Abstract
Domain Name System Security Extensions (DNSSEC) is a security extension to DNS protocol, which has many security issues and is vulnerable to attacks. By using digital signature technology, DNSSEC provides data origin authentication and integrity. However, designed as the substitute to DNS, the deployment of DNSSEC doesn’t go well as predicted. In this paper, we will first present some security issues of DNSSEC in its practical application, and then analyze the computational and bandwidth costs of those resolvers and authoritative name servers that have been deployed with DNSSEC, through which we try to explain the current difficulties in DNSSEC deployment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard) (March 2005)
Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource Records for the DNS Security Extensions. RFC 4034 (Proposed Standard) (March 2005)
Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard) (March 2005)
Ariyapperuma, S., Mitchell, C.J.: Security vulnerabilities in DNS and DNSSEC. In: IEEE ARES (2007)
Kolkman, O.M.: Measuring the resource requirements of DNSSEC. Technical report, RIPE NCC / NLnet Labs (October 2005)
Jansen, J.: Measuring the effects of DNSSEC deployment on query load. NLnet Labs (May 2006)
Ager, B., Dreger, H., Feldmann, A.: Exploring the Overhead of DNSSEC (April 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yao, Y., He, L., Xiong, G. (2013). Security and Cost Analyses of DNSSEC Protocol. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)