Evaluation of two privacy-preserving protocols for the DNS

Sergio Castillo-Perez, Joaquin Garcia-Alfaro

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The rise of new Internet services, especially those related to the integration of people and physical objects to the net, makes visible the limitations of the DNS protocol. The exchange of data through DNS procedures flows today into hostile networks as clear text. Packets within this exchange can easily be captured by intermediary nodes in the resolution path and eventually disclosed. Privacy issues may thus arise if sensitive data is captured and sold with malicious purposes. We evaluate in this paper two DNS privacy-preserving approaches recently presented in the literature. We discuss some benefits and limitations of these proposals, and we point out the necessity of additional measures to enhance their security.

Original languageEnglish
Title of host publicationITNG 2009 - 6th International Conference on Information Technology
Subtitle of host publicationNew Generations
Pages411-416
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event6th International Conference on Information Technology: New Generations, ITNG 2009 - Las Vegas, NV, United States
Duration: 27 Apr 200929 Apr 2009

Publication series

NameITNG 2009 - 6th International Conference on Information Technology: New Generations

Conference

Conference6th International Conference on Information Technology: New Generations, ITNG 2009
Country/TerritoryUnited States
CityLas Vegas, NV
Period27/04/0929/04/09

Keywords

  • Countermeasures
  • Domain name system
  • IT security
  • Privacy
  • Privacy information retrieval

Fingerprint

Dive into the research topics of 'Evaluation of two privacy-preserving protocols for the DNS'. Together they form a unique fingerprint.

Cite this