• Title/Summary/Keyword: DNS Zone File

Search Result 3, Processing Time 0.018 seconds

Design and Implementation of Efficient Dynamic Update and Zone Transfer in the Secure DNS (안전한 DNS에서의 효율적인 동적 갱신과 존 전송 기능의 설계와 구현)

  • Shim, Hee-Won;Shim, Young-Chul;Im, Chan-Soon;Lee, Man-Hee;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.99-114
    • /
    • 2000
  • In the secure DNS the amount of information that should be managed greatly increased and the interdependency in the information became very complex. Therefore, it became necessary to develop a mechanism which can manage zone information efficiently. Moreover, a consistent interface became also necessary so that a secure DNS may be efficiently interconnected with other Internet application services. In this paper we explain the design and implementation of a secure DNS extended with two functions : (1) a dynamic update function which enables to add and remove zone information dynamically and (2) a zone transfer function that efficiently transfers update zone information among DNS servers. We developed a method which integrates two zone transfer mechanisms, full zone transfer and incremental zone transfer, and also proposed a method to compress data in the zone transfer message. We also introduced a data structure called a delta file to integrate the zone transfer function and the dynamic update function.

  • PDF

A Proactive Inference Method of Suspicious Domains (선제 대응을 위한 의심 도메인 추론 방안)

  • Kang, Byeongho;YANG, JISU;So, Jaehyun;Kim, Czang Yeob
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.405-413
    • /
    • 2016
  • In this paper, we propose a proactive inference method of finding suspicious domains. Our method detects potential malicious domains from the seed domain information extracted from the TLD Zone files and WHOIS information. The inference process follows the three steps: searching the candidate domains, machine learning, and generating a suspicious domain pool. In the first step, we search the TLD Zone files and build a candidate domain set which has the same name server information with the seed domain. The next step clusters the candidate domains by the similarity of the WHOIS information. The final step in the inference process finds the seed domain's cluster, and make the cluster as a suspicious domain set. In experiments, we used .COM and .NET TLD Zone files, and tested 10 seed domains selected by our analysts. The experimental results show that our proposed method finds 55 suspicious domains and 52 true positives. F1 scores 0.91, and precision is 0.95 We hope our proposal will contribute to the further proactive malicious domain blacklisting research.

An Architecture and Experimentation for Efficient and Reliable Name Service Systems (효율적이고 신뢰성 있는 네임 서비스 시스템의 구조 및 실험)

  • 심영철;박준철;강호석;이준원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.375-390
    • /
    • 2004
  • Domain Name System(DNS), one of the most important Internet services, handles mapping from host names to Internet addresses and vice versa, and precedes many Internet applications such as Web, e-mail, file transfer, etc. In this paper, we propose a structural design of a generic name server system providing name services for a huge domain for the purpose of improving the performance as well as the reliability of the system. We demonstrate the validity of the design by implementing and running a testbed system. Our testbed employs a couple of master name sowers for distributing the service overhead over two, rather than one, servers and for achieving high availability of the system as a whole. We suggest the use of dynamic update to add and delete records from a zone for which the name server has authority. The slave name servers located remotely then get a new, updated copy of the zone via incremental zone transfers(IXFRs). The experiments with the implemented testbed show that the proposed structure would easily manage increasing demands on the server power, and be highly available in the face of transient faults of a module in the system.