• Title/Summary/Keyword: Domain Name

Search Result 163, Processing Time 0.028 seconds

A New DNS Protocol for Multilingual Domain Names (다국어 도메인을 위한 DNS 프로토콜 : mlDNS)

  • 신혜원;이승익;이동만
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.328-330
    • /
    • 2000
  • DNS(Domain Name Service)는 인터넷 호스트의 주소를 제공하는 서비스로써 기존의 시스템은 영어 알파벳 이외의 다른 언어들로 구성된 도메인 네임(Domain Name)은 처리하지 못한다. 최근, 인터넷의 국제화에 따른 다국어 도메인의 필요성이 점차 증대됨에 따라 이러한 문제점을 해결하고 다국어 도메인 이름을 처리할 수 있는 새로운 DNS 프로토콜인 mlDNS(Multilingual Domain Name Service)를 제안한다. 기존의 DNS와의 호환성 및 상호 운용성을 보장하고 특정 언어에 종속되지 않는 시스템을 디자인하기 위해 mlDNS에서는 Unicode 문자 집합을 기반으로 모든 DNS 질의를 UTF-8 인코딩 방식으로 처리하고 이러한 새로운 mlDNS 질의와 기존의 DNS 질의를 구분하기 위해 DNS 질의 헤더에 'IN'이라는 새로운 비트 영역을 지정하여 사용한다.

  • PDF

Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries

  • Wang, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2750-2763
    • /
    • 2012
  • The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past decade, Denial-of-Service (DoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. While the flooding DoS attacks may be alleviated by the DNS caching mechanism, we show in this paper that flooding DoS attacks utilizing name error queries is capable of bypassing the cache of resolvers and thereby impose overwhelming flooding attacks on the name servers. We analyze the impacts of such DoS attacks on both name servers and resolvers, which are further illustrated by May 19 China's DNS Collapse. We also propose the detection and defense approaches for protecting DNS servers from such DoS attacks. In the proposal, the victim zones and attacking clients are detected through monitoring the number of corresponding responses maintained in the negative cache. And the attacking queries can be mitigated by the resolvers with a sample proportion adaptive to the percent of queries for the existent domain names. We assess risks of the DoS attacks by experimental results. Measurements on the request rate of DNS name server show that this kind of attacks poses a substantial threat to the current DNS service.

International Benchmarking on Factors Affecting the Number of Country Domain Name (국가도메인 네임 등록 수에 영향을 미치는 요인에 관한 국제 비교)

  • Kim, So-ra;Jun, Hyo-Jung;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2434-2442
    • /
    • 2015
  • With the arrival of the era of the Internet of Things (IoT), identification of an individual object is gaining significance. Internet address resources such as domain name, IP address, and OID are expected to play the role of an identifier and demand for them is also expected to increase. Accordingly, it becomes important to obtain the Internet address resources. As the Internet address resources market development, Internet address resources at the present time there is a need to gauge whether the potential to develop into industry. For this purpose, we have selected factors affecting the number of country domain name with 18 countries among OECD member countries as research target and carried out a regression analysis.

ITU, Internet 도메인 네임 관리개선을 위한 gTLD-MoU회의 개최

  • 이홍림
    • TTA Journal
    • /
    • s.51
    • /
    • pp.108-117
    • /
    • 1997
  • 현행 Internet 도메인 네임(domain name)에 대한 관리체계를 개선하기 위한 gTLD-MoU회의가 4월 29일부터 5월1일까지 스위스 제네바의 ITU본부에서 개최되었다. 현재 미국 독점으로 관리되고 있는 Internet top level domain name의 등록 및 관리체계를 전면적으로 개선하기 위해 개최된 본 회의는 지난해 11월 발족이후 이에 대한 검토작업을 진행해 온 IAHC(Internet International Ad Hoc Committee)의 주관으로 IANA, ISOC, ITU, WIPO를 포함, 전 세계로부터 101개 기관, 126명의 대표가 참석하였으며, 향후 Internet top level domain name의 등록업무 및 관리체계 개선에 관한 세부내용을 담은 양해각서(gTLD-MoU)에 대한 논의와 함께 80개 기관 대표가 서명에 참가한 가운데 gTLD-MoU에 대한 서명식을 가졌다. 한편, gTLD-MoU가 5월 1일로 정식 발효됨에 따라 ITU는 앞으로 gTLD-MoU의 관리기관(depository) 역할을 수행하게 되며, MoU 및 서명자 관리와 관련정보의 유통업무 등을 담당하게 된다.

  • PDF

Foundation Techniques and Fault-tolerance Tests of Active-Active Duplicated Domain Name Servers (Active-Active 방식의 DNS 서버의 이중화 구축 및 결함내성 시험)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.90-100
    • /
    • 2013
  • Active-Standby Duplication Techniques are conventionally used for fault-tolerant systems. But in this paper we researched on the Active-Active Duplication Techniques for Fault-tolerant DNS System. Our Active-Active Duplication made the 1st DNS periodically copied to the 2nd DNS and maintained the same status by using Rsync and Crontab. Even though the 1st or the 2nd DNS stops due to some critical errors, the remaining DNS can take over and provide continuous services.

Design and Implementation of a Forwarding Server for Using the Logical URL (논리적 URL 사용을 위한 포워딩 서버의 설계 및 구현)

  • 양희재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.239-249
    • /
    • 2003
  • A lot many WWW sites are come into the world more and more as Web is considered as the unified Internet information tool. The location of each site or resource is usually specified by a physical URL, which is often too long to remember and tends to raise difficulty to show the aim of the site intuitively by seeing it. Since any person or organization can get his/her own domain name easily, it is more desirable to use a logical URL with the domain name which can be chosen more compact to remember and meaningful to represent the ultimate intention of the site. This paper presents an implementation of a URL forwarding server which forwards a URL to another, so that a WWW site can use a logical URL instead of a physical one. The server consists of a domain mapper which uses the redirection transaction of the HTTP protocol, and a name server based on the HIND. The paper shows how the interaction between the domain mapper and the name sever can make forwarding possible and describes its implementation in detail. Experimental results shows that the overhead incurred by URL forwarding is negligible compared to the typical delay of current Internet traffic condition.

Web Application Awareness using HTTP Host (HTTP Host를 이용한 웹 어플리케이션 인식에 관한 연구)

  • Choi, Ji Hyeok;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.327-334
    • /
    • 2013
  • Today's network traffic has become extremely complex and diverse since the speed of network became faster and a variety of application services appear. Moreover, many applications appear and disappear fast and continuously. However, the current traffic classification system does not give much attention to this dynamic change of applications. In this paper, we propose an application awareness system in order to solve this problem. The application awareness system can provide the information, such as the usage trend of conventional applications and the emergence of new applications by recognizing the application name in a rapidly changing network environment. In order to recognize the application name, the Host field of HTTP protocol has been utilized. The proposed mechanism consists of two steps. First, the system generates the candidates of application name by extracting the domain name from the Host field in HTTP packet. Second, the administrator confirms the name afterward. The validity of the proposed system has been proved through the experiments in campus network.

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

Practices and Legal Issues of Online Arbitration in China - focused on Online Arbitration of CIETAC (중국의 온라인중재 운용과 법적문제에 관한 연구 - CIETAC의 온라인중재를 중심으로)

  • Cha, Kyung-Ja;Choi, Sung-Il
    • Journal of Arbitration Studies
    • /
    • v.20 no.2
    • /
    • pp.131-149
    • /
    • 2010
  • Since the Arbitration Law of China took effect in 1995, arbitration has grown with the economy. At the end of 2009, there were 202 arbitration institutions in China. Among them, China International Economic and Trade Arbitration Commission(CIETAC) has adopted online arbitration and has settled internet domain name disputes since 2001. CIETAC Domain Name Dispute Resolution Center(DNDRC) has accumulated abundant experiences of online arbitration in the field of domain name disputes. Based on those experiences, on 1 May 2009, CIETAC implemented the CIETAC Online Arbitration Rules(Rules') to regulate the resolution of e-business disputes as well as other business disputes. With this background, this article aims to study the status quo, practices and issues of online arbitration conducted by CIETAC. For the purpose of the article, a general picture of online arbitration is outlined first, followed by introducing the steps of the online arbitration procedure. According to the 'Rules', the entire arbitration process is conducted using online communication methods which are cost-effective and efficient. To facilitate the development of online arbitration, legal barriers need to be removed. This article considers main legal issues of online arbitration in China and proposes amendment to Chinese Arbitration Law, in particular, the recognition of the validity of electronic arbitration agreements and awards.

  • PDF