2010 International Conference on Machine Learning and Cybernetics 2010
DOI: 10.1109/icmlc.2010.5580489
|View full text |Cite
|
Sign up to set email alerts
|

Research and implementation of DNSSEC monitoring system

Abstract: DNS is one of internet infrastructure, but there also exist a lot of security vulnerabilities in it. The DNSSEC drafted by IETF is replacing the DNS for enhancing the security. However, the characteristics of DNSSEC have led to failure of the old monitoring system partly. This paper based on study of the DNSSEC protocol implementation and deployment proposes a kind of constructing plan about domain name redirecting, recursive domain name server record and national DLV trust chain. Then we establish an effectiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Because the resources will be consumed while the producers updating the data, it is a waste if consumed resources do not produce a corresponding monitoring data. Sun pointed that the information collection efficiency can be improved by reducing the information collection frequency [17]. And the data amount obtained by monitoring should also be considered.…”
Section: Monitoring Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Because the resources will be consumed while the producers updating the data, it is a waste if consumed resources do not produce a corresponding monitoring data. Sun pointed that the information collection efficiency can be improved by reducing the information collection frequency [17]. And the data amount obtained by monitoring should also be considered.…”
Section: Monitoring Metricsmentioning
confidence: 99%
“…In order to simulate the result of data transmission both our method and the method of [14] as much real as possible, the experiments are executed in CloudSim [17,18]. We use the node logs in PlanetLab project to simulate the resource use under cloud environments.…”
Section: Experiments Analysismentioning
confidence: 99%