The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1
A Solution? Or just causing problems? Current needs : ? Example IP address Example FQDN DNS Conversion 2 Current needs suited?
So where is the DNS heading and what's holding it back? Security problems range from : Phishing Denial-of-service Cache poisoning attacks 3 Internet grows larger + Amount of users grows = Growing number of security risks.
The structure of the present DNS 4
Primary and Secondary servers 5 Primary Stores a zone file Responsibility for creating, maintaining and updating this file Secondary Stores information about the zone onto a hard drive
Under the bonnet 6
It doesn’t always go to plan 7 DoS Attack DoS = denial-of-service When a server receives too many queries the server can crash
Breaks, ECU and Clutch Breaks, ECU and Clutch are the 3 most important parts of a car. ~~~~~~~~~~~Similarly in the DNS~~~~~~~~~~~ Root sever, inverse domain and caching Root sever, inverse domain and caching are the 3 most important parts of the DNS. 8
It doesn’t always go to plan 9 Cache poisoning Is where a fake record of address is submitted to the DNS and accepted.
Who has the Control? The main organisation regulating the use of the DNS is the Internet Corporation for Assigned Names and Numbers (ICANN). Data protection act 1998 which is controlled by the government and does have a significant influence on the internet. 10
Are we Safe and Secure? The main limitation of the DNS is the security, but is anything being done to improve it? Domain Naming System Security (DNSSEC) 11
The verdict 12 As it stands the DNS does not satisfy current needs and has been held back for some time. But the new security protocol along with the new domains will allow the internet to grow into a smarter and safer internet. Future
End credits 1)Andrews, C. (n.d.). Train Track style TILER using.Train Stations as START/STOP. Retrieved fromhttp:// or_gallery.php 2) Brown, M. (2011). ICANN approves plan to allow almost any domain extension. Wired.co.uk. Retrieved from 06/20/icann-approves-adding-more-gtlds 3) Brownlee, N. & Nemeth, E..(2001). DNS Measurements at a Root Server.Retrieved from oi= )Crucial vote on Internet's future. ( ). Retrieved from 9.stm 5) Data controller/Data subject.(n.d). In Internet Rights Glossary. Retrieved from 6) Denial-of-service attack.(n.d.). Retrieved from service_attack 7) DNS (Domain Name System). (n.d.). Retrieved from p3 8)Foruzan,B.A. (2007). Data communications and networking 4th edition. McGraw Hill. 9) Hally, B. (2008). How DNS poisoning works. Networkworld. Retrieved from 8/ tech-update.html 10)Internet overhaul wins approval. ( ). Retrieved from 6.stm 11) Kerner, S.M. ( ). DNS-Based Phishing Attacks on The Rise. Retrieved from etsecur/article.php/ /DNSBased- Phishing-Attacks-on-The-Rise.html 12) Kawamoto, D. ( ). DNS recursion leads to nastier DoS attacks. Retrieved from management/2006/03/17/dns-recursion-leads- to-nastier-dos-attacks / 13) Lemos, R. (2009). DNS security Protocol Gains Momentum. Technology review. Retrieved from / 14) Malware and cyber-crime. (n.d.). In Parliament publications and records. Retrieved from /cmselect/cmsctech/writev/mal/mal18.ht m 15) Root server.(n.d.). In PCMAG.com encyclopaedia. Retrieved from 542,t=root+server&i=50620,00.asp 16) Shiels, M.( ). Net address bug worse than feared. Retrieved from 7.stm 17) Shiels, M. ( ). Technology milestone heralds a more secure internet. Retrieved from 6.stm 18) Talbot, D. (2011). Safeguards against "Phishing" Slow in Coming. Technology review. Retrieved from / 19) The Domain Name System (DNS).(n.d.) In the network encyclopedia. Retrieved from sp?ref=654 20) UK domain name dispute rules could change. (2007). Retrieved from law.com/page ) Williams, C. ( ). Mandelson's dept mulls UK internet power grab. Retrieved from _nominet/ 22) What are zone files and zone records?. (2011). Retrieved from 13