DNS aegis, authentication with digital signature using hash functions and various attacks: KARKOFF

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

DNS have a crucial role in adequate functioning/performance of the Internet. Even though every single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.

Cite

CITATION STYLE

APA

Sharma, A. K., Sharma, A., Saini, A., Arora, P., & Mittal, S. K. (2019). DNS aegis, authentication with digital signature using hash functions and various attacks: KARKOFF. International Journal of Innovative Technology and Exploring Engineering, 9(1), 5066–5069. https://doi.org/10.35940/ijitee.A8901.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free