Simplified TCP Based Communication Approach towards Domain Name System for Improving Security
Journal Title: International Journal of Computer Science and Communication Networks - Year 2014, Vol 3, Issue 6
Abstract
Using DNS, domain names can be assigned to groups of Internet resources independent of their physical location. Without DNS, the only way to reach other computers on the Internet is to use the numerical network address. The use of IP address for locating and connecting to remote systems is tedious and is not very user friendly. A preferable and much relied upon service for retrieving an IP address just by referencing a FQDN is DNS. Several types of DNS based communications take place on the internet which are exploited by the cyber criminals for attacking systems. Although different mechanisms have been suggested by the research community to secure the DNS based communications yet it is still not fully secure. Since DNS does not necessarily require the establishment of a TCP connection it allows the attackers to redirect the response to the victims host by spoofing the source IP address as the victims IP address. By exploiting this vulnerability the attacker can launch different types of attacks like Cache Poisoning, DNS Spoofing, Protocol corruption, Zone corruptions, Session Hijacking, etc. Although the use of UDP makes the system faster, ye, it is suggested that all DNS based communications should be TCP based rather than UDP.
Authors and Affiliations
Alok Pandey, Dr. Jatinderkumar Saini
Various Authentication Tecniques for Security Enhancement
Authentication is the art of confirming the truth of an attribute of an entity. Entity may be a person. If a entity is a person it can authenticate with the help of its traits such as his facial attribute, fingerprinting...
Implementation of Personalized E-Mail Prioritization-A Content Based Social Network Analysis
[sup][/sup] Now a Day’s, Email is one of the most prevalent personal and business communication tool, but it exhibits some significant drawbacks. One of the drawback of this is the portion of e-mail is that sp...
Performance Analysis of ARQ Mechanisms in WiMAX Networks
WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat reQuest...
Relational Permanence Routing Protocol under Video Transmission for MANET
Video transport over ad hoc networks is more challenging than over other wireless networks. The wireless links in an ad hoc network are not very much error resilient and can go down frequently because of node m...
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self)....