PPT-DNS Security
Author : aaron | Published Date : 2017-11-29
1 Fundamental Problems of Network Security Internet was designed without security in mind Initial design focused more on how to make it work than on how to prevent
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "DNS Security" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
DNS Security: Transcript
1 Fundamental Problems of Network Security Internet was designed without security in mind Initial design focused more on how to make it work than on how to prevent abuses Initial environment mostly consisted of research institutionsassumption on the benign behaviors of users. Curtis Taylor. taylorcr@ornl.gov. Craig . Shue. cshue@. ornl.gov. Outline. Automated Attacking. Costs to Organizations. Some Observations. Our Approach. Lightweight Capabilities. Fast Flux Defense. Future Directions. Magda El Zarki. Prof. of CS. Univ. of CA, Irvine. Email: . elzarki@uci.edu. http: . www.ics.uci.edu. /~. magda. Network Address . Translation - NAT. 3. Private Network. Private IP . network is an IP network that is not directly connected to the Internet. Vijay Tinnanur & Jonathan Tuliani. Azure Networking. BRK3473. Agenda . Context. DNS . services in Azure. Introducing Azure DNS . Azure DNS Deep Dive. Demo . Context. Why DNS ?. Where is . www.contoso.com. II. ravel@sparcs. DNS. ravel. s. parcs.org. org. blog.naver.com. naver.com. com. 1. 10. 2. 3. 4. 5. 6. 7. 8. 9. DNS. s. parcs.org. DNS server. 인 동시에 . client!. as DNS client : resolver. search. Qurat-Ul-Ann Akbar, Northwestern U. . Marcel Flores, Northwestern U.. Aleksandar. Kuzmanovic, Northwestern U.. http://networks.cs.northwestern.edu. Internet Censorship is a prevalent problem . What is DNS?. 1. Domain Name System. The . Domain Name System (DNS) is used to resolve human-readable . hostnames . into machine-readable IP . addresses.. How does DNS Works?. 2. How Does DNS Works?. Jun Ho Huh. Research Scientist. Cybersecurity Lab. . Saurabh Verma, . Ali Hamieh, Jun Huh Ho, Siva Raj Rajagopalan, Maciej Korczynski, Nina Fefferman.. . 1. Motivation . money talks!. . 2. It’s becoming very serious!. . draft-savolainen-mif-dns-server-selection-04. Teemu Savolainen (Nokia). Jun-ya Kato (NTT). MIF WG meeting @ IETF#79. 11-Nov-2010. Related MIF milestone. 1) DNS server selection solution: a specification for describing a way for a network to communicate to nodes information required to perform advanced DNS server selection at name resolution request granularity in scenarios involving multiple namespaces. The specification shall describe the information to be delivered for nodes and the protocol to be used for delivery.. domainfest.asia. . 20 Sep 2016 Hong Kong richard.lamb@icann.org. What’s all this I hear about the Internet of Things?. (A recent visit to CES in Las Vegas). BS or Not BS?. Does it matter?. Where do “WE” fit in?. . Abhishek Madav(86378148). . Suhas Tikoo(22363556). . Urjit Khadilkar(24449837). Motivation. We plan to device . a heterogeneous service . that would monitor the resolution of the user’s . 0. DNS. DHCP. 管理. 運用. DDNS. Ease of Redundancy. Ease of UI. Backup. Restoration. U. pdates. Ease of :. Focus on DHCP/DNS/Dynamic DNS (D3). Robust Hardware, Ease of UI, High Availability and Secure Software. Applications. Updated 2-10-15. History. On ARPANet, host names were mapped to IP addresses in a . hosts.txt . file stored on a single master server. Other machines downloaded copies of . hosts.txt . periodically. Id-NS Project – The National Secure DNS Initiatives. Muhammad Salahuddien – Deputy of Operation and Network Security. Growth, 90+ . M . users, 45+ . M . students, . 200. + Gb/s traffic (transit, IX, CDN), 200% rising local . Geoff Huston. APNIC. The Internet’s routing system works by rumour. “I tell you what I know, and you tell your mates, and your mates tell their mates, and …”. But what if I tell you a lie? . Or someone maliciously alters what I’m trying to tell you?.
Download Document
Here is the link to download the presentation.
"DNS Security"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents