Browse > Article
http://dx.doi.org/10.5762/KAIS.2019.20.5.36

Design and Implementation of Blockchain Network Based on Domain Name System  

Heo, Jae-Wook (Dept. of Computer Science and Engineering, Soongsil University)
Kim, Jeong-Ho (Dept. of Computer Science and Engineering, Soongsil University)
Jun, Moon-Seog (Dept. of Computer Science and Engineering, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.20, no.5, 2019 , pp. 36-46 More about this Journal
Abstract
The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.
Keywords
Blockchain; Domain Name System; Domain Name Server; Fourth Industrial Revolution; Internet;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 TTA, Telecommunications Technology Terms Dictionary, http://terms.tta.or.kr/dictionary/dictionaryView. do?word_seq=057943-2 (accessed January, 2, 2019).
2 Do-Won Kim, Internet & Security Focus, Focus 1, Understanding DNS based on internet usage and DNS security, Korea Internet & Security Agency, Korea, pp.6-25, September, 2013.
3 The Verisign Domain Name Industry Brief, Q3, 2018, https://www.verisign.com/en_US/domain-names/dnib/index.xhtml (accessed February, 8, 2019).
4 Ministry of Science and ICT, Basic Plan for Promotion and Management of the Development and Utilization of the 5th Internet Address Resources (2018-2020), Korea, pp.1-16, May, 2018.
5 Cybersquatter, Wikipedia, December, 2018, https://en.wikipedia.org/wiki/Cybersquatting (accessed December, 10, 2018).
6 Secure News, June, 2017, https://www.boannews.com/media/view.asp?idx=55083 (accessed January, 2, 2019).
7 ICANN, Resources, Help, Domain Name Dispute Resolution, https://www.icann.org/resources/pages/dndr-2012-02-25-en (accessed January, 7, 2019).
8 Namecoin, https://www.namecoin.org/, (accessed February, 16, 2019).
9 EmerDNS, Emercoin, https://emercoin.com/en/documentation/blockchain-services/emerdns/emerdns-introduction, (accessed March, 20, 2019).
10 Domain Name System, Wikipedia, February 2019, https://en.wikipedia.org/wiki/Domain_Name_System (accessed December, 3, 2018).
11 Charles M. Kozierok, The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference, p.825-927, acorn publishing company, 2007.
12 KRNIC, Internet Address Resource, Domain Name System(DNS), https://xn-3e0bx5euxnjje69i70af08bea817g.xn-3e0b707e/jsp/resources/dns/dnsInfo.jsp (accessed January, 8, 2019).
13 Jae-Wook Heo, Sung-Soo Kim, Jeong-Ho Kang, Moon-Seog Jun, "Study on Improvement and Correlation of Blockchain and Right to be Forgotten", The KIPS Fall Conference 2018 on Korea Information Processing Society , Vol.25, No.2 pp.231-234, November, 2018.
14 Jonathan Strickland, What is Computing Power?, Howstuffworks, https://computer.howstuffworks.com/computing-power.htm (accessed February 12, 2019).
15 Go Ethereum, https://geth.ethereum.org/downloads/(accessed November, 10, 2018).
16 Domain Service, https://netsvill.net/domain/1_4_a.asp (accessed January, 2, 2019).
17 Tom Olzak, "DNS Cache Poisoning: Definition and Prevention", http://www.infosecwriters.com, pp.4-7, March, 2006.
18 Lan Green, "DNS Spoofing by The Man In The Middle", SANS Institute InfoSec Reading Room, pp.5, 2005.
19 Bennett Garner, What's a Sybil Attack & How Do Blockchains Mitigate Them?, Coin Central, August, 2018, https://coincentral.com/sybil-attack-blockchain/, Coin Central (accessed January 6, 2019).
20 Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, and Stefanos Gritzalis, "Detecting DNS Amplification Attacks", Critical Information Infrastructures Security, Lecture Notes in Computer Science, Vol.5141, pp.185-196, October, 2007 DOI: https://doi.org/10.1007/978-3-540-89173-4_16
21 Ji-yeon Kim, Ju-Li Lee, Eun-Ji Park, Eun-Young Jang, Hyung-jong Kim, "A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense", The Korea Society for Simulation, Vol.18, No.4, pp.39-47, December, 2009.
22 Sawan Kumar, Jens Hermann Paulsen, Prevention of DDoS attacks with Blockchain technology, Deloitte, UK,pp.1-3, December, 2017.