The Study of DNS Security
碩士 === 樹德科技大學 === 資訊管理研究所 === 90 === Internet is a new channel of data communication, people can exchange information quickly because of it is not constrained by time and space. Most of Internet users can't perceive the address resolution provided by DNS while they specified the doma...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/59470818716500831584 |
id |
ndltd-TW-090STU00396003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090STU003960032016-06-13T04:16:27Z http://ndltd.ncl.edu.tw/handle/59470818716500831584 The Study of DNS Security DNS安全性之研究 Shih-Che Lin 林世哲 碩士 樹德科技大學 資訊管理研究所 90 Internet is a new channel of data communication, people can exchange information quickly because of it is not constrained by time and space. Most of Internet users can't perceive the address resolution provided by DNS while they specified the domain name and connected to the desired website. DNS uses the technology of the Distributed Database and the Client-Server structure; controlling important information of the local network, as a result caused the problems of data synchronization and zone transfer. Furthermore, the unhealthy design of software may be caused the incident of invading problems. If the network administrator wants to guarantee the security of DNS, the problems as mentioned above for network security will be considered seriously. This thesis aims at security configuration and vulnerability auditing of DNS. From the outset, the security configuration of DNS can be achieved by using the collecting technology information about DNS appropriately. The correct configuration can only decrease the damage of intrusion, but it does not prevent all of the threat of intrusion. For this reason, the study provides a auditing system of DNS security; users can audit the vulnerability of DNS from the client via the browser, and selecting fit check items for vulnerability auditing. The scanning report will be sent to the user by email after the auditing process is completed. This report includes the existence of vulnerabilities of the DNS, and the patch links for these vulnerabilities. If DNS has a well-defined configuration of security and pass the vulnerability auditing, then its security will be promoted, and the Internet service was not broken due to malicious attack. Jinn-Shing Cheng 鄭 進 興 2002 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 樹德科技大學 === 資訊管理研究所 === 90 === Internet is a new channel of data communication, people can exchange information quickly because of it is not constrained by time and space. Most of Internet users can't perceive the address resolution provided by DNS while they specified the domain name and connected to the desired website. DNS uses the technology of the Distributed Database and the Client-Server structure; controlling important information of the local network, as a result caused the problems of data synchronization and zone transfer. Furthermore, the unhealthy design of software may be caused the incident of invading problems. If the network administrator wants to guarantee the security of DNS, the problems as mentioned above for network security will be considered seriously. This thesis aims at security configuration and vulnerability auditing of DNS. From the outset, the security configuration of DNS can be achieved by using the collecting technology information about DNS appropriately. The correct configuration can only decrease the damage of intrusion, but it does not prevent all of the threat of intrusion. For this reason, the study provides a auditing system of DNS security; users can audit the vulnerability of DNS from the client via the browser, and selecting fit check items for vulnerability auditing. The scanning report will be sent to the user by email after the auditing process is completed. This report includes the existence of vulnerabilities of the DNS, and the patch links for these vulnerabilities. If DNS has a well-defined configuration of security and pass the vulnerability auditing, then its security will be promoted, and the Internet service was not broken due to malicious attack.
|
author2 |
Jinn-Shing Cheng |
author_facet |
Jinn-Shing Cheng Shih-Che Lin 林世哲 |
author |
Shih-Che Lin 林世哲 |
spellingShingle |
Shih-Che Lin 林世哲 The Study of DNS Security |
author_sort |
Shih-Che Lin |
title |
The Study of DNS Security |
title_short |
The Study of DNS Security |
title_full |
The Study of DNS Security |
title_fullStr |
The Study of DNS Security |
title_full_unstemmed |
The Study of DNS Security |
title_sort |
study of dns security |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/59470818716500831584 |
work_keys_str_mv |
AT shihchelin thestudyofdnssecurity AT línshìzhé thestudyofdnssecurity AT shihchelin dnsānquánxìngzhīyánjiū AT línshìzhé dnsānquánxìngzhīyánjiū AT shihchelin studyofdnssecurity AT línshìzhé studyofdnssecurity |
_version_ |
1718302279492173824 |