ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Deficiency and Secure the Attack Superficies to Your Organization Localization Main DNS SERVER

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 11)

Publication Date:

Authors : ; ; ;

Page : 640-644

Keywords : Introduction and Introductory and connected work; Classification and overview of attack; Deficiency &secure to localization DNS Server;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Domain Name System (DNS) numeric instead of IP address and other Organizations for network of communication of difficult to remember to use Fully Qualified Domain Name (FQDNs) and using identification of hosts on the internet one way to provides a system that is. The Domain Name System (DNS) without you all its network Client server and remember the IP address will be forced to. In the number of attacks on the internet it was available for the common people When is has increased. That has been attacked constantly services from a Domain Name System (DNS). A most important part of outside and inside to queries etc. The Domain Name System (DNS) service employment attacks in major types one attacker fake DNS query sends reactions instead of and valid IP its And, therefore, cache response to user on the site was malicious server will be nominated again Domain Name System (DNS) cache where vicious include . Against the attacks of such for the defense of, a number of research methods have been with and success separate, is implemented. Many steps in this letter to influence them Domain Name System (DNS) service and Information attacks is taken to achieve. Analysis of various attacks possible that and described. Attacks to find out the features of attack done by analysis and Address Methods of imposing is derived. That will be presented in this letter target Domain Name System (DNS) server connected with this kind of attacks on to pick center. The simulated local demand for this kind of attacks out and therefore this kind of attacks in the future to prevent on to search for new measures necessary to identify important steps will be helpful in.

Last modified: 2014-12-06 22:31:02