The Need to Improve DNS Security Architecture: An Adaptive Security Approach
Journal Title: Information Dynamics and Applications - Year 2023, Vol 2, Issue 1
Abstract
The Domain Name System (DNS) is an essential component of the internet infrastructure. Due to its importance, securing DNS becomes a necessity for current and future networks. Various DNS security architecture have been developed in order to provide security services; such as DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ). Unfortunately, these security architectures, especially DoT, are limited and are open to a number of performance issues. In this paper, we evaluate the present state of DNS security architecture, and we would see clearly that existing DNS security architectures are insufficient to secure DNS data transiting over the network; considering the growing cybersecurity landscape. On this note, we propose the need and adoption of a security architecture named Adaptive Security Architecture. Adaptive Security Architecture is devised to guard against identified threats, and anticipate unidentified threats in a manner similar to the immune-response system of human. Basically, mimicking nature’s biodiversity as the fundamental means of effective attack responses. Finally, we conclude by an analysis to prove the need to improve DNS security architecture.
Authors and Affiliations
Daniel O. Alao, Folasade Y. Ayankoya, Oluwabukola F. Ajayi, Onome B. Ohwo
Enhanced Method for Monitoring Internet Abnormal Traffic Based on the Improved BiLSTM Network Algorithm
The complexity and variability of Internet traffic data present significant challenges in feature extraction and selection, often resulting in ineffective abnormal traffic monitoring. To address these challenges, an impr...
Extraction of Judgment Elements from Legal Instruments Using an Attention Mechanism-Based RCNN Fusion Model
In the field of jurisprudence, judgment element extraction has become a crucial aspect of legal judgment prediction research. The introduction of pre-trained language models has provided significant momentum for the adva...
Cryptocurrency Investigations in Digital Forensics: Contemporary Challenges and Methodological Advances
Digital forensics, a crucial subset of cybersecurity, encompasses sophisticated tools and methodologies for the interpretation, analysis, and investigation of digital evidence, facilitating the identification and mitigat...
Ensemble Learning Applications in Multiple Industries: A Review
This study proposes a systematic review of the application of Ensemble learning (EL) in multiple industries. This study aims to review prevailing application in multiple industries to guide for the future landing applica...
An Optimized Algorithm for Peak to Average Power Ratio Reduction in Orthogonal Frequency Division Multiplexing Communication Systems: An Integrated Approach
The impact of the peak to Average Power Ratio (PAPR) on the efficiency of an Orthogonal Frequency Division Multiplexing (OFDM) communication system is significantly mitigated through an innovative Reconfigurable Integrat...