DNS Aegis, Authentication with Digital Signature using Hash Functions and Various Attacks: KARKOFF
Arvind Sharma1, Avinash Sharma2, Aditya Saini3, Paluck Arora4, S.K. Mittal5
1Arvind Sharma, Assistant Professor, MM Institute of Computer Technology & Business Management (MCA) (MMDU), Haryana, Research Scholar, University School of Engineering, Rayat Bahra University, Punjab.
2Avinash Sharma, Professor, MM Engineering College (MMEC).
3Aditya Saini, Scholar, MM Engineering College (MMEC).
4Paluck Arora, Assistant Professor M.M. Institute of Computer Technology & Business Management (M.C.A.) S.K. Mittal, Profesor, University School of Engineering & Technology
Manuscript received on October 13, 2019. | Revised Manuscript received on 24 October, 2019. | Manuscript published on November 10, 2019. | PP: 5066-5569 | Volume-9 Issue-1, November 2019. | Retrieval Number: A8901119119/2019©BEIESP | DOI: 10.35940/ijitee.A8901.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: DNS have a crucial role in adequate functioning/performance of the Internet. Even though every single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.
Keywords: Adversary, Bit-Squatting, Cache, Denial-Of Service, Domain-Name, Eavesdropping, Hijack, Timestamp, Time-to-Live, Uniform Resource Locator.
Scope of the Article: Bio-Science and Bio-Technology