Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6367
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSakshi-
dc.contributor.authorGhrera, Satya Praksh [Guided by]-
dc.date.accessioned2022-09-22T09:34:14Z-
dc.date.available2022-09-22T09:34:14Z-
dc.date.issued2015-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6367-
dc.description.abstractTo reach another person on the Internet we have to type an address into our computer - a name or a number. That address has to be unique so computers know where to find each other. ICANN coordinates these unique identifiers across the world. Without that coordination we wouldn't have one global Internet. When typing a name, that name must be first translated into a number by a system before the connection can be established. That system is called the Domain Name System (DNS) and it translates names like www.icann.org into the numbers – called Internet Protocol (IP) addresses. ICANN coordinates the addressing system to ensure all the addresses are unique. Recently vulnerabilities in the DNS were discovered that allow an attacker to hijack this process of looking some one up or looking a site up on the Internet using their name. The purpose of the attack is to take control of the session to, for example, send the user to the hijacker's own deceptive web site for account and password collection.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectDomain name spaceen_US
dc.subjectDNS securityen_US
dc.subjectCryptographyen_US
dc.titleSecurity System for DNS using Cryptographyen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Security System for DNS using Cryptography.pdf1.36 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.