Science Project Topics

Design and Simulation of Authentication and Adaptive Security for DNS System

Design and Simulation of Authentication and Adaptive Security for Dns System

Design and Simulation of Authentication and Adaptive Security for DNS System

CHAPTER ONE

Objective of the Study

The objective of this authentication and adaptive security for DNS system is to include the following:

  1. To control access into a DNS system.
  2. To Secure information and Identity Management
  3. To Secure Internet and information sharing
  4. To Allow Reliability of a secured network
  5. To Secure Desktop file Sharing

CHAPTER TWO

LITERATURE REVIEW

Introduction

Since the early days of Computing Science the idea of “separation of concerns” has had a significant impact on how academia and industry approach the design and implementation of software systems, models and architectures. The phrase was coined by Edsger W. Dijkstra in his 1982 paper “On the role of scientific thought”:

We know that a program must be correct and we can study it from that viewpoint only; we also know that it should be efficient and we can study its efficiency on another day, so to speak. In another mood we may ask ourselves whether, and if so: why, the program is desirable. But nothing is gained -on the contrary!- by tackling these various aspects simultaneously.

It is what I sometimes have called “the separation of concerns”, which, even if not perfectly possible, is yet the only available technique for effective ordering of one’s thoughts, that I know of. E. W. Dijkstra (1982)

Some notable examples of this idea in practice includes the Open Systems Inter- connection (OSI) Basic Reference. Model  H. Zimmermann(1980). It provides a set of layered abstractions for computer network protocol design which allows for separation of concerns between the layers and so improves operability between protocols. More recently the influential contributors to the World Wide Web protocol standards have also conceded to this idea and created two languages, namely eXtensible HyperText Markup Language (XHTML) and Cascading Style Sheets (CSS), to separate style from content when designing web pages. Separation of concerns is also made explicit through accepted programming paradigms such as procedural programming and object-oriented programming. Aspect Oriented programming pushes this idea even further by allowing cross-cutting concerns, which could include security, logging, tracing, profiling, pooling and cacheing among others, to be dynamically added to objects at runtime (or compile time) without the objects needing to have any knowledge of the particular type of addition. The implications and usefulness of this paradigm is an active topic for current research. K. Ostermann (2008).

 

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

INTRODUCTION

In this third chapter of this research, the system undergoes some analysis that made the design effective. The Domain Name System (DNS) was investigated to find some fact that helps to analyze the problems and capitalizing on them to build a secured and adaptive DNS software

SYSTEM ANALYSIS

After investigating the system, the result arrived at is going to determine the problem that lies in the DNS that is not secured, so that the new system will not have the same problem.

CHAPTER FOUR

SYSTEM IMPLEMENTATION

 INTRODUCTION

This fact of this research work introduces the project to system implementation. This cut across the procedure of implementation, software and hardware requirement programming down to testing the proposed system that leads to implementation and its maintenance.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

This chapter of this project work brings every work about simulation of authentication and adaptive security for DNS system to conclusion by summarizing the topic giving recommendations.

SUMMARY

In summary, the term DNS security describe the use of system that constantly monitors a DNS system for slow failing components and that notifies the network administrator in case of outages via sms, emails, pager or alarms.

This project work (DNS secured system) is the most critical part of any network, since it is the one that sounds the alarm if something is wrong within or without.

CONCLUSION

After a research made on secured DNS and its implementation. The researcher wish to conclude by saying that the research verifies the problems and difficulties encountered by a DNS not monitored and solution were suggested on how to correct it, so that the establishment can experience efficient service.

Based on these, it is the researcher’s opinion that if implementations are carried out according to the research sequentially, there will be absolutely an effective operation in the establishment.

RECOMMENDATION

After thorough examination and testing the system whether there will be flaw in the DNS and none is found for now, the researcher hereby recommend this security system for all establishments, companies, and firms etc that operate on network or that provides DNS software. It will be of more benefit to the company network and integrity even keeps them in standard.

REFERENCES

  • W. Dijkstra, “On the role of scientific thought,” in Selected Writings on Computing: A Personal Perspective.  Springer-Verlag, 1982, pp. 60–66.
  • Zimmermann, “OSI Reference Model–The ISO Model of Architecture for Open Systems Interconnection,” IEEE Transactions on Communications [legacy, pre – 1988] , vol. 28, no. 4, pp. 425–432, Apr 1980.
  • Ostermann, “Reasoning about aspects with common sense,” in AOSD ’08: Proceedings of the 7th international conference on Aspect-oriented software development.  New York, NY, USA: ACM, 2008, pp. 48–59.
  • Beznosov, “Object security attributes: Enabling application-specific access control in middleware,” in On the Move to Meaningful Internet Systems, 2002 – DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002.   London, UK: Springer-Verlag, 2002, pp. 693–710.
  • Venkatesan and S. Bhattacharya, “Threat-adaptive security policy,”Performance, Comput-ing, and Communications Conference, 1997. IPCCC 1997., IEEE International, pp. 525–531,Feb 1997.
  • Alampalayam and A. Kumar, “An adaptive security model for mobile agents in wireless networks,” Global Telecommunications Conference, 2003. GLOBECOM ’03. IEEE, vol. 3, pp. 1516–1521 vol.3, Dec. 2003
  • Chigan, L. Li, and Y. Ye, “Resource-aware self-adaptive security provisioning in mobile adhoc networks,” Wireless Communications and Networking Conference, 2005 IEEE, vol. 4, pp. 2118–2124 Vol. 4, March 2005.
  • Schneck and K. Schwan, “Dynamic authentication for high-performance networked applications,”Quality of Service, 1998. (IWQoS 98) 1998 Sixth International Workshop on, pp.127–136, May 1998.
  • Hinton, C. Cowan, L. Delcambre, and S. Bowers, “SAM: Security Adaptation Manager,”Computer Security Applications Conference, 1999. (ACSAC ’99) Proceedings. 15th Annual ,pp. 361–370, 1999.
  • Marcus, “Local and global requirements in an adaptive security infrastructure,” International Workshop on Requirements for High Assurance Systems (RHAS 2003), Sept 2003.
  • Shnitko, “Practical and theoretical issues on adaptive security,” Proceedings of FCS’04 Workshop on Foundations of Computer Security, Workshop on Logical Foundations of anAdaptive Security Infrastructure, June 2004.