the study of the organization principles and its operation of related system of ICANN. The dissertation also introduces two theories of the internet cyberspace governance: "Cyberspace Independence Theory" and "Cyberspace Sovereignty Theory", and sets forth each application and development. Later, the dissertation learns the theory of "Public and Private Partnership" from traditional administrative law and, therefore, advances the application of the new theory in the internet governance in order to interpret the legal basis of the internet leaded and developed by the private sector. In addition, the dissertation examines ICANN's governance effectiveness by industry data analysis and field interviews and comments the reasons of its effectiveness in response to the issue awareness of the dissertation. Lastly, the dissertation summarizes the principal theory the global internet governance should adopt and illustrates the inspiration provided by the global domain name governance to Taiwan as well as brings forward the conclusions and suggestions.
Matias, André Manuel Amaro. „Consolidação e optimização da monitorização e alarmística de sistemas da associação DNS.PT“. Master's thesis, 2015. http://hdl.handle.net/10451/18093.
Der volle Inhalt der QuelleA Associação DNS.PT, na qualidade de responsável pela gestão, registo e manutenção de domínios sob o Domínio de Topo Português (.pt), gere um serviço fundamental para o bom funcionamento da Internet Portuguesa. Este serviço necessita de constante monitorização quanto aos recursos utilizados, para garantir a disponibilidade e correto funcionamento. Neste contexto, é necessário que exista um sistema que recolha dados em tempo-real para monitorizar os recursos afetos ao serviço e que, caso existam indicadores que apresentem condições preocupantes, se despoletem os mecanismos certos para alarmística. O projeto apresenta um conjunto de tarefas de análise e crítica ao anterior sistema, permitindo estabelecer uma base para a criação de monitorização e alarmística que se adapte à realidade da Associação. Para concretizar o novo sistema de monitorização e alarmística, executou-se um conjunto de tarefas de implementação, com iterações de levantamento de requisitos, desenho e avaliação da solução, havendo sempre a preocupação de manter o útil e repensar o obsoleto. Numa primeira fase (de Setembro a Dezembro de 2013), fez-se o levantamento para perceber extensivamente quais os problemas a abordar, o que existia e o que precisava de ser mudado. Procedeu-se, também, à implementação de sistemas de monitorização auxiliar, como o DSC. A fase final do projeto (de Janeiro a Julho de 2014) consistiu em três etapas distintas: planeamento e desenho do novo sistema de monitorização e alarmística, implementação da solução, e criação de uma interface gráfica para esta. Esta última teve especial relevancia devido à importância que a apresentação dos dados representa para a Associação DNS.PT.
The Associação DNS.PT, in its role of manager, registry, and maintainer of the domains under the Portuguese Top Level Domain (.pt), manages a service fundamental to the well-being of the Portuguese Internet, and so, has the need for constant monitoring regarding the resources used to assure the availability of said service. In this context, it is vital that there is a system gathering data in real-time to monitor the resources tied to the services that the institution offers, and that, in the event of concerning values, the right alerting mechanisms are triggered. The project presents a set of tasks of analysis and criticism to the previous system, establishing a starting point for the creation of monitoring and alarming suited to the reality of the Associação, as well as a set of tasks for implementation of an information system, with iterations such as research, design and evaluation, in order to materialize the new monitoring and alarming system, always doing the best effort to maintain what was useful and rethink what was obsolete. In the first phase (from September through December of 2013), research was made to extensively understand what were the problems to address, what existed and what needed changing. During this time, implementation of auxiliary monitoring systems, such as the DSC, also took place. The final phase of this project (from January through July of 2014) consisted in three diferent stages: planning and design of the new monitoring and alarming system, implementation of the new system, and the creation of an interface for said system. This last stage assumed special relevance, because of the importance of how the data is presented to the Associação DNS.PT.
Malhotra, Aanchal. „Attacking and securing Network Time Protocol“. Thesis, 2019. https://hdl.handle.net/2144/39584.
Der volle Inhalt der QuelleSilvestro, Alessio. „Architectural Support for Implementing Service Function Chains in the Internet“. Doctoral thesis, 2018. http://hdl.handle.net/11858/00-1735-0000-002E-E5B4-7.
Der volle Inhalt der QuelleCruz, Manuel Duarte Ribeiro da. „Understanding and evaluating the Behaviour of DNS resolvers“. Master's thesis, 2018. http://hdl.handle.net/10362/59504.
Der volle Inhalt der Quelle