This Article 
 Bibliographic References 
 Add to: 
September/October 2009 (vol. 7 no. 5)
pp. 11-13
Daniel Massey, Colorado State University
Dorothy E. Denning, Naval Postgraduate School
Virtually every Internet application relies on the Domain Name System, but security wasn't a major goal of its original design. The result is several critical vulnerabilities, reviewed in this introduction to a special issue on DNS security. To address the security challenges, the community developed the DNS Security Extensions (DNSSEC), which are undergoing deployment. The articles in this special issue summarize key aspects of how to deploy DNSSEC at authoritative servers, resolvers, and public key learning.

1. S.M. Bellovin, "Using the Domain Name System for System Break-Ins," Proc. 5th Usenix UNIX Security Symp., Usenix Assoc., June 1995.
2. R. Arends et al., DNS Security Introduction and Requirements, IETF RFC 4033, Mar. 2005;
3. R. Arends et al., Records for the DNS Security Extensions, IETF RFC 4034, Mar. 2005;
4. R. Arends et al., Protocol Modifications for the DNS Security Extensions, IETF RFC 4035, Mar. 2005;

Index Terms:
DNS, DNSSEC, critical infrastructure, network security, domain name system
Daniel Massey, Dorothy E. Denning, "Guest Editors' Introduction: Securing the Domain Name System," IEEE Security & Privacy, vol. 7, no. 5, pp. 11-13, Sept.-Oct. 2009, doi:10.1109/MSP.2009.121
Usage of this product signifies your acceptance of the Terms of Use.