Domain Name System Security Extensions (DNSSEC) for Identification of DNS Vulnerabilities

Main Article Content

Lataben J Gadhavi, Suresh B Prasad

Abstract

On the Internet, Domain Name System Security Extensions (DNSSEC) is continuously communicated. With extended sign, DNSSEC updates the DNS protocol to include two major security properties: validity and honesty. While DNSSEC was established to identify DNS security vulnerabilities, it also introduces a new one: the extended marks significantly increase DNS packet length, making DNSSEC a tempting vector for abuse in the context of spousal abuse. For computerised marks, DNSSEC, of course, employs RSA. In previous research, elective mark schemes based on elliptic bent cryptography have been found to effectively reduce the impact of tags on DNS resolution sizes. DNS provides simple query and interpretation services for converting URLs to IP addresses and IP addresses to URLs. As an outcome of this, DNS is completely unprotected against man-in-the-middle (MITM) attacks & a lot of other threats as an outcome of this. The Web Engineering Task Force suggested DNSSEC to make DNS more reliable (IETF). Beginning with information integrity, DNSSEC employs additional indicators to provide information integrity and reliability. Despite the reality that DNSSEC gives privacy for DNS data; it has real security and functional flaws. The large number of testing exercises on DNS in particular and safety and stability in particular indicate that almost all challenges in this area have been addressed. To identify the DNS vulnerabilities domain name system security extensions methodology is used in this paper.

Article Details

How to Cite
Suresh B Prasad, L. J. G. (2021). Domain Name System Security Extensions (DNSSEC) for Identification of DNS Vulnerabilities. International Journal on Recent and Innovation Trends in Computing and Communication, 9(12), 215–221. https://doi.org/10.17762/ijritcc.v9i12.11565
Section
Articles