2009 Cybersecurity Applications &Amp; Technology Conference for Homeland Security 2009
DOI: 10.1109/catch.2009.21
|View full text |Cite
|
Sign up to set email alerts
|

DNSSEC in Practice: Using DNSSEC-Tools to Deploy DNSSEC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…One of the earliest proposed solutions to resolve DNS vulnerabilities is the DNSSEC extension developed by the Internet Engineering Task Force (IETF) and published in 1997 [4]. This extension adds security measures to the original DNS protocol by using cryptography.…”
Section: Dns Security Issuesmentioning
confidence: 99%
“…One of the earliest proposed solutions to resolve DNS vulnerabilities is the DNSSEC extension developed by the Internet Engineering Task Force (IETF) and published in 1997 [4]. This extension adds security measures to the original DNS protocol by using cryptography.…”
Section: Dns Security Issuesmentioning
confidence: 99%
“…The method once again decreases the probability of success attack, but it has some limitation such as that not all the DNS server is case sensitive and can't either stop the attacker completely. Some other strategies such as DNSSEC [5,9] and TSIG [12] can almost terminate the cache poisoning attack by using complicated cryptology and authorization mechanism, but modification of existing DNS are needed and hard to deploy.…”
Section: Introductionmentioning
confidence: 99%
“…People tried to find ways to enhance the security of DNS and get some improvement [1][2][3][4][5][6][7][8][9][10][11][12]. First widely used strategy is transaction ID randomizing [10].…”
Section: Introductionmentioning
confidence: 99%