首页> 外文会议>International Conference on Information and Communication Technology Convergence >A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation
【24h】

A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation

机译:基于客户端的DNSSEC验证机制,具有递归DNS服务器分离

获取原文

摘要

DNSSEC has been proposed to provide data origin authentication and data integrity between recursive DNS server and authoritative zone server. Although DNSSEC is an effective countermeasure to DNS cache poisoning attack, it still has low deployment rate in the Internet due to the significant workload increase on recursive DNS servers. Moreover, current DNSSEC operation does not cover end clients and the recursive DNS server separation has not been considered so that end users do not intend to use free and powerful public recursive DNS servers due to security concerns. In this paper, we propose a client based DNSSEC validation mechanism with recursive DNS server separation based on query types. DNSSEC related record types such as RRSIG, DNSKEY, DS, etc. will be forwarded to a trusted internal recursive DNS server while normal record types such as A, AAAA, MX, etc. will be forwarded to public recursive DNS server, and eventually, DNSSEC validation will be performed on end clients. Consequently, not only end clients can obtain the benefit of DNSSEC but also the workload increase of internal recursive DNS servers can be mitigated. We implemented a prototype system and evaluated the features on a local experimental network. Based on the results, we confirmed that the prototype system worked effectively and it is possible to prevent end clients from DNS cache poisoning attacks by the proposed mechanism.
机译:已提出DNSSEC在递归DNS服务器和权威区域服务器之间提供数据原始身份验证和数据完整性。虽然DNSSEC是对DNS缓存中毒攻击的有效对策,但由于递归DNS服务器的显着工作量增加,Internet仍然具有低部署速率。此外,当前DNSSEC操作不涵盖终端客户端,并且常用的DNS服务器分离尚未考虑,以便由于安全问题,最终用户不打算使用免费和强大的公共递归DNS服务器。在本文中,我们提出了一种基于客户端的DNSSEC验证机制,其基于查询类型的递归DNS服务器分离。 DNSSEC相关的记录类型如RRSIG,DNSKEY,DS等将被转发到可信内部递归DNS服务器,而常规记录类型如A,AAAA,MX等。将被转发给公共递归DNS服务器,最终DNSSEC验证将在最终客户端上执行。因此,不仅最终客户端可以获得DNSSEC的好处,而且可以减轻内部递归DNS服务器的工作量增加。我们实现了一个原型系统,并在当地实验网络上进行了评估。根据结果​​,我们确认原型系统有效地工作,可以通过所提出的机制防止来自DNS高速缓存中毒攻击的最终客户端。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号