Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/60418
Title: | Design security schemes to prevent DNS cache poisoning attacks | Authors: | Chang, Liu | Keywords: | DRNTU::Engineering | Issue Date: | 2014 | Abstract: | Domain Name System (DNS) is a critical part of today’s Internet infrastructure. Its main function is to map domain names into IP addresses for most of the network applications. However, DNS server is insecure and vulnerable to various attacks. DNS cache poisoning attack is a frequently discovered vulnerability that changes or inserts records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s server instead of the real IP address. By that way, DNS cache poisoning attacks may cause large losses in the network transition. In this project, the student will investigate various existing solutions and develop his own efficeint solution to overcome the DNS cache poisoning attacks. | URI: | http://hdl.handle.net/10356/60418 | Schools: | School of Electrical and Electronic Engineering | Rights: | Nanyang Technological University | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Final_FYP_Report.pdf Restricted Access | 1.97 MB | Adobe PDF | View/Open |
Page view(s)
366
Updated on Mar 16, 2025
Download(s)
15
Updated on Mar 16, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.