Fig. 1. Layered DNS Tree Structure
Fig. 2. Example of Domain Name Create Structure
Fig. 3. Domain Name Query Process
Fig. 4. Blockchain Structure
Fig. 5. Proposed DNS Registration and UnregistrationTransaction Structure
Fig. 6. Proposed Blockchain Transaction Structure for Change IP
Fig. 7. Proposed Blockchain Network Based DNS Query Model
Fig. 8. Genesis Block Structure for Blockchain System
Fig. 9. Create Blockchain Address
Fig. 10. Mist Browser User for Blockchain
Fig. 11. Smart Contract Source Code for Blockchain DNS
Fig. 12. Creating Transaction Using Smart Contract
Fig. 13. Execute Contract for Domain Name Registration
Fig. 14. Unique Domain Name Using Blockchain Network
Table 1. Proposed System Node Specification
Table 2. Proposed System Efficiency Verification for Domain Name Registration
Table 3. Proposed System Efficiency Verification for Domain Name Server
References
- TTA, Telecommunications Technology Terms Dictionary, http://terms.tta.or.kr/dictionary/dictionaryView. do?word_seq=057943-2 (accessed January, 2, 2019).
- Do-Won Kim, Internet & Security Focus, Focus 1, Understanding DNS based on internet usage and DNS security, Korea Internet & Security Agency, Korea, pp.6-25, September, 2013.
- The Verisign Domain Name Industry Brief, Q3, 2018, https://www.verisign.com/en_US/domain-names/dnib/index.xhtml (accessed February, 8, 2019).
- Ministry of Science and ICT, Basic Plan for Promotion and Management of the Development and Utilization of the 5th Internet Address Resources (2018-2020), Korea, pp.1-16, May, 2018.
- Cybersquatter, Wikipedia, December, 2018, https://en.wikipedia.org/wiki/Cybersquatting (accessed December, 10, 2018).
- Secure News, June, 2017, https://www.boannews.com/media/view.asp?idx=55083 (accessed January, 2, 2019).
- ICANN, Resources, Help, Domain Name Dispute Resolution, https://www.icann.org/resources/pages/dndr-2012-02-25-en (accessed January, 7, 2019).
- Namecoin, https://www.namecoin.org/, (accessed February, 16, 2019).
- EmerDNS, Emercoin, https://emercoin.com/en/documentation/blockchain-services/emerdns/emerdns-introduction, (accessed March, 20, 2019).
- Domain Name System, Wikipedia, February 2019, https://en.wikipedia.org/wiki/Domain_Name_System (accessed December, 3, 2018).
- Charles M. Kozierok, The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference, p.825-927, acorn publishing company, 2007.
- KRNIC, Internet Address Resource, Domain Name System(DNS), https://xn-3e0bx5euxnjje69i70af08bea817g.xn-3e0b707e/jsp/resources/dns/dnsInfo.jsp (accessed January, 8, 2019).
- Jae-Wook Heo, Sung-Soo Kim, Jeong-Ho Kang, Moon-Seog Jun, "Study on Improvement and Correlation of Blockchain and Right to be Forgotten", The KIPS Fall Conference 2018 on Korea Information Processing Society , Vol.25, No.2 pp.231-234, November, 2018.
- Jonathan Strickland, What is Computing Power?, Howstuffworks, https://computer.howstuffworks.com/computing-power.htm (accessed February 12, 2019).
- Go Ethereum, https://geth.ethereum.org/downloads/(accessed November, 10, 2018).
- Domain Service, https://netsvill.net/domain/1_4_a.asp (accessed January, 2, 2019).
- Tom Olzak, "DNS Cache Poisoning: Definition and Prevention", http://www.infosecwriters.com, pp.4-7, March, 2006.
- Lan Green, "DNS Spoofing by The Man In The Middle", SANS Institute InfoSec Reading Room, pp.5, 2005.
- Bennett Garner, What's a Sybil Attack & How Do Blockchains Mitigate Them?, Coin Central, August, 2018, https://coincentral.com/sybil-attack-blockchain/, Coin Central (accessed January 6, 2019).
- Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, and Stefanos Gritzalis, "Detecting DNS Amplification Attacks", Critical Information Infrastructures Security, Lecture Notes in Computer Science, Vol.5141, pp.185-196, October, 2007 DOI: https://doi.org/10.1007/978-3-540-89173-4_16
- Ji-yeon Kim, Ju-Li Lee, Eun-Ji Park, Eun-Young Jang, Hyung-jong Kim, "A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense", The Korea Society for Simulation, Vol.18, No.4, pp.39-47, December, 2009.
- Sawan Kumar, Jens Hermann Paulsen, Prevention of DDoS attacks with Blockchain technology, Deloitte, UK,pp.1-3, December, 2017.