Simplified TCP Based Communication Approach towards Domain Name System for Improving Security
Journal Title: International Journal of Computer Science and Communication Networks - Year 2014, Vol 3, Issue 6
Abstract
Using DNS, domain names can be assigned to groups of Internet resources independent of their physical location. Without DNS, the only way to reach other computers on the Internet is to use the numerical network address. The use of IP address for locating and connecting to remote systems is tedious and is not very user friendly. A preferable and much relied upon service for retrieving an IP address just by referencing a FQDN is DNS. Several types of DNS based communications take place on the internet which are exploited by the cyber criminals for attacking systems. Although different mechanisms have been suggested by the research community to secure the DNS based communications yet it is still not fully secure. Since DNS does not necessarily require the establishment of a TCP connection it allows the attackers to redirect the response to the victims host by spoofing the source IP address as the victims IP address. By exploiting this vulnerability the attacker can launch different types of attacks like Cache Poisoning, DNS Spoofing, Protocol corruption, Zone corruptions, Session Hijacking, etc. Although the use of UDP makes the system faster, ye, it is suggested that all DNS based communications should be TCP based rather than UDP.
Authors and Affiliations
Alok Pandey, Dr. Jatinderkumar Saini
Performance Analysis of ARQ Mechanisms in WiMAX Networks
WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat reQuest...
Various Authentication Tecniques for Security Enhancement
Authentication is the art of confirming the truth of an attribute of an entity. Entity may be a person. If a entity is a person it can authenticate with the help of its traits such as his facial attribute, fingerprinting...
A Survey on Spectrum Sensing Techniques in Cognitive Radio
The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication technology, referred to as cognitive radio (CR) networks. The key characteristic of CR system is that it senses th...
Intrusion Detection System Based on 802.11 Specific Attacks
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to...
MIMO Technology for Wireless Sensor Network
Wireless sensor network, where an access point (AP) communicates with many sensor nodes (SN), which are simple, cheap, low-complexity and low-power communication nodes. Various schemes that employ multiple antennas at th...