The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1.

Slides:



Advertisements
Similar presentations
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Advertisements

Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Describe four (4) services that are part of the TCP/IP protocol suite that would probably be implemented within a network centre to manage: naming within.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
Application Layer At long last we can ask the question - how does the user interface with the network?
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
DNS Security Extensions (DNSSEC) Ryan Dearing. Topics History What is DNS? DNS Stats Security DNSSEC DNSSEC Validation Deployment.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
1 Secure DNS Solutions Rooster. 2 Introduction What does security mean for DNS? What security problems exist for DNS, what is being done about them, and.
Module 12: Domain Name System (DNS)
CSE 461 Section (Week 0x02). Port numbers for applications MAC addresses for hardware IP addresses for a way to send data in a smart, routable way.
Domain Name Services Oakton Community College CIS 238.
Ch25 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Lecturer : Ms.Trần Thị Ngọc Hoa Chapter 2 Methods Configuring Name Resolution Methods.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Basic DNS Course Lecturer: Ron Aitchison. Module 1 DNS Theory.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
CSUF Chapter 6 1. Computer Networks: Domain Name System 2.
Windows Server 2008 R2 Domain Name System Chapter 5.
By Chris Racki. Outline  Introduction  How DNS works  A typical DNS lookup  Caching for later  Vulnerabilities of DNS  Anatomy of a cache poisoning.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 17 Domain Name System
1 Computer Communication & Networks Lecture 26 Application Layer: Domain Name System Waleed Ejaz.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Domain Name System CH 25 Aseel Alturki
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Distributed Computing COEN 317 DC2: Naming, part 1.
Domain Name System. CONTENTS Definitions. DNS Naming Structure. DNS Components. How DNS Servers work. DNS Organizations. Summary.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
TODAY & TOMORROW DAY 2 - GROUP 5 PRESENTED BY: JAMES SPEIRS CHARLES HIGBY BRADY REDFEARN Domain Name System (DNS)
1 Kyung Hee University Chapter 18 Domain Name System.
Configuring Name Resolution and Additional Services Lesson 12.
Windows Server 2003 DNS 安裝設定與管理維護 林寶森
1 Domain Name System (DNS). 2 3 How DNS Works Application Transport Internet Network Application Transport Internet Network DNS Resolver Name Server.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
DNS Domain Name System By Alexandros Zampas B101 Coursework The Technology Context.
The Domain Name System The Components, Functions, Legality and Issues of the Domain Name System.
(Domain Name System) Ismael Ali Technology Context Chi.
The Domain Name System Student : Hi this is my presentation about.
1) The size of the Domain name system. 2) The main components of the Domain Naming System operation. 3) The function of the Domain Naming System. 4)Legislation.
Domain Name Sysytem The most sustainable tool for development.
Is the Domain Name System the heart of the internet?
DNS Domain Name System. Lots of people use the internet for different reasons. DNS Plays a big role in the internet. The DNS translates domain names into.
THE DNS (DOMAIN NAME SYSTEM). Before the DNS, all computers connected to the internet through ARPANET (the worlds first operational packet switching network).
The Domain Name System (DNS) By Alex Kamau B101 Technology Context.
Security Issues with Domain Name Systems
Chapter 7. Identifying Assets and Activities to Be Protected
Principles of Computer Security
Chapter 25 Domain Name System.
Chapter 19 Domain Name System (DNS)
Chapter 25 Domain Name System
Chapter 25 Domain Name System.
Chapter 25 Domain Name System
Computer Networks Presentation
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1

A Solution? Or just causing problems? Current needs : ? Example IP address Example FQDN DNS Conversion 2 Current needs suited?

So where is the DNS heading and what's holding it back? Security problems range from : Phishing Denial-of-service Cache poisoning attacks 3 Internet grows larger + Amount of users grows = Growing number of security risks.

The structure of the present DNS 4

Primary and Secondary servers 5 Primary Stores a zone file Responsibility for creating, maintaining and updating this file Secondary Stores information about the zone onto a hard drive

Under the bonnet 6

It doesn’t always go to plan 7 DoS Attack DoS = denial-of-service When a server receives too many queries the server can crash

Breaks, ECU and Clutch Breaks, ECU and Clutch are the 3 most important parts of a car. ~~~~~~~~~~~Similarly in the DNS~~~~~~~~~~~ Root sever, inverse domain and caching Root sever, inverse domain and caching are the 3 most important parts of the DNS. 8

It doesn’t always go to plan 9 Cache poisoning Is where a fake record of address is submitted to the DNS and accepted.

Who has the Control? The main organisation regulating the use of the DNS is the Internet Corporation for Assigned Names and Numbers (ICANN). Data protection act 1998 which is controlled by the government and does have a significant influence on the internet. 10

Are we Safe and Secure? The main limitation of the DNS is the security, but is anything being done to improve it? Domain Naming System Security (DNSSEC) 11

The verdict 12 As it stands the DNS does not satisfy current needs and has been held back for some time. But the new security protocol along with the new domains will allow the internet to grow into a smarter and safer internet. Future

End credits 1)Andrews, C. (n.d.). Train Track style TILER using.Train Stations as START/STOP. Retrieved fromhttp:// or_gallery.php 2) Brown, M. (2011). ICANN approves plan to allow almost any domain extension. Wired.co.uk. Retrieved from 06/20/icann-approves-adding-more-gtlds 3) Brownlee, N. & Nemeth, E..(2001). DNS Measurements at a Root Server.Retrieved from oi= )Crucial vote on Internet's future. ( ). Retrieved from 9.stm 5) Data controller/Data subject.(n.d). In Internet Rights Glossary. Retrieved from 6) Denial-of-service attack.(n.d.). Retrieved from service_attack 7) DNS (Domain Name System). (n.d.). Retrieved from p3 8)Foruzan,B.A. (2007). Data communications and networking 4th edition. McGraw Hill. 9) Hally, B. (2008). How DNS poisoning works. Networkworld. Retrieved from 8/ tech-update.html 10)Internet overhaul wins approval. ( ). Retrieved from 6.stm 11) Kerner, S.M. ( ). DNS-Based Phishing Attacks on The Rise. Retrieved from etsecur/article.php/ /DNSBased- Phishing-Attacks-on-The-Rise.html 12) Kawamoto, D. ( ). DNS recursion leads to nastier DoS attacks. Retrieved from management/2006/03/17/dns-recursion-leads- to-nastier-dos-attacks / 13) Lemos, R. (2009). DNS security Protocol Gains Momentum. Technology review. Retrieved from / 14) Malware and cyber-crime. (n.d.). In Parliament publications and records. Retrieved from /cmselect/cmsctech/writev/mal/mal18.ht m 15) Root server.(n.d.). In PCMAG.com encyclopaedia. Retrieved from 542,t=root+server&i=50620,00.asp 16) Shiels, M.( ). Net address bug worse than feared. Retrieved from 7.stm 17) Shiels, M. ( ). Technology milestone heralds a more secure internet. Retrieved from 6.stm 18) Talbot, D. (2011). Safeguards against "Phishing" Slow in Coming. Technology review. Retrieved from / 19) The Domain Name System (DNS).(n.d.) In the network encyclopedia. Retrieved from sp?ref=654 20) UK domain name dispute rules could change. (2007). Retrieved from law.com/page ) Williams, C. ( ). Mandelson's dept mulls UK internet power grab. Retrieved from _nominet/ 22) What are zone files and zone records?. (2011). Retrieved from 13