IDV: Internet Domain Name Verification Based on Blockchain

被引:11
作者
Hu, Ning [1 ]
Teng, Yu [2 ]
Zhao, Yan [1 ]
Yin, Shi [1 ]
Zhao, Yue [3 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Zhong Zi Hua Ke Traff Construct Technol Co Ltd, Beijing 100195, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2021年 / 129卷 / 01期
基金
中国国家自然科学基金;
关键词
Blockchain-based network security; DNS security; DNS decentralization; CDN;
D O I
10.32604/cmes.2021.016839
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification problem, it has not been widely deployed on a global scale due to political, economic, and technical constraints. We argue that the root cause of this problem lies in the significant centralization of the DNS system. This centralized feature not only reduces the efficiency of domain name verification but also has the hidden risks of single point of failure and unilateral control. Internet users may disappear from the Internet due to the results of fake, subverted, or misconfigured domain name resolution. This paper presents a decentralized DNS cache verification method, which uses the consortium blockchain to replace the root domain name server to verify the authenticity of the domain name. Compared with DNSSEC's domain name verification process, the verification efficiency of this method has increased by 30%, and there is no single point of failure or unilateral control risk. In addition, this solution is incrementally deployable, and even if it is deployed on a small number of content delivery network servers, satisfactory results can be obtained.
引用
收藏
页码:299 / 322
页数:24
相关论文
共 33 条
[1]  
Alharbi F, 2019, IEEE INFOCOM SER, P1153, DOI [10.1109/infocom.2019.8737514, 10.1109/INFOCOM.2019.8737514]
[2]   Ursodeoxycholic acid abrogates gentamicin-induced hepatotoxicity in rats: Role of NF-KB-p65/TNF- ?, Bax/Bcl-xl/Caspase-3, and eNOS/iNOS pathways [J].
Ali, Fares E. M. ;
Hassanein, Emad H. M. ;
Bakr, Adel G. ;
El-Shoura, Ehab A. M. ;
El-Gamal, Dalia A. ;
Mahmoud, Amany R. ;
Abd-Elhamid, Tarek Hamdy .
LIFE SCIENCES, 2020, 254
[3]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[4]  
Chung T, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1307
[5]  
Cloudflare, 2021, CLOUDFL GLOB AN NETW
[6]  
Efficientip, 2019, UNDERSTANDING CRITIC
[7]  
EMCDNS, 2021, EM BLOCKCH
[8]  
ENS, 2021, DEC NAM WALL WEBS MO
[9]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[10]   TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain [J].
He, Guobiao ;
Su, Wei ;
Gao, Shuai ;
Yue, Jiarui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :912-924