Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of DNS Structure Vulnerability Assessment System Based on Domain Name Resolution

Author: WangXiaoYing
Tutor: LiBin
School: Harbin Institute of Technology
Course: Computer technology
Keywords: DNS vulnerability dependency model core domain key name server
CLC: TP393.08
Type: Master's thesis
Year: 2013
Downloads: 1
Quote: 0
Read: Download Dissertation


With the rapid development of the Internet, DNS has become the coreinfrastructure of the Internet, and its security and reliability have direct influence onthe service quality of the Internet. Therefore, the study on DNS security has becomemore and more important. As is well known, DNS protocol has been designed to besimple without essential security mechanism. Besides, the popular domain nameresolving softwares have multiple security vulnerabilities for the reasonof inadequate level of safety coding standards. What’s more, DNS structure iscomplex that makes it difficult for the administrators to manage and configure. Allissues above are great threats to the DNS security.This paper focuses on the domain name dependencies in the domain nameresolution process and quantifies the dependencies model. It locates the keyprotection area and dedicates to studying the DNS structure vulnerability assessmentmethodology. The main research content includes the following four parts.Adopting the domain name dependencies as the basic data, this paper analyzesthe DNS work principle in order to study the domain name resolvable issues. Usingthe first-order predicate logic theory, it abstracts the condition sets for the domainname to be resolved and to be unresolved, which associates the resolvable issueswith the state of name servers in the domain name system accurately.This paper proposes a quantitative approach based on the directed relationalnetwork. This approach turns the domain name dependencies into a dependencygraph, and uses a directed edge weight to measure dependence level of the domainname dependencies.Using the node importance as the metric, this paper proposes a method toabstract the core domain sets and key name server sets, which quantifies theimportance of each node and thus figures out the key protection area sets.This paper proposes a method to assess the vulnerability of the DNS structure,which combines static influence and dynamic influence. By removing the nodes tosimulate the network attacks to the name servers and quantifying the impact, thestatus of the DNS, in case of some name servers fails, can be analized.In summery, relying on the domain name dependencies, this paper hascompleted four research issues above, designed and implemented the DNS structurevulnerability assessment system. Besides, this paper introduces the design idea,implementation method, and the analysis of the test results in detail.

Related Dissertations

  1. GIS of Baoshan City, land and ecological environment vulnerability assessment,X826
  2. Research and Design of a C++ Codes Defect Detection System,TP311.53
  3. Research on Urban Spatial Structure Vulnerability of Daqing City Based on Exploitation of Oil,TU984.113
  4. Network Security Incident Analysis and Implementation Strategies,TP393.08
  5. Study on Seismic Fragility Analysis of RC High-Rise Frame-Shear Wall Buildings,TU973.16
  6. Research on Defense of DDoS Attacks Against the DNS Server,TP393.08
  7. The Resilience of Children in Family with Subsistence Security System,D669.5
  8. Research of Fuzzing Based on Genetic Algorithm,TP311.53
  9. An Improved Dynamic Taint Analysis Model,TP393.08
  10. Research of Structural Vulnerability Theory in Probabilistic and Non-probabilistic Level,TU312.3
  11. Vulnerability of Frame Structures Based on Energy Flow Network,TU323
  12. Designing and Building Safe Networking Platform for Community-Electronic Services,TP393.08
  13. Studying the Ecological Environment Vulnerability of Xinjiang’s HeTian Area,X171
  14. Security Risk Assessment and Vulnerability Analysis in Electrical Power System,TM711
  15. DNS Security Detection Technology,TP393.08
  16. The Key Techniques of Attack Graph Generating for Large-scale Network,TP393.08
  17. The Research of Target Network Environment Integrated Modeling and Display for Network Vulnerability Analysis,TP393.08
  18. Study of Optimal PMU Placement Based on Power Grid Vulnerability and Economy,TM711
  19. Fully Resolved Direct Numerical Simulations of Interactions between Big Particles and Turbulence in Particle-laden Pipe and Channel Flows,O359
  20. Compile-Based Intermediate Code Key Variable Fault-Tolerant Technology,TP302.8
  21. The Researches on the Invulnerability of Scale-Free Networks with the Consideration of Cost,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile