SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology

SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology

SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology

SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology

SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology
SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET - Problems of Information Technology
AZERBAIJAN NATIONAL ACADEMY OF SCIENCES

№2, 2015

SECURITY OF GLOBAL DOMAIN INFRASTRUCTURE IN THE INTERNET

Rena T. Gasimova

DNSSEC technology is used in preventing DNS search result hacks, eliminating falsifications and ensuring security of domain name systems. The article analyses attacks undertaken to DNS server and justifies the necessity of DNSSEC technology application. The article researches the present state and problems in implementation of DNSSEC technology, advantages and scope of solvency in ensuring the security of DNS systems. Recommendations for realization of these technologies are proposed (pp.53-58).

Keywords: domain names system, DNS server, information security, E-signature, registrar, top level domains, Crypto Officer.
DOI : 10.25045/jpit.v06.i2.06
References
  • Gasimova R.T., Problems of Internet domains and their solutions. Baku: ANAS “Information Technologies” Publishing House, 2012, 164 p.
  • Alguliyev R.M., R.T.Gasimova//Developing intelligent analysis system of domain names. Problems of Information Technology, 2011, No 1, 29-36 pp.
  • www.internetworldstats.com/stats.htm
  • Gasimova R.T., www.internetworldstats.com/stats.htm // Comparative analysis of geographical top-level domains of the Internet. Information Technology, 2011, No 7, 18-23 pp.
  • Alguliev R.M., Gasimova R.T. Identification of Categorical Registration Data of Domain Names in Data Warehouse Construction Task // Journal Intelligent Control and Automation, USA, 2013, vol.4, no.2, pp.227–234.
  • Imamverdiyev Y.N. Analysis of the current state of researches on the management of
    E-government information security problems// Problems of Information Society, 2012, No 2, 19-26 pp.
  • Imamverdiyev Y.N. Conceptual model for E-government information security management//Problems of Information Society, 2013, No 1, 53-58 pp.
  • Massey D., Denning D.E. Guest Editors' Introduction: Securing the Domain Name System // IEEE Security and Privacy, 2009, vol.7, no.5, pp.11–13.
  • Guanchen Chen, Matthew F. Johnson, Pavan R. Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri. Combating Typo-Squatting for Safer Browsing / WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops/ Bradford, United Kingdom, 2009, pp.31–36.
  • Pappas V., Massey D., Zhang L. Enhancing DNS Resilience against Denial of Service Attacks / Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgh, 2007, pp. 450–459.
  • Ariyapperuma S., Mitchell C.J. Security Vulnerabilities in DNS and DNSSEC / Proceedings of the Second International Conference on Availability, Reliability and Security, Vienna, 2007, pp. 335–342.
  • Chandramouli R., Rose S. Open issues in secure DNS deployment //IEEE Security and Privacy, 2009, vol.7, no.5, pp. 29–35.
  • Osterweil E., Zhang L. Inter-administrative challenges in managing DNSKEYs // IEEE Security and Privacy, 2009, vol.7, no.5, pp.44–51.
  • Mamaev M.A., Petrenko S.K. Technologies to protect information on the Internet, SPb.: Peter, 2002, 243 p.
  • Radivilova T.A., Bushmanov V.S. Analysis of the main attacks on DNS-server, and methods of use of DNSSEC in the DNS-server protection // Technological audit and production reserves, 2013, No 1 (10), Volume 2, pp.16-19.
  • Carl Landwehr, Dan Boneh, John Mitchell, Steven M. Bellovin, Susan Landau, Mike Lesk. Privacy and Cybersecurity: The Next 100 Years / Proceedings of the IEEE, PP(99):1–15, May 13th, 2012, vol.100, pp.1659–1673.
  • Steve Bellovin. Using the Domain Name System for System Break-Ins / SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium, 1995, USENIX Association Berkeley, CA, USA, vol.5, pp.18–28.
  • Metzger P., Simpson W.A., Vixie P. Improving TCP security with robust cookies / Proceedings of the 26th Large Installation System Administration Conference (LISA‘12), 2009, vol.34, № 6, pp.86–97.
  • Ballani H., Francis P. Mitigating DNS DoS Attacks / Proceedings of the 15th Conference on Computer and Communications Security, Virginia, 2008, pp.189–198.
  • Arends R.L., Austein R.U. DNS Security Introduction and Requirement // RFC 4033, 2005, 47 p.
  • www.root-d nssec.org/
  • www.dnssec.cz/
  • www.sidn.nl/annualreport/dot
  • http://stats.research.icann.org/dns/tld_report/