StudentShare solutions
Triangle menu

Domain Name System Security Extensions - Essay Example

Not dowloaded yet

Extract of sample
Domain Name System Security Extensions

It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.
When you spend some time on the Internet either sending e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS are an extremely important part of the internet but totally to the user. The DNS structure forms one of the principal and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-ecommerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, pharmers, denial-of-service attacks, spammers or any kind of scammer.
DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. This is what was required back in January 1, 1983 when machines on the ARPANET were needed to change to the TCP/IP protocol. What's required today is DNSSEC, which help defend against various attack against DNS servers, be it enterprise servers or the root DNS servers that control the Internet and have double fruitfully been attacked. DNSSEC offers source authentication of DNS data, data reliability and genuine denial of existence, as per the project's website. Various problems have subdued widespread deployment, including issues with scalability and well-suitability with diverse DNS servers.
It is generally believed that making the DNS safe is critically vital for securing the entire Internet; however implementation of DNSSEC particularly has been held back by the difficulty of working out a backward-compatible set that can scale to the range of the Internet, avoiding "zone enumeration" where necessary, positioning DNSSEC implementations over a wide range of DNS servers and clients, disparity among major players over who ought to own the Top Level Domains such as .com, .net and .org root keys and finally conquering the perceived complication of DNSSEC and DNSSEC operation. A number of these problems are in the course of being determined, and deployments in a range of domains have started to take place.
Mockapetris and other several DNS pioneers like BIND8 scientific architect Paul Vixie and DNS guide author Cricket Liu consider the IETF is near to ratifying the problems. Almost a half-dozen instances DNSSEC has been on the doorway, only to be pulled back to the drawing board since real earth problems devastated what's been victorious in a lab setting. According to Vixie, president of the Internet Software Consortium things were looking up in 2008, since there were good contribution in the most recent go-round from the top-level domain holders in the internet. They were able to put in the parts they alleged were missing with no invalidating any preceding work. This presented some hope again, and the developers of DNSSEC were cautiously confident that they were going to see huge islands of security ...Show more


The initial design of the Domain Name System (DNS) did not comprise of security; but it was devised to be a scalable dispersed system. The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backwards compatibility…
Author : sage14
Domain Name System Security Extensions essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Domain Name System Security Extensions"
with a personal 20% discount.
Grab the best paper

Related Essays

MSc computer system security 'Practical Windows Security'
The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the attackers advanced with respect to the new security solutions.
9 pages (2250 words) Essay
MSc Practical Windows Security ''discussing the Windows Domain structure. Assume a Windows 2000/2003/2008 Domain running in nati
This paper offers a deep analysis of some of the prime aspects and issues of practical windows security. This paper will discuss and analyze some of the prime issues and factors regarding various types of attack that can be applied to a Windows 2000 and Windows NT systems and their possible mitigation.
10 pages (2500 words) Essay
Describe a domain name, and provide examples of domain names
For example, the domain name represents the web presence of the company IBM. Domain names are registered with relevant authorities called “domain name registrars” who help to maintain the uniqueness of the name (“ICANN-Accredited Registrars”, 2011).
1 pages (250 words) Essay
Doman Name Expansion
In order to facilitate this process ICANN oversees ‘the distribution of unique IP addresses and domain names (ICANN 2012a). Additionally, ICANN ensures that domain names are mapped to the appropriate IP address. ICANN also has the responsibility of accrediting domain name registrars.
8 pages (2000 words) Essay
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 pages (1250 words) Essay
Information System Security
There is a gradual and certain acknowledgment of the stakes involved with ensuring effectual security management. There are a host of factors that influence this process, including the
56 pages (14000 words) Essay
System Security
Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan, remove, and
2 pages (500 words) Essay
Server Roles for Installing Windows Server 2008 R2
Some of the roles available for the installation include the following: Active Directory Certificate Services refer to roles that offer customizable services for providing and
2 pages (500 words) Essay
System security administrator
Netstat can be used to help determine whether there are unauthorized sockets open to or from a system. This could indicate malicious activity being directed towards your system, or if the system
2 pages (500 words) Essay
Domain Name Dispute Assessment Task
n argument is that the respondent’s domain name is ‘confusingly similar to the complainant’s common-law trademark’ (Quickileaks) pursuant to the au. Dispute Resolution Policy 2010 (the Policy)1and the Rules for .au Dispute Resolution Policy (the Rules).2 The complainant
8 pages (2000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation