The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2014 vol.18)
pp: 66-71
Amir Herzberg , Bar Ilan University
Haya Shulman , Technische Universität Darmstadt
ABSTRACT
DNS Security Extensions (DNSSEC) became standardized more than 15 years ago, but its adoption is still limited. The recent publication of several new, off-path DNS cache-poisoning and wide-scale man-in-the-middle attacks should motivate DNSSEC adoption. However, significant challenges and pitfalls have resulted in severely limited deployment, which is furthermore often incorrect (and hence vulnerable). The authors outline these problems and suggest directions for improvement and further research.
INDEX TERMS
Network security, Cryptography, IP networks, Computer crime, Electronic mail,cache-poisoning, DNS, DNS security, DNSSEC
CITATION
Amir Herzberg, Haya Shulman, "Retrofitting Security into Network Protocols: The Case of DNSSEC", IEEE Internet Computing, vol.18, no. 1, pp. 66-71, Jan.-Feb. 2014, doi:10.1109/MIC.2014.14
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool