To see the other types of publications on this topic, follow the link: Multicast Domain Name System.

Dissertations / Theses on the topic 'Multicast Domain Name System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 dissertations / theses for your research on the topic 'Multicast Domain Name System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Biolek, Martin. "Klientská aplikace protokolu DNS s grafickým rozhraním pro účely výuky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442404.

Full text
Abstract:
The goal of the Master thesis on the topic of the Client application of DNS protocol with graphical interface for teaching purposes is to create a program with the features of sending, receiving DNS, MDNS and LLMNR protocols with optional parameters. Additionally, compare the created application with available tools such as Nslookup, Dig and create examples of application for teaching.
APA, Harvard, Vancouver, ISO, and other styles
2

Fontanella, Shaun. "Indexing Geographic Information Using the Domain Name System." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345531139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schomp, Kyle Graham. "Complexity and Security of the Domain Name System." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1453329135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Montes, Io. "Legal framework for domain names /." [S.l.] : [s.n.], 2005. http://aleph.unisg.ch/hsgscan/hm00153322.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karstensen, Lasse. "Skjult IP-kommunikasjon basert på Domain Name System (DNS)." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11320.

Full text
Abstract:
I denne rapporten undersøkes det om det er mulig å detektere IP-over-DNS -trafikk gjennom en navnetjener automatisk. Bakgrunn for oppgavevalget var et utsagn av Nussbaum m.fl. som sa at eneste mulighet en systemadministrator hadde for å begrense IP-over-DNS generelt var båndbreddebegrensninger av klienter. Dette er undersøkt i laboratoriet, og alle kjente måter for å gjøre IP-over-DNS er prøvd ut eksperimentelt.Rapporten gir to hovedbidrag: 1) det argumenteres for at det er mulig å detektere IP-over-DNS -trafikk automatisk og uten særlig mange falske alarmer, samt 2) gruppering av båndbreddeforbruk per mottakerdomene ser ut til å være den beste teknikken for å gjøre dette. Arbeidet er gjort eksperimentelt og iterativt, og kildekode som implementerer samtlige utprøvde teknikker er vedlagt.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Sarah 1975. "A scalable Byzantine fault tolerant secure domain name system." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8936.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 98-101).
The domain name system is the standard mechanism on the Internet to advertise and access important information about hosts. At its inception, DNS was not designed to be a secure protocol. The biggest security hole in DNS is the lack of support for data integrity authentication, source authentication, and authorization. To make DNS more robust, a security extension of the domain name system (DNSSEC) was proposed by the Internet Engineering task force (IETF) in late 1997. The basic idea of the DNS security extension is to provide data integrity and origin authentication by means of cryptographic digital signatures. However, the proposed extension suffers from some security flaws. In this thesis, we discuss the security problems of DNS and its security extension. As a solution, we present the design and implementation of a Byzantine-fault-tolerant domain name system. The system consists of 3f+1 tightly coupled name servers and guarantees safety and liveness properties assuming no more than f replicas are faulty within a small window of vulnerability. To authenticate communication between a client and a server to provide per-query data authentication, we propose to use symmetric key cryptography. To address scalability concerns, we propose a hierarchical organization of name servers with a hybrid of iterative and recursive query resolution approaches. The issue of cache inconsistency is addressed by designing a hierarchical cache with an invalidation protocol using leases. Because of the use of hierarchical state partitioning and caching to achieve scalability in DNS, we develop an efficient protocol that allows replicas in a group to request operations from another group using very few messages. We show that the scalable Byzantine-fault tolerant domain name system, while providing a much higher degree of security and reliability, performs as well or even better than an implementation of the DNS security extension.
by Sarah Ahmed.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Eckhard, Rolf Andreas. "Das Domain-Name-System : eine kritische Bestandsaufnahme aus kartellrechtlicher Sicht /." Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/spk/sbb/recht/toc/332838439.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Snyder, Mark E. "Critical infrastructure protection and the Domain Name Service (DNS) system." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2008.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
9

Sit, Emil 1977. "A study of caching in the Internet Domain Name System." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Filippi, Geoffrey George. "A High-Availability Architecture for the Dynamic Domain Name System." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32869.

Full text
Abstract:
A High-Availability Architecture for the Dynamic Domain Name System

DNS, DDNS, BGP, anycast, DHCP, replication, LDAP, multi-master, high-availability, reliability

The Domain Name System (DNS) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using the Dynamic Host Configuration Protocol (DHCP) can have their assigned IP addresses updated in a Dynamic DNS (DDNS). DNS and DDNS are critical components of the Internet. Most applications use host names rather than IP addresses, allowing the underlying operating system (OS) to translate these host names to IP addresses on behalf of the application. When the DDNS service is unavailable, applications that use DNS cannot contact the hosts served by that DDNS server. Unfortunately, the current DDNS implementation cannot continue to operate under failure of a master DNS server. Although a slave DNS server can continue to translate names to addresses, new IP addresses or changes to existing IP addresses cannot be added. Therefore, those new hosts cannot be reached by the DDNS.

A new architecture is presented that eliminates this single point of failure. In this design, instead of storing resource records in a flat text file, all name servers connect to a Lightweight Directory Access Protocol (LDAP) directory to store and retrieve resource records. These directory servers replicate all resource records across each other using a multi-master replication mechanism. The DHCP servers can add records to any of the functioning DNS servers in event of an outage. In this scheme, all DNS servers use the anycast Border Gateway Protocol (BGP). This allows any of the DNS servers to answer queries sent to a single IP address. The DNS clients always use the same IP address to send queries. The routing system removes routes to non-functional name servers and delivers the request to the closest (according to network metrics) available DNS server.

This thesis also describes a concrete implementation of this system that was created to demonstrate the viability of this solution. A reference implementation was built in a laboratory to represent an Internet Service Provider (ISP) with three identical regions. This implementation was built using Quagga as the BGP routing software running on a set of core routers and on each of the DNS servers. The Berkeley Internet Name Daemon (BIND) was used as an implementation of the DNS. The BIND Simplified Database Backend (SDB) interface was used to allow the DNS server to store and retrieve resource records in an LDAP directory. The Fedora Directory Server was used as a multi-master LDAP directory. DHCP service was provided by the Internet Systems Consortium's (ISC) DHCP server. The objectives for the design were high-availability, scalability and consistency. These properties were analyzed using the metrics of downtime during failover, replication overhead, and latency of replication. The downtime during failover was less than one second. The precision of this metric was limited by the synchronization provided by the Network Time Protocol (NTP) implementation used in the laboratory. The network traffic overhead for a three-way replication was shown to be only 3.5 times non-replicated network traffic. The latency of replication was also shown to be less than one second. The results show the viability of this approach and indicate that this solution should be usable over a wide area network, serving a large number of clients.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
11

Radwan, Marwan Mohammed Mahmoud. "The domain name system advisor : a model-based quality assurance framework." Thesis, University of Leicester, 2017. http://hdl.handle.net/2381/40135.

Full text
Abstract:
The Domain Name System (DNS) has a direct and strong impact on the performance of nearly all aspects of the Internet. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses require resolving the names of the servers responsible for those names. The recursive graphs of the inter-dependencies that exist between servers associated with each zone are called Dependency Graphs. We constructed a DNS Dependency Model as a unified representation of these Dependency Graphs. We utilized a set of Structural Metrics defined over this model as indicators of external quality attributes of the DNS. We applied machine learning in order to construct Prediction Models of the perceived quality attributes of the DNS out of the structural metrics of the model and evaluate the accuracy of these models. Operational Bad Smells are configuration and deployment decisions, made by zone administrators, that are not totally errant or technically incorrect and do not currently prevent the system from doing its designated functionality. Instead, they indicate weaknesses that may impose additional overhead on DNS queries, or increase system vulnerability to threats, or increase the risk of failures in the future. We proposed the ISDR (Identification, Specification, Detection and Refactoring) Method that enables DNS administrators to identify bad smells on a high-level abstraction using a consistent taxonomy and reusable vocabulary. We developed techniques for systematic detection and recommendations of reaction mechanisms in the form of graph-based refactoring rules. The ISDR Method along with the DNS Quality Prediction Models are used to build the DNS Quality Assurance Framework and the DNS Advisor Tool. Assessing the perceived quality attributes of the DNS at an early stage enables us to avoid the implications of defective and low-quality designs. We identify configuration changes that improve the availability, security, stability and resiliency postures of the DNS.
APA, Harvard, Vancouver, ISO, and other styles
12

Krumpholz, Otfried. "Rechtsfragen von Domain-Namen : eine empirische und dogmatische Untersuchung zivilrechtlicher Probleme, die durch die Benutzung von Domain-Namen im Internet aufgeworfen werden, insbesondere im Namens- und Kennzeichenrecht /." Frankfurt am Main [u.a.] : Lang, 2003. http://www.gbv.de/dms/spk/sbb/recht/toc/365197262.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Florstedt, Jens. "www.kennzeichenidentitaet.de : zur Kollision von Kennzeichen bei Internet-Domain-Namen /." Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/spk/sbb/recht/toc/332347907.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Buri, Ueli. "Die Verwechselbarkeit von Internet Domain Names : nach schweizerischen Firmen-, Marken-, Namens- und Lauterbarkeitsrecht /." Bern : Stämpfli, 2000. http://www.gbv.de/dms/spk/sbb/recht/toc/311257828.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Alavi, Ali. "The use of domain name system for dynamic references in an online library." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/37716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kanz, Christine. "Zum Kennzeichenrecht im Internet : eine Untersuchung der Verletzungsansprüche des Kennzeicheninhabers unter Berücksichtigung deutscher und amerikanischer Spruchpraxis /." Frankfurt am Main [u.a.] : Lang, 2002. http://www.gbv.de/dms/sbb-berlin/34909425X.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Williams, Elizabeth A. "The Globalisation Of Regulation And Its Impact On The Domain Name System : Domain Names And A New Regulatory Economy." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15901/.

Full text
Abstract:
This is a multidisciplinary work that encompasses considerations of politics, regulation and technology. It considers the impact of technology on the way in which, politically, we are able to regulate technology and how we devise policy to guide that regulation. The added complication is that Internet technology knows no jurisdiction. The rulemaking established in recent years is globally applicable and is carried out without the direct involvement of national governments in the key decision making processes, particularly in the environment under examination here which focuses on the management of the technical resources of the Internet. In formulating the hypothesis that grounds this work, I have focused on two things. Firstly, that technical regulation has political, and therefore, policy implications. Secondly, that where there are policy implications with direct commercial impact, we can expect to see the vigorous involvement of corporations as they manage the environment in which they do business. These two critical conditions have driven the formulation of policies and procedures for making decisions about Internet governance. They have also driven the actual decisions which have been implemented, to a greater or lesser degree of success. This research contributes to the scholarship in four significant ways. The first is that the Internet Domain Name System (IDNS) and its governance present a new perspective on the discussion of the globalisation of business regulation. The data used to support the analysis has not been collated or examined previously and is presented here to illustrate the extension of the literature and to frame the hypothesis. The second is that I have found that national governments have, despite ongoing control within their national jurisdiction, little effective influence over the management and governance of the Domain Name System (DNS) at an international level. Thirdly, I have found that corporations have significant power to determine the way in which policies for the management of the technical resources of the Internet are discussed, developed to consensus policy positions, implemented and reviewed. Finally, the research has opened up new lines of inquiry into the rise of a new class of bureaucrats, the cosmocrats and their cosmocracy, on which further research continues.
APA, Harvard, Vancouver, ISO, and other styles
18

Pare, Daniel J. "Internet governance in transition : just who is the master of this domain?" Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kunze, Andreas. "Private Nutzungsrechte an Internetdomains im System des Namens- und Kennzeichenrechts." Baden-Baden Nomos, 2009. http://d-nb.info/995316325/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mei, Yuanxun. "Anti-phishing system : Detecting phishing e-mail." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2089.

Full text
Abstract:

Because of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.

The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts. Another goal is to design an anti-phishing system which can detect the phishing e-mails and then perform some operations to protect the users. Since this is a big project, I will focus on the mail detecting part that is to analyze the detected phishing emails and extract details from these mails.

A list of the most important information of this phishing mail is extracted, which contains “mail subject”, “ mail received date”, “targeted user”, “the links”, and “expiration and creation date of the domain”. The system can presently extract this information from 40% of analyzed e-mails.

APA, Harvard, Vancouver, ISO, and other styles
21

Castillo-Pérez, Sergio. "Contributions to Privacy and Anonymity on the Internet Domain Name System and Second-Generation Onion Routing." Doctoral thesis, Universitat Autònoma de Barcelona, 2017. http://hdl.handle.net/10803/403775.

Full text
Abstract:
Tots els dies la nostra activitat a Internet deixa rastres de nosaltres mateixos i de la nostra forma de vida a través de l’emmagatzemament d’una gran quantitat d’informació personal, esdevenint en el que anomenem la nostra identitat digital. Avui en dia, el seguiment de les activitats dels usuaris correlacionat amb tals identitats digitals s’ha convertit en un dels principals interessos de no només companyies privades, sinó també de governs. La natura d’aquest interessos obeeix a diferents motivacions: comercials, polítiques, vigilància o censura entre d’altres. A més a més, el creixement exponencial de les dades disponibles i les capacitats de processar-les ha conduït a una situació encara pitjor. En resposta a aquestes circumstàncies, la demanda de tecnologies que preserven la privacitat i l’anonimat s’ha incrementat per part dels usuaris preocupats. En aquesta línia, en el mar de dades que anomenem Internet, alguns dels protocols subjacents que suporten el seu funcionament estan en detriment de la preservació de les propietats de privacitat esmentades. El sistema de noms de domini (DNS) és in clar exemple, especialment si considerem que gairebé totes les activitats a Internet comencen per una petició DNS. De fet, quan el sistema DNS va ésser dissenyat als principis dels vuitanta no es va pretendre garantir la privacitat de les peticions realitzades per persones. En aquest sentit, el seu disseny subjacent està esdevenint insuficient per fer front als canvis i innovacions de la Internet d’avui. Per contra, durant els últims anys, la xarxa Tor s’ha convertit en una de les xarxes superposades més populars per a l’anonimització de tràfic TCP. Tor és un sistema d’anonimat de baixa latència que es pot instal·lar com una aplicació d’usuari final en una àmplia gamma de sistemes operatius, el que permet redirigir el tràfic a través d’una sèrie de túnels d’anonimització virtuals. D’aquesta manera, els usuaris poden utilitzar els serveis de xarxa a través d’Internet sense comprometre la seva privacitat. A més, s’empra com a eina extremadament eficaç per eludir la censura, el que possibilita als seus usuaris connectar-se a recursos bloquejats. Aquesta tesi doctoral se centra precisament en contribuir en aquests dos temes abans esmentats —el protocol DNS i la xarxa Tor— a través de l’estudi dels problemes de privacitat i anonimat, i reforçant les solucions actuals. De forma més precisa, els nostres esforços de recerca se centren en (1) L’abús del protocol DNS realitzat per part de botnets i com podem detectar tals fins maliciosos, (2) La manca de privacitat del protocol DNS i com podem millorar-la, i (3) De quina manera podem incrementar el rendiment de la xarxa Tor mentre que la seguretat es preserva.
Todos los días nuestra actividad en Internet deja rastros de nosotros mismos y de nuestra forma de vida a través del almacenamiento de una gran cantidad de información personal, convirtiéndose en lo que llamamos nuestra identidad digital. Hoy en día, el seguimiento de las actividades de los usuarios correlacionado con tales identidades digitales se ha convertido en uno de los principales intereses de no sólo compañías privadas, sino también de gobiernos. La naturaleza de este interés obedece a diferentes motivaciones: comerciales, políticas, vigilancia o censura entre otras. Además, el crecimiento exponencial de los datos disponibles y las capacidades de procesarlos ha conducido a una situación aún peor. En respuesta a estas circunstancias, la demanda de tecnologías que preservan la privacidad y el anonimato se ha incrementado por parte de los usuarios preocupados. En esta línea, en el mar de datos que llamamos Internet, algunos de los protocolos subyacentes que soportan su funcionamiento están en detrimento de la preservación de las propiedades de privacidad mencionadas. El sistema de nombres de dominio (DNS) es un claro ejemplo, especialmente si consideramos que casi todas las actividades en Internet comienzan por una petición DNS. De hecho, cuando el sistema DNS fue diseñado a principios de los ochenta no se pretendió garantizar la privacidad de las peticiones realizadas por personas. En este sentido, su diseño subyacente está siendo insuficiente para hacer frente a los cambios e innovaciones de la Internet de hoy. Por el contrario, durante los últimos años, la red Tor se ha convertido en una de las redes superpuestas más populares para la anonimización de tráfico TCP. Tor es un sistema de anonimato de baja latencia que se puede instalar como una aplicación de usuario final en una amplia gama de sistemas operativos, lo que permite redirigir el tráfico a través de una serie de túneles de anonimización virtuales. De esta manera, los usuarios pueden utilizar los servicios de red a través de Internet sin comprometer su privacidad. Además, se emplea como herramienta extremadamente eficaz para eludir la censura, lo que posibilita a sus usuarios conectarse a recursos bloqueados. Esta tesis doctoral se centra precisamente en contribuir en estos dos temas antes mencionados —el protocolo DNS y la red Tor— a través del estudio de los problemas de privacidad y anonimato, y reforzando las soluciones actuales. De forma más precisa, nuestros esfuerzos de investigación se centran en (1) El abuso del protocolo DNS realizado por parte de botnets y cómo podemos detectar tales fines maliciosos, (2) La falta de privacidad del protocolo DNS y cómo podemos mejorarla, y (3) De que manera podemos incrementar el rendimiento de la red Tor mientras que la seguridad se preserva.
Everyday all our activity in Internet leaves traces of ourselves and of our way of life through the storing of a big amount of personal data, becoming what we call our digital identity. Nowadays, the tracking of the user activities correlated with such digital identities has become one of the principal interest of not only private companies, but also governments. The nature of such interest can obey to different motivations: business, politics, surveillance or censorship among others. Moreover, the exponential growth of the available data and the capabilities to process it has lead to a worst situation. In response to these circumstances, the demand of privacy-preserving and anonymous technologies has been increased on the part of concerned users. In this line, in the sea of data which we call Internet, some of the underlying protocols that are underpinning its operation are detrimental to the safeguarding of the aforementioned privacy properties. The Domain Name System (DNS) is clearly an example of one of such protocols, specially if we consider that almost every activity on the Internet starts with a DNS query. In fact, when DNS was designed inthe early eighties it was not intended to guarantee the privacy of people’s queries. In that sense, its underlying design is becoming insufficient to face the changes and innovations of today’s Internet. In contrast, during the recent years, the Tor network has become one of the most popular overlay networks for anonymising TCP traffic. Tor is a low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems, allowing to redirect the traffic through a series of anonymising virtual tunnels. In such a way, users can use network services over Internet without compromising their privacy. Also, it is employed as en extremely effective censorship circumvention tool, allowing to its users to connect against blocked resources. This dissertation is precisely focused on contributing to these two aforementioned topics —the DNS protocol and the Tor network— by studying the related privacy and anonymity problems and reinforcing current solutions. More precisely, our research efforts are centered on (1) The abuse of the DNS protocol performed by botnets and how we can detect such malicious purpose, (2) The lack of privacy of the DNS protocol and how we can improve it, and (3) How we can enhance the performance of the Tor network while security is preserved.
APA, Harvard, Vancouver, ISO, and other styles
22

Victors, Jesse. "The Onion Name System| Tor-powered distributed DNS for tor hidden services." Thesis, Utah State University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598486.

Full text
Abstract:

Tor hidden services are anonymous servers of unknown location and ownership who can be accessed through any Tor-enabled web browser. They have gained popularity over the years, but still suffer from major usability challenges due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced distributed DNS that allows users to reference a hidden service by a meaningful globally-unique verifiable domain name chosen by the hidden service operator. We introduce a new distributed self-healing public ledger and construct OnioNS as an optional backwards-compatible plugin for Tor on top of existing hidden service infrastructure. We simplify our design and threat model by embedding OnioNS within the Tor network and provide mechanisms for authenticated denial-of-existence with minimal networking costs. Our reference implementation demonstrates that OnioNS successfully addresses the major usability issue that has been with Tor hidden services since their introduction in 2002.

APA, Harvard, Vancouver, ISO, and other styles
23

Nekuža, Karel. "Nasazení DNSSEC na klientské straně." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377019.

Full text
Abstract:
Diplomová práce se zabývá problémem přístupu koncového uživatele k odpovědím ověřeným pomocí protokolu DNSSEC. Práce posuzuje možnosti nasazení a nastavování resolveru za účelem zlepšení bezpečnosti pro koncové uživatele. V práci je navrhnuto řešení problému pro operační systém Fedora Workstation. Navrhnuté řešení je realizováno a porovnáno s již existujícím řesením.
APA, Harvard, Vancouver, ISO, and other styles
24

Lundström, Jonatan. "Orphaned DNS Records." Thesis, Luleå tekniska universitet, Datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86428.

Full text
Abstract:
Detta dokument är en teknisk rapport för ett projekt vars syfte är att utveckla en Lambda-funktion som letar efter oanvänd Domain Name System (DNS)-information i AWS’ Route 53. Denna information har potential att orsaka säkerhetsbrister genom att missleda användare till en destination annan än den som de förväntar sig nå. Någon med skadliga avsikter skulle därför kunna använda sig av denna brist för att rikta data till sig själv som denne inte egentligen bör ha tillgång till. Problemet förvärras hos molntjänster som erbjuder uthyrning av IP-adresser då dessa ofta kommer från en adressrymd som tjänsten underhåller. När en användare sedan slutar hyra adressen hamnar den återigen i adressrymden. Om det råkar finnas DNS-information kopplad till den adressen så kommer de nu orsaka den tidigare nämnda säkerhetsbristen då de hänvisar till en IP-adress som vem som helst kan ha hyrt. För att åtgärda detta skrevs en funktion i Python 3.9.4 som sedan integreras i AWS Lambda. Funktionen körs från ett baskonto i AWS och hämtar data både från detta konto och andra konton genom att anta en specifik IAM-roll inom dem. Där hämtar den både kontots DNS-information samt IP-adresser som den sedan jämför för att se om de stämmer överens eller ej. Om de gör det så är informationen inte oanvänd och därför ointressant för funktionen. All DNS-information som inte har en matchande IP-adress läggs då till i en lista som sedan skickas ut till behöriga genom SNS i AWS.
This document is a technical report on the development of a Lambda function, the purpose of which is to look for orphaned (dangling) Domain Name System (DNS) records in AWS’ Route 53. These records can open up serious vulnerabilities as they have the potential to misdirect clients to end-points other than the one they think they are accessing; something which can be the cause of malicious intent.  This is particularly an issue in cloud platforms that offer the ability to lease IPs from their own pool of addresses, as said addresses go back into the pool once they are released by the lessee. These addresses are then able to be leased by anyone with access to AWS and could, as such, lease addresses until they happen upon one that has a corresponding orphaned record somewhere and redirect sensitive data to themselves. The resulting function is written in Python 3.9.4 and integrated into AWS via Lambda. It functions by assuming roles in specified accounts in order to fetch DNS records and Elastic IPs from these accounts, which it then tries to match in order to determine whether or not they are orphaned. Any orphaned records found are then compiled into a list containing the account ID and URL of each record which is then sent out to the appropriate parties through AWS SNS.
APA, Harvard, Vancouver, ISO, and other styles
25

Likarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.

Full text
Abstract:
This thesis explores the use of applied machine learning techniques to augment traditional methods of identifying and preventing web-based attacks. Several factors complicate the identification of web-based attacks. The first is the scale of the web. The amount of data on the web and the heterogeneous nature of this data complicate efforts to distinguish between benign sites and attack sites. Second, an attacker may duplicate their attack at multiple, unexpected locations (multiple URLs spread across different domains) with ease. Third, attacks can be hosted nearly anonymously; there is little cost or risk associated with hosting or publishing a web-based attack. In combination, these factors lead one to conclude that, currently, the webs threat landscape is unfavorably tilted towards the attacker. To counter these advantages this thesis describes our novel solutions to web se- curity problems. The common theme running through our work is the demonstration that we can detect attacks missed by other security tools as well as detecting attacks sooner than other security responses. To illustrate this, we describe the development of BayeShield, a browser-based tool capable of successfully identifying phishing at- tacks in the wild. Progressing from specific to a more general approach, we next focus on the detection of obfuscated scripts (one of the most commonly used tools in web-based attacks). Finally, we present TopSpector, a system we've designed to forecast malicious activity prior to it's occurrence. We demonstrate that by mining Top-Level DNS data we can produce a candidate set of domains that contains up to 65% of domains that will be blacklisted. Furthermore, on average TopSpector flags malicious domains 32 days before they are blacklisted, allowing the security community ample time to investigate these domains before they host malicious activity.
APA, Harvard, Vancouver, ISO, and other styles
26

Alipour, Hamid Reza. "An Anomaly Behavior Analysis Methodology for Network Centric Systems." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/305804.

Full text
Abstract:
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspects of our life. With the exponential growth in cyberspace activities, the number and complexity of cyber-attacks have increased significantly due to an increase in the number of applications with vulnerabilities and the number of attackers. Consequently, it becomes extremely critical to develop efficient network Intrusion Detection Systems (IDS) that can mitigate and protect cyberspace resources and services against cyber-attacks. On the other hand, since each network system and application has its own specification as defined in its protocol, it is hard to develop a single IDS which works properly for all network protocols. The keener approach is to design customized detection engines for each protocol and then aggregate the reports from these engines to define the final security state of the system. In this dissertation, we developed a general methodology based on data mining, statistical analysis and protocol semantics to perform anomaly behavior analysis and detection for network-centric systems and their protocols. In our approach, we develop runtime models of protocol's state transitions during a time interval ΔΤ. We consider any n consecutive messages in a session during the time interval ΔΤ as an n-transition pattern called n-gram. By applying statistical analysis over these n-gram patterns we can accurately model the normal behavior of any protocol. Then we use the amount of the deviation from this normal model to quantify the anomaly score of the protocol activities. If this anomaly score is higher than a well-defined threshold the system marks that activity as a malicious activity. To validate our methodology, we have applied it to two different protocols: DNS (Domain Name System) at the application layer and the IEEE 802.11(WiFi) at the data link layer, where we have achieved good detection results (>95%) with low detection errors (<0.1%).
APA, Harvard, Vancouver, ISO, and other styles
27

Filipová, Fuchsová Regina. "Dynamika obchodního modelu v telekomunikacích." Doctoral thesis, Vysoká škola ekonomická v Praze, 2002. http://www.nusl.cz/ntk/nusl-77117.

Full text
Abstract:
This doctoral thesis is focused on the most progressive part of telecommunications nowadays, on Internet governance and Internet domain name system. This field is not only highly interesting, but only very little researched area from the point of view of economics sciences compared to the traditional fields. Recently, the question of Internet governance was highlighted, but it has been neither resolved nor sufficiently discussed so far. The theory does not answer many questions raised by the praxis sufficiently. The aim of the thesis was to describe the branch in detail and to develop an original model, which would characterise the dependency of the number of registrations on other indicators. This doctoral thesis of Regina Filipova Fuchsova brings a detailed analysis of factors influencing the domain name system. This is the first analysis of this art ever, which targets top level domains .cz and .eu. Typology of TLD registries and connection of domain name selection with the company strategy are further new findings. Based on own analysis and case studies, the author concludes, that there is a relatively strong dependency of the number of registered domains under the respective TLD on national economy characteristics and that the model of the relationship of a ccTLD registry and respective government significantly varies in particular countries. This is due to the historical development and national specifics. The author further came to the conclusion, that national and generic TLDs are partially substitutes and partially complements on national markets. It depends on concrete market and the degree of ccTLD liberalisation, because generic TLDs act as substitutes to the country code TLD on not liberalised markets and/or where the ccTLD is rather expensive. As for the liberalised markets, the growth of a ccTLD goes hand in hand with the growth of gTLD and they compete less. National TLDs of the EU countries and the European TLD .eu show the nature of complements according to the statistical analysis. There are significant theoretical and practical contributions of this work because of its wide content and original analysis in this field. The findings can be practically used for registry benchmarking and ideas related to the delegation of new top level domains.
APA, Harvard, Vancouver, ISO, and other styles
28

Fau, Jean. "La régulation du conflit impliquant le nom de domaine : articulation des sources." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22017.

Full text
Abstract:
Les noms de domaine sont des objets polymorphes, à la fois techniques et sémantiques. La question de leur régulation, avec l’essor du Domain Name System, est rapidement devenue un défi de taille pour le législateur. Face à une certaine défaillance du droit étatique s’est développé un véritable corpus supplétif de source privée. C’est notamment le cas des procédures extrajudiciaires de résolution des conflits mises en places par l’ICANN. Ces différents mécanismes de nature transnationale forment un ensemble cohérent, en constante évolution, que l’on peut qualifier de véritable lex domainia. Ce concept implique cependant une vision nécessairement pluraliste du droit - où cohabitent systèmes publics, privés et hybrides -, qui invite le juriste à repenser la théorie des sources. Cette thèse contribue à la compréhension de la nature et de l’articulation de ces différentes sphères normatives. Celles-ci ne doivent pas être considérées comme des espaces clos et hermétiques ; il existe entre eux des perméabilités qui dessinent un dispositif de régulation transnational aux sources plurielles. Il s’agit, selon l’auteur, d’une parfaite illustration de la théorie du réseau
Domain names are polymorphic objects, whose nature is both technical and semantic. The question of their regulation has quickly become, with the rapid growth of the Domain Name System, a major challenge for the lawmaker. A certain default of state law favored the development of what one might call a private supplementary corpus. This is notably the case for extrajudicial domain name dispute resolution mechanisms promoted by the ICANN. These various transnational mechanisms form a coherent whole, in constant evolution, which can be described as a real lex domainia. This concept, however, necessarily implies a pluralistic conception of law - where public, private and hybrid systems cohabit -, which invites legal theorists to rethink the sources theory. This thesis contributes to the understanding of the nature and the articulation of these various normative spheres. These should not be regarded as closed and hermetic spaces ; permeabilities exist between them, that draw a transnational regulation pattern with plural sources. This is, according to the author, a perfect illustration of the mesh theory
APA, Harvard, Vancouver, ISO, and other styles
29

Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bricteux, Caroline. "Régulation de l'Internet par les noms de domaine. Le régime juridique et institutionnel de l'ICANN." Doctoral thesis, Universite Libre de Bruxelles, 2019. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/284381.

Full text
Abstract:
La régulation de l’Internet constitue depuis toujours un défi pour le droit :le « réseau des réseaux » a été conçu dans un esprit de connectivité universelle, avec la volonté que chaque utilisateur intéressé puisse y relier son ordinateur et accéder aux informations disponibles en ligne, sans que celles-ci soient altérées en fonction du lieu de connexion et donc sans tenir compte d’éventuelles règles nationales, régionales ou internationales. S’il s’inscrit ainsi en porte-à-faux avec les principes fondamentaux du droit national et international, fondés sur la souveraineté des États et sur des frontières géographiques bien établies, l’Internet n’est pas pour autant un espace anarchique. Il constitue plutôt un terrain propice à l’émergence de nouveaux régulateurs et à l’expérimentation de nouvelles formes de normativité. L’espace virtuel global repose en effet sur une architecture physique et informatique qui peut être modelée et sollicitée à des fins de régulation des flux d’informations en ligne. Dans cette optique, notre thèse se penche sur le Domain Name System (DNS), le système de nommage et d’adressage de l’Internet qui assure les correspondances entre les noms de domaine intelligibles pour les humains et les adresses IP numériques utilisées par les ordinateurs pour communiquer entre eux. La structure hiérarchique de cet annuaire global en fait une cible de choix pour ceux qui aspirent à un contrôle centralisé du réseau et des informations qu’il véhicule. Le DNS est administré depuis 1998 par une organisation globale atypique, l’Internet Corporation for Assigned Names and Numbers (ICANN), constituée sous la forme d’une société privée de droit californien, investie de ses compétences en vertu de contrats avec le gouvernement des États-Unis et caractérisée par un modèle de gouvernance multipartite mobilisant des représentants du secteur privé, de la société civile et des gouvernements. Par une étude pragmatique des actes juridiques produits par l’ICANN en vue d’attribuer de nouvelles extensions de noms de domaine génériques – à côté du fameux .com et en parallèle des extensions nationales telles le .be – nous démontrons que l’organisation ne se cantonne pas à une mission essentiellement technique mais se profile, à son corps défendant, comme un régulateur global des contenus en ligne. Nous mettons en évidence, d’une part, que les normes globales édictées par l’ICANN pour justifier le rejet des candidatures indésirables ne visaient pas seulement les termes proposés comme nouvelles extensions mais aussi les conditions d’exploitation envisagées par les candidats, afin d’assurer ex ante la licéité et la qualité des informations présentées dans les futurs domaines. Nous montrons, d’autre part, que l’ICANN a été amenée, sous la pression des gouvernements, à investir ses sous-contractants, les registres et registraires de noms de domaine, d’obligations d’intérêt public relatives au contenu des sites web auxquels leurs noms de domaine donnent accès, en vue de lutter contre les activités abusives et de protéger les consommateurs. Nous démontrons que l’ICANN a ainsi renforcé, sous sa supervision, le rôle des intermédiaires du DNS en tant que points de contrôle du contenu posté en ligne et pointons les dérives potentielles de cette évolution, qui n’est accompagnée d’aucun garde-fou pour préserver la liberté d’expression en ligne.
Doctorat en Sciences juridiques
info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
31

Pires, Luis Paulo Gon?alves. "Alta disponibilidade: uma abordagem com DNS e Proxy Reverso em Multi-Cloud." Pontif?cia Universidade Cat?lica de Campinas, 2016. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/904.

Full text
Abstract:
Submitted by SBI Biblioteca Digital (sbi.bibliotecadigital@puc-campinas.edu.br) on 2017-02-01T13:15:39Z No. of bitstreams: 1 LUIS PAULO GONCALVES PIRES.pdf: 3166033 bytes, checksum: 043d546bf3a8212c07798369bfcc2f7f (MD5)
Made available in DSpace on 2017-02-01T13:15:39Z (GMT). No. of bitstreams: 1 LUIS PAULO GONCALVES PIRES.pdf: 3166033 bytes, checksum: 043d546bf3a8212c07798369bfcc2f7f (MD5) Previous issue date: 2016-12-15
Pontif?cia Universidade Cat?lica de Campinas ? PUC Campinas
While there is considerable enthusiasm for the migration of on-premise data centers to cloud computing services, there is still some concern about the availability of these same services. This is due, for example, to historical incidents such as that in 2011, when a crash on Amazon's servers caused sites of several of its customers to go down for almost 36 hours. In view of this, it becomes necessary to develop strategies to guarantee the availability offered by the providers. In the present work, a solution is proposed, which implements high availability in Multi-Cloud environments, through the distribution of DNS access and the use of reverse proxy. A financial analysis was also carried out, taking into account market values in Cloud Computing services, which showed that the proposed solution may even be advantageous with respect to the traditional one. Specifically, a Multi-Cloud system, consisting of two Clouds with 99.90% availability each, provides total availability of 99.999%, and it costs 34% less than a single Cloud with 99.95% availability. The simulation results, obtained in a virtualized environment, using two Clouds, with availability of 99.49% and 99.43%, showed a system availability of 99.9971%. In this way, using Multi-Cloud systems it is possible to obtain high availability systems, from lower availability Clouds, according to user?s needs, besides saving with provider services costs.
A despeito de haver consider?vel entusiasmo quanto ? migra??o de data-centers on-primese para servi?os de Cloud Computing, ainda existe certo receio no que se refere ? disponibilidade destes mesmos servi?os. Isso se deve, por exemplo, a incidentes hist?ricos como o ocorrido em 2011, quando uma falha nos servidores da Amazon fez com que sites de v?rios de seus clientes ficassem fora do ar por quase 36 horas. Em vista disso, torna-se necess?rio desenvolver estrat?gias para garantir a disponibilidade oferecida pelos provedores. No presente trabalho, descreve-se uma solu??o que implementa alta disponibilidade em ambientes Multi-Cloud, mediante a distribui??o de acesso por DNS e a utiliza??o de proxy reverso. Realizou-se tamb?m uma an?lise financeira, levando-se em conta valores de mercado em servi?os de Cloud Computing, o que mostrou que a solu??o proposta pode ser mesmo vantajosa com a rela??o ? solu??o tradicional. Especificamente, um sistema Multi-Cloud, composto por duas Clouds com disponibilidade de 99,90%, que prov? disponibilidade total de 99,999%, custa 34% menos do que uma ?nica Cloud com disponibilidade de 99,95%. Os resultados de simula??o, obtidos em ambiente virtualizado, utilizando-se duas Clouds, com disponibilidades de 99,49% e 99,43%, alcan?aram disponibilidade 99,9971%. Desta forma, utilizando-se sistemas Multi-Cloud ? poss?vel se obter sistemas de alta disponibilidade, de acordo necessidade do usu?rio, a partir de Clouds de mais baixa disponibilidade, al?m de ser poss?vel economizar com os custos dos servi?os do provedor.
APA, Harvard, Vancouver, ISO, and other styles
32

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
33

Tang, Chang-Hung, and 唐長鴻. "On Domain Name System of Private Domain." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/70940346081650567113.

Full text
Abstract:
碩士
淡江大學
資訊管理學系
91
Most of TCP/IP applications on Internet use domain name as identification with both sites. But, the Domain Name System we use nowadays is not suitable for applications over private domain. So, at first this topic has some discussions about addressing and naming on Internet, and restriction to applications on private domain supported by domain name system. And, how to support domain name of private domain is provided, and their features and adaptation are pointed out. At last, this topic will provide a new architecture, Private Domain Name System, aiding Domain Name System in order to support applications for private domain. Besides, Virtual TCP Connection is developed as the aided module in this research in order to implement PDNS.
APA, Harvard, Vancouver, ISO, and other styles
34

Jeng-Wei, Lin. "Internationalized Domain Name Resolution System and Its Localization." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2801200503272900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tang, Wei-Li, and 唐瑋勵. "Design of Tunneling VoIP through Domain Name System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14220392125234766580.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
98
Domain Name System (DNS) is an essential service in Internet. It has been widely deployed in almost every network. We usually use DNS to resolve hostnames and IP addresses, but the functionality of DNS is not limited to resolution between name and address. There is various host information that DNS can provide. As its high availability and bidirectional communication characteristic, we consider other practical applications of DNS. The concept of DNS tunneling has been implemented by hackers to discuss exceptional usages and vulnerabilities in the design of DNS. Many implementations were designed to transmit IP packets over DNS, and widely used in restricted network environments. However, in some situations the capabilities of DNS service may differ drastically and DNS tunneling may become useless. In this thesis, we consider Voice over Internet Protocol (VoIP) which has recently become a popular service. We study the technical issues in transmitting VoIP traffic over DNS in various network environments, especially in Public Wireless LAN. This thesis introduces a dedicated DNS tunneling design and shows the voice traffic can be transmitted in a strict manner with high performance.
APA, Harvard, Vancouver, ISO, and other styles
36

Kara, Abdullah Mert. "Malicious Payload Distribution Channels in Domain Name System." Thesis, 2013. http://spectrum.library.concordia.ca/978079/1/Kara_MASc_S2014.pdf.

Full text
Abstract:
Botmasters are known to use different protocols to hide their activities under the radar. Throughout the past years, several protocols have been abused and recently Domain Name System (DNS) also became a target of such malicious activities. In this dissertation, we analyze the use of DNS as a malicious payload distribution channel. To the best of our knowledge, this is the first comprehensive analysis of these payload distribution channels via DNS. We present a system to characterize such channels in the passive DNS (pDNS) traffic by modelling DNS query and response patterns. Then, we analyze the Resource Record (RR) activities of these channels to build their DNS zone profiles. Finally, we detect and assign levels of intensity for payload distribution channels by using a fuzzy logic theory. Our work is based on an extensive analysis of malware datasets for one year, and a near real-time feed of pDNS traffic. The experimental results reveal few long-running hidden domains used by Morto worm to distribute malicious payloads. We also found that some of these payloads are in cleartext, without any encoding or encryption. Our experiments on pDNS traffic indicate that our system can detect these channels regardless of the payload format. Passive DNS is a useful data source for DNS based research, and it requires to be stored in a database for historical data analysis, such as the work we present in this dissertation. Once this database is established, it can be used for any sort of threat analysis that requires DNS oriented intelligence. Our aim is to create a scalable pDNS database, that contains potentially valuable security intelligence data. We present our pDNS database by discussing the database design, implementation challenges, and the evaluation of the system.
APA, Harvard, Vancouver, ISO, and other styles
37

CHEN, JYUN-HONG, and 陳俊宏. "Domain Name System Amplification Attack Resolution and Defense." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/46avda.

Full text
Abstract:
碩士
國立雲林科技大學
資訊管理系
105
Domain Name System Amplification Attack (DNS) has been a very common attack type in recent years. As the network grows, it is easy to achieve Denial of Service (DoS) attacks. Paralyze the victim's network, so that the victims can not be normal operation. But also can set the power of the crowd at the same time decentralized distributed denial of service attacks (Distributed Denial of Service, DDoS) is to allow users a headache. Many DNS servers have solutions to this problem, such as the ACL (Access Control List) restriction, the close recursive query function, and so on, can be effectively attacked or exploited to attack the DNS attack attacks. Of the DNS server for adequate protection. But for the end user does not provide good protection measures. In this paper, we study the protection rules of the DNS server and the intrusion detection system based on DNS and the open source intrusion detection system, and combine the characteristics of the attack packets to make the intrusion detection system provide the security of end-user protection DNS amplification attack. Protection. In this paper, an effective DNS amplification attack prevention rule is formulated, so that the internal network server or the end user can have a good security environment not to be amplified attack. This rule can be combined with the intrusion detection system inline mode (Inline Mode) with the firewall can be the actual block (drop, block ... and other actions), or just observe and does not affect the actual flow of the detection mode (Sniffer Mode) , Are can be used with the demand environment. Keywords:DNS, Amplification Attack, DDOS, Snort, intrusion detection systems
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Jeng-Wei, and 林正偉. "Internationalized Domain Name Resolution System and Its Localization." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/89817967506255460856.

Full text
Abstract:
博士
國立臺灣大學
資訊工程學研究所
93
In recent years, many attempts have been made to lower the linguistic barriers for non-native English speakers wishing to access the Internet. However, traditional Internet domain names are restricted to being composed of ASCII letters, digits, and hyphens – abbreviated as LDH. In 1999, Internationalized Domain Names, (IDN), were introduced to allow an individual or organization to register a domain name in any major language – from Chinese to Russian to Arabic. In March 2003, IETF published three RFC (Requests for Comments) documents, referred to as IDNA, nameprep, and punycode, as the IETF Internet standard for IDN. These documents specify a name-preparation process for converting a Unicode IDN to an ASCII Compatible Encoding (ACE) string. Once an IDN is registered in an IDN registry, the latter stores the ACE string in the domain name server. When an IDNA-aware application looks for a host using its IDN, the application converts the IDN to an ACE string so that the current DNS can resolve the ACE string into the host''s IP address. However, some domain name strings embedded in multilingual content do not have any charset encoding tag, so they cannot be appropriately converted to the corresponding Unicode IDNs and, thus, the ACE strings. Although, IDNA can use the current DNS without modifying domain name servers and resolvers, it does require that an IDNA-compliant module be integrated into every Internet application in order to process IDNs properly. Through our participation in IDN-related activities, we observed that many Internet applications allow the use of non-ASCII characters in domain name slots. This motivated us to design an IDN server proxy architecture that provides IDN resolution in multiple encodings. In this architecture, ACE IDNs are stored in the domain name servers; hence, traditional domain name servers can be used without modification. An IDN server proxy, called Octopus, is employed on the domain name server side to facilitate servers by providing non-ACE IDN resolution. On receipt of a DNS query packet, Octopus converts the non-ACE IDN to ACE. The ACE string is then forwarded to backend domain name servers (where the traditional domain names and ACE IDNs are stored) for further processing. Based on the design and implementation of Octopus, we initiated a CDN trial service to further investigate the interoperability of Internet applications when CDNs are used. We studied several types of errors that cause unsuccessful WWW access via IDNs, such as improper web server configuration, generic multilingual text processing errors, etc. Solutions were then developed, including the use of an IDN-aware web redirection server. While Internet services can be significantly improved by introducing IDNs, the use of characters that have similar appearances and/or meanings has the potential to cause confusion. The introduction of IDNs has raised serious consumer concerns about the likelihood of widespread user confusion, new opportunities for cybersquatting, etc. IDNA does not address linguistic issues, such as Han character variants. Two Han characters are said to be variants of each other if they have the same meaning and are pronounced the same. A variant IDN derived from an IDN by replacing some characters with their variants should match the original IDN. In April 2004, IETF published RFC 3743, referred to the JET Guidelines, for the registration and administration of Chinese, Japanese, and Korean IDNs. The JET Guidelines suggest that zone administrators model the concept of equivalent IDLs (Internationalized Domain Labels) as an atomic IDL package based on zone-specific Language Variant Table (LVT) mechanisms. However, the Guidelines do not address various technical implementation issues. For example, an issue of scalability arises when the number of variant IDLs is large. We propose a resolution protocol that resolves the variant IDLs in an IDL package into its registered IDL with the help a small number of VarIdx RRs (resource records). In this process, each VarIdx RR uses a variant expression to enumerate some of the variant IDLs. An indexing function is designed to give the same variant index to the variant IDLs enumerated by a variant expression. This allows Internet applications to use one of the variant IDLs to look up the VarIdx RRs and find the registered IDL. We have studied different indexing functions. Experiment results show that, although individual zones may have their own rules about permitted characters and the variant relationships of these characters, an indexing function does exist for global use. We set up a redirection service that enables users to access the WWW via variant IDNs. The domain name servers are configured to return the IP address of the redirection server to the client when the queried domain name is not registered. The user request is then sent to the redirection server, which computes the variant index of the unregistered label and looks up the VarIdx RRs. If the right VarIdx RR is located, the server redirects the user request to the new URL by replacing the variant IDL with the registered IDL. Experiment results show that our resolution protocol successfully enables Internet access via variant IDNs. In this research, we first extend the functionality of the current DNS by providing IDN resolution in multiple encodings, and then extend it further by providing variant IDN resolution. Our study also suggests useful practices for software vendors to develop INDA-compliant Internet applications. While extending the functionality of DNS, we retain backward compatibility and reuse existing software as much as possible. Our study provides useful reference for software engineers to extend the functionality of a widely deployed system.
APA, Harvard, Vancouver, ISO, and other styles
39

Lu, Yi-Shen, and 盧奕伸. "The Email solution on the Private Domain Name System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/05948743973776549572.

Full text
Abstract:
碩士
淡江大學
資訊管理學系碩士班
94
The Domain Name System that we use to identify host address on Internet nowadays is not suitable for applications over private domain. Hence, a new architecture called Private Domain Name System (PDNS) has been designed and produced to support applications of private domain. But, there is not any Email solution on PDNS architecture; in other words, all private domains on PDNS architecture can’t send Email to each other. This thesis points out the difficulty and restriction of send/receive Email which has private domain name (ex. use non-English languages) using current Email technology, and try to find a way compatible with current Email environment and let people no need to change original behavior and can send/receive such special Emails. At last, this thesis will design and offer a complete Email solution which is base on TCP/IP network and use SMTP protocol as Email transmission standard for user can send/receive Email that is using private domain name. In the solution, a new system called PDMA has been developed to connect Mailbox server, PDNS system and the client MUA s/w in the all mail system structure, responsible for the main Email transmission work. If any error happened during the Email transmitting, PDMA will send NDR (Not Delivery Report) to original Email sender. In order to support using non-English language Email address, this thesis also provides Mailbox server function for PDMA to store such special Email address to user mailbox file. In order to enable PDNS system to support PDMA to transmit the Email, this thesis also increases and develops two new functions on PDNS system. The solution provided by this thesis let network administrator dispose the Private Domain Mail System well fast under the environment of existing network; Let users no need extra education or training, can read/write/receive/send Private Domain Email easily; people also can utilize the theory in this thesis to implement Email address witch is defined by themselves, even if the Email address is defined with non-English languages, so Multi-Language Mail System can be implemented by the theory of this thesis. At last the implementation of "Chinese address Mail System" is provided to make an example for needing unit for referential use.
APA, Harvard, Vancouver, ISO, and other styles
40

Chun-ying, Chiu, and 邱俊穎. "PWD-A Proxy-based Helping System for Chinese Web and Domain Name System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/18795722501434329916.

Full text
Abstract:
碩士
國立中央大學
資訊工程研究所
89
World Wide Web has been the most popular service on the rapid growing Internet. Various native languages and characters could be delivered and shown on the web pages. But multi-language is not supported in current name resolving protocol-DNS which is the fundermantal base of Internet. Also the access of non-English users to the Internet with the popularity of computer network results in the highly requirement of using their native language on the Internet. Standard Chinese is written in two forms: Traditional Chinese (TC) and Simplified Chinese (SC) because of its historical background. The browsing of Chinese web pages via Chinese domain names causes lots of problems, which are (1) failure browsing between different forms of Chinese domain names and environments, (2) the uneasy way of Chinese URL input, and (3) the display of TC/SC content encoding and fonts. Multi-lingual DNS is under development for years, and remains drafts standard until today. In this paper, we focus on the problem related to the Chinese domain names, and analyze the problem source and existing solutions to the compatibility problems. The translation between TC and SC is very complicated; we refer to other studies and summarize the work as well. According to the Chinese domain names, web pages and the demand of online TC/SC translation, we applied a Chinese domain name registration and mapping method to set up a series approach to resolve Chinese domain name for the visiting between TC/SC URLs and web sites. We also implement a proxy-based helping system—PWD, composed of three major parts, Proxy, Web, and DNS. It helps users to use Chinese DNS and TC/SC web browsing. We illustrate the detail of system design and implementation compared to other systems. Our system is flexible and capable of changing its composition modules, which makes it more compatible and easier to use. In spite of the online TC/SC translation functionality, PWD provides a user interface for selecting the Chinese Web by mouse clicking.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Chia-wei, and 陳嘉偉. "Development of IP and Domain Name FilterUsing ARM9 Based Embedded System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/36496365399030000655.

Full text
Abstract:
碩士
朝陽科技大學
資訊工程系碩士班
98
There are many pornographic or violence websites on the internet. This thesis designed a filter to screen the children from those bad websites. The device is not only an IP sharing router but also an IP and Country Code Top Level Domain (ccTLD) filter. The filter built on ARM9 based embedded system which using the S3C2410 chip and the Linux 2.6 operation system was portinged on it. The main filtering software used is the iptables and L7-filter classifier. The iptables can filter the predefined blacklist and L7-filter classifier can screen out the domain name belong the specific country (counter code top level domain). This filter was designed for general family to perform IP sharing and filter to screen out the pornographic or violence websites. This system using web based management interface which using the mini_httpd web server and the cgi programs to control the setting.
APA, Harvard, Vancouver, ISO, and other styles
42

LIN, HAO-HSIANG, and 林皓翔. "Analyzing Domain Name System Log Data to Detect Suspicious Malicious Websites." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/yya8v7.

Full text
Abstract:
碩士
國立高雄大學
資訊管理學系碩士班
106
The growth of Internet technology brings a lot of convenience to people. There is an increasing number of people are becoming dependent on Internet. Browsing and getting information from Internet plays an important role in many people’s lives. Due to the Internet’s construction is getting more and more complicated, people are exposed to many security threats. Many victim hosts are infected by malware when users are surfing the web. In order to keep computers safe and secure on the Internet, finding a way to detect and identify the potential malware websites is necessary. In this paper, we propose an approach that uses the DNS query log data and implements the sequential pattern mining method to analyze any suspicious malware websites, suspicious intruded websites and infected victim hosts by import an exist malware domain name list. This approach could detect and identify the malware websites and suspicious intruded websites which are hidden by using the result of sequential pattern mining. By using the result of this research, the local area network administrator could recognize that how safe the users surfing on the local area network.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Yu. "IDNS [i.e. Incremental Domain Name System] : an efficient approach to portability and mobility support /." Diss., 2002. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3075326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tsai, Chih-Hong, and 蔡志宏. "The Internet Governance on Domain Name Legal System--Focus on ICANN and Its Operation." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/vecs7q.

Full text
Abstract:
博士
國立交通大學
科技法律研究所
106
The Internet Governance on Domain Name Legal System — Focus on ICANN and Its Operation Abstract Domain Name is an essential core resource in the Internet. In its current operation, ICANN has played an indispensable role in whether and how to assign the domain name and how to maintain its just order of use. However, ICANN is not an international organization established by international law, but a non-profit private legal entity registered in California, U.S. Why this private legal entity established by a single nation can own such important authority in the global internet? The issue awareness of the dissertation is what the basis of its legal reason is, and what attitude to this phenomenon of each sovereign state shall adopt. In this regard, the dissertation explores the study of the organization principles and its operation of related system of ICANN. The dissertation also introduces two theories of the internet cyberspace governance: "Cyberspace Independence Theory" and "Cyberspace Sovereignty Theory", and sets forth each application and development. Later, the dissertation learns the theory of "Public and Private Partnership" from traditional administrative law and, therefore, advances the application of the new theory in the internet governance in order to interpret the legal basis of the internet leaded and developed by the private sector. In addition, the dissertation examines ICANN's governance effectiveness by industry data analysis and field interviews and comments the reasons of its effectiveness in response to the issue awareness of the dissertation. Lastly, the dissertation summarizes the principal theory the global internet governance should adopt and illustrates the inspiration provided by the global domain name governance to Taiwan as well as brings forward the conclusions and suggestions.
APA, Harvard, Vancouver, ISO, and other styles
45

Matias, André Manuel Amaro. "Consolidação e optimização da monitorização e alarmística de sistemas da associação DNS.PT." Master's thesis, 2015. http://hdl.handle.net/10451/18093.

Full text
Abstract:
Trabalho de projecto de mestrado, Engenharia Informática (Arquiteturas, Sistemas e Redes de Computadores), Universidade de Lisboa, Faculdade de Ciências, 2015
A Associação DNS.PT, na qualidade de responsável pela gestão, registo e manutenção de domínios sob o Domínio de Topo Português (.pt), gere um serviço fundamental para o bom funcionamento da Internet Portuguesa. Este serviço necessita de constante monitorização quanto aos recursos utilizados, para garantir a disponibilidade e correto funcionamento. Neste contexto, é necessário que exista um sistema que recolha dados em tempo-real para monitorizar os recursos afetos ao serviço e que, caso existam indicadores que apresentem condições preocupantes, se despoletem os mecanismos certos para alarmística. O projeto apresenta um conjunto de tarefas de análise e crítica ao anterior sistema, permitindo estabelecer uma base para a criação de monitorização e alarmística que se adapte à realidade da Associação. Para concretizar o novo sistema de monitorização e alarmística, executou-se um conjunto de tarefas de implementação, com iterações de levantamento de requisitos, desenho e avaliação da solução, havendo sempre a preocupação de manter o útil e repensar o obsoleto. Numa primeira fase (de Setembro a Dezembro de 2013), fez-se o levantamento para perceber extensivamente quais os problemas a abordar, o que existia e o que precisava de ser mudado. Procedeu-se, também, à implementação de sistemas de monitorização auxiliar, como o DSC. A fase final do projeto (de Janeiro a Julho de 2014) consistiu em três etapas distintas: planeamento e desenho do novo sistema de monitorização e alarmística, implementação da solução, e criação de uma interface gráfica para esta. Esta última teve especial relevancia devido à importância que a apresentação dos dados representa para a Associação DNS.PT.
The Associação DNS.PT, in its role of manager, registry, and maintainer of the domains under the Portuguese Top Level Domain (.pt), manages a service fundamental to the well-being of the Portuguese Internet, and so, has the need for constant monitoring regarding the resources used to assure the availability of said service. In this context, it is vital that there is a system gathering data in real-time to monitor the resources tied to the services that the institution offers, and that, in the event of concerning values, the right alerting mechanisms are triggered. The project presents a set of tasks of analysis and criticism to the previous system, establishing a starting point for the creation of monitoring and alarming suited to the reality of the Associação, as well as a set of tasks for implementation of an information system, with iterations such as research, design and evaluation, in order to materialize the new monitoring and alarming system, always doing the best effort to maintain what was useful and rethink what was obsolete. In the first phase (from September through December of 2013), research was made to extensively understand what were the problems to address, what existed and what needed changing. During this time, implementation of auxiliary monitoring systems, such as the DSC, also took place. The final phase of this project (from January through July of 2014) consisted in three diferent stages: planning and design of the new monitoring and alarming system, implementation of the new system, and the creation of an interface for said system. This last stage assumed special relevance, because of the importance of how the data is presented to the Associação DNS.PT.
APA, Harvard, Vancouver, ISO, and other styles
46

Malhotra, Aanchal. "Attacking and securing Network Time Protocol." Thesis, 2019. https://hdl.handle.net/2144/39584.

Full text
Abstract:
Network Time Protocol (NTP) is used to synchronize time between computer systems communicating over unreliable, variable-latency, and untrusted network paths. Time is critical for many applications; in particular it is heavily utilized by cryptographic protocols. Despite its importance, the community still lacks visibility into the robustness of the NTP ecosystem itself, the integrity of the timing information transmitted by NTP, and the impact that any error in NTP might have upon the security of other protocols that rely on timing information. In this thesis, we seek to accomplish the following broad goals: 1. Demonstrate that the current design presents a security risk, by showing that network attackers can exploit NTP and then use it to attack other core Internet protocols that rely on time. 2. Improve NTP to make it more robust, and rigorously analyze the security of the improved protocol. 3. Establish formal and precise security requirements that should be satisfied by a network time-synchronization protocol, and prove that these are sufficient for the security of other protocols that rely on time. We take the following approach to achieve our goals incrementally. 1. We begin by (a) scrutinizing NTP's core protocol (RFC 5905) and (b) statically analyzing code of its reference implementation to identify vulnerabilities in protocol design, ambiguities in specifications, and flaws in reference implementations. We then leverage these observations to show several off- and on-path denial-of-service and time-shifting attacks on NTP clients. We then show cache-flushing and cache-sticking attacks on DNS(SEC) that leverage NTP. We quantify the attack surface using Internet measurements, and suggest simple countermeasures that can improve the security of NTP and DNS(SEC). 2. Next we move beyond identifying attacks and leverage ideas from Universal Composability (UC) security framework to develop a cryptographic model for attacks on NTP's datagram protocol. We use this model to prove the security of a new backwards-compatible protocol that correctly synchronizes time in the face of both off- and on-path network attackers. 3. Next, we propose general security notions for network time-synchronization protocols within the UC framework and formulate ideal functionalities that capture a number of prevalent forms of time measurement within existing systems. We show how they can be realized by real-world protocols (including but not limited to NTP), and how they can be used to assert security of time-reliant applications-specifically, cryptographic certificates with revocation and expiration times. Our security framework allows for a clear and modular treatment of the use of time in security-sensitive systems. Our work makes the core NTP protocol and its implementations more robust and secure, thus improving the security of applications and protocols that rely on time.
APA, Harvard, Vancouver, ISO, and other styles
47

Silvestro, Alessio. "Architectural Support for Implementing Service Function Chains in the Internet." Doctoral thesis, 2018. http://hdl.handle.net/11858/00-1735-0000-002E-E5B4-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cruz, Manuel Duarte Ribeiro da. "Understanding and evaluating the Behaviour of DNS resolvers." Master's thesis, 2018. http://hdl.handle.net/10362/59504.

Full text
Abstract:
The Domain Name System is a core service of the Internet, as every computer relies on it to translate names into IP addresses, which are then utilised to communicate with each other. In order to translate the names into IP addresses, computers resort to a special server, called a resolver. A resolver is a special DNS server that knows the DNS structure and is able to navigate the huge number of DNS servers in order to find the final answer to a query. It is important for a resolver to be able to deliver the final answer as quickly as possible, to have the smallest impact on user experienced latency. Since there is a very large amount of domains and servers, and the system is highly replicated, there has to be some logic as to how a resolver selects which server to query. This brings us to the problem we will study in this thesis: how do resolvers select which DNS server to contact? If a resolver always selects the best DNS server - the one that will be able to provide the answer to the query the fastest - then resolvers can more quickly answer their clients, and thus speed up the Internet. However, if they contact different, more or less equivalent, servers they could contribute to load balancing. To understand how exactly the resolvers select the DNS servers to contact, we conducted an experimental study, where we analysed different resolvers and evaluated how they select the servers. We base the structure and parameters of our study in previous research that has been conducted on the topic, which shows that resolvers tend to use the latency of its queries to the servers as a means of selecting which server to contact.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography