Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1.

Similar presentations


Presentation on theme: "The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1."— Presentation transcript:

1 The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1

2 A Solution? Or just causing problems? Current needs : ? Example IP address 216.237.61.99. Example FQDN www.example.com DNS Conversion 2 Current needs suited?

3 So where is the DNS heading and what's holding it back? Security problems range from : Phishing Denial-of-service Cache poisoning attacks 3 Internet grows larger + Amount of users grows = Growing number of security risks.

4 The structure of the present DNS 4

5 Primary and Secondary servers 5 Primary Stores a zone file Responsibility for creating, maintaining and updating this file Secondary Stores information about the zone onto a hard drive

6 Under the bonnet 6

7 It doesn’t always go to plan 7 DoS Attack DoS = denial-of-service When a server receives too many queries the server can crash

8 Breaks, ECU and Clutch Breaks, ECU and Clutch are the 3 most important parts of a car. ~~~~~~~~~~~Similarly in the DNS~~~~~~~~~~~ Root sever, inverse domain and caching Root sever, inverse domain and caching are the 3 most important parts of the DNS. 8

9 It doesn’t always go to plan 9 Cache poisoning Is where a fake record of address is submitted to the DNS and accepted.

10 Who has the Control? The main organisation regulating the use of the DNS is the Internet Corporation for Assigned Names and Numbers (ICANN). Data protection act 1998 which is controlled by the government and does have a significant influence on the internet. 10

11 Are we Safe and Secure? The main limitation of the DNS is the security, but is anything being done to improve it? Domain Naming System Security (DNSSEC) 11

12 The verdict 12 As it stands the DNS does not satisfy current needs and has been held back for some time. But the new security protocol along with the new domains will allow the internet to grow into a smarter and safer internet. Future

13 End credits 1)Andrews, C. (n.d.). Train Track style TILER using.Train Stations as START/STOP. Retrieved fromhttp://www.mazecreator.com/maze_creat or_gallery.php 2) Brown, M. (2011). ICANN approves plan to allow almost any domain extension. Wired.co.uk. Retrieved from http://www.wired.co.uk/news/archive/2011- 06/20/icann-approves-adding-more-gtlds 3) Brownlee, N. & Nemeth, E..(2001). DNS Measurements at a Root Server.Retrieved from http://citeseer.ist.psu.edu/viewdoc/summary?d oi=10.1.1.154.9310 4)Crucial vote on Internet's future. (26.6.2008). Retrieved from http://news.bbc.co.uk/1/hi/technology/747488 9.stm 5) Data controller/Data subject.(n.d). In Internet Rights Glossary. Retrieved from http://www.internetrights.org.uk/glossary.shtml 6) Denial-of-service attack.(n.d.). Retrieved from http://en.wikipedia.org/wiki/Denial-of- service_attack 7) DNS (Domain Name System). (n.d.). Retrieved from http://en.kioskea.net/contents/internet/dns.ph p3 8)Foruzan,B.A. (2007). Data communications and networking 4th edition. McGraw Hill. 9) Hally, B. (2008). How DNS poisoning works. Networkworld. Retrieved from http://www.networkworld.com/news/tech/200 8/102008-tech-update.html 10)Internet overhaul wins approval. (26.6.2008). Retrieved from http://news.bbc.co.uk/1/hi/technology/747598 6.stm 11) Kerner, S.M. (8.3.2005). DNS-Based Phishing Attacks on The Rise. Retrieved from http://www.enterprisenetworkingplanet.com/n etsecur/article.php/3488266/DNSBased- Phishing-Attacks-on-The-Rise.html 12) Kawamoto, D. (17.3.2006). DNS recursion leads to nastier DoS attacks. Retrieved from http://www.zdnet.co.uk/news/security- management/2006/03/17/dns-recursion-leads- to-nastier-dos-attacks-39257938/ 13) Lemos, R. (2009). DNS security Protocol Gains Momentum. Technology review. Retrieved from http://www.technologyreview.com/computing/ 23954/ 14) Malware and cyber-crime. (n.d.). In Parliament publications and records. Retrieved from http://www.publications.parliament.uk/pa/cm2 01012/cmselect/cmsctech/writev/mal/mal18.ht m 15) Root server.(n.d.). In PCMAG.com encyclopaedia. Retrieved from http://www.pcmag.com/encyclopedia_term/0,2 542,t=root+server&i=50620,00.asp 16) Shiels, M.(7.8.2008). Net address bug worse than feared. Retrieved from http://news.bbc.co.uk/1/hi/technology/754655 7.stm 17) Shiels, M. (15.6.2010). Technology milestone heralds a more secure internet. Retrieved from http://news.bbc.co.uk/1/hi/technology/874042 6.stm 18) Talbot, D. (2011). Safeguards against "Phishing" Slow in Coming. Technology review. Retrieved from http://www.technologyreview.com/computing/ 37817/ 19) The Domain Name System (DNS).(n.d.) In the network encyclopedia. Retrieved from http://www.thenetworkencyclopedia.com/d2.a sp?ref=654 20) UK domain name dispute rules could change. (2007). Retrieved from http://www.out- law.com/page-7619 21) Williams, C. (29.10.2008). Mandelson's dept mulls UK internet power grab. Retrieved from http://www.theregister.co.uk/2008/10/29/berr _nominet/ 22) What are zone files and zone records?. (2011). Retrieved from http://help.godaddy.com/article/676 13


Download ppt "The Growth, Future and Restraints facing the Domain Naming System (DNS) B101 the Technology Context 1."

Similar presentations


Ads by Google