Wang et al., 2019 - Google Patents
Design and implementation of an SDN-enabled DNS security frameworkWang et al., 2019
- Document ID
- 4439663112416010817
- Author
- Wang Z
- Hu H
- Cheng G
- Publication year
- Publication venue
- China Communications
External Links
Snippet
The Domain Name System (DNS) is suffering from the vulnerabilities exploited to launch the cache poisoning attack. Inspired by biodiversity, we design and implement a non-intrusive and tolerant secure architecture Multi-DNS (MDNS) to deal with it. MDNS consists of …
- 230000000607 poisoning 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
- H04L29/12047—Directories; name-to-address mapping
- H04L29/12056—Directories; name-to-address mapping involving standard directories and standard directory access protocols
- H04L29/12066—Directories; name-to-address mapping involving standard directories and standard directory access protocols using Domain Name System [DNS]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8250631B2 (en) | Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages | |
Ariyapperuma et al. | Security vulnerabilities in DNS and DNSSEC | |
US7620733B1 (en) | DNS anti-spoofing using UDP | |
US20110047610A1 (en) | Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication | |
Wang et al. | Design and implementation of an SDN-enabled DNS security framework | |
US11784993B2 (en) | Cross site request forgery (CSRF) protection for web browsers | |
Dissanayake | DNS cache poisoning: A review on its technique and countermeasures | |
Noborio et al. | A feasible motion-planning algorithm for a mobile robot based on a quadtree representation | |
Lu et al. | An SDN‐based authentication mechanism for securing neighbor discovery protocol in IPv6 | |
Zou et al. | Survey on domain name system security | |
Hu et al. | IDV: internet domain name verification based on blockchain | |
Kesavamoorthy et al. | Classification of DDoS attacks–A survey | |
Boppana et al. | Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks | |
Shulman et al. | Towards forensic analysis of attacks with DNSSEC | |
Black et al. | A survey on the verification of adversarial data planes in software-defined networks | |
Song et al. | A novel frame switching model based on virtual MAC in SDN | |
Cheung | Denial of service against the domain name system | |
Zhao et al. | DCG: A Client-side Protection Method for DNS Cache. | |
Song et al. | Using FDAD to prevent DAD attack in secure neighbor discovery protocol | |
Chau et al. | Adaptive deterrence of dns cache poisoning | |
Rafiee et al. | A flexible framework for detecting ipv6 vulnerabilities | |
Cao et al. | Covert channels in SDN: Leaking out information from controllers to end hosts | |
Casado | Architectural support for security management in enterprise networks | |
Comer | Network processors: programmable technology for building network systems | |
Shue et al. | Packet forwarding with source verification |