Design and Simulation of Authentication and Adaptive Security for DNS System
CHAPTER ONE
Objective of the Study
The objective of this authentication and adaptive security for DNS system is to include the following:
- To control access into a DNS system.
- To Secure information and Identity Management
- To Secure Internet and information sharing
- To Allow Reliability of a secured network
- To Secure Desktop file Sharing
CHAPTER TWO
LITERATURE REVIEW
Introduction
Since the early days of Computing Science the idea of โseparation of concernsโ has had a significant impact on how academia and industry approach the design and implementation of software systems, models and architectures. The phrase was coined by Edsger W. Dijkstra in his 1982 paper โOn the role of scientific thoughtโ:
We know that a program must be correct and we can study it from that viewpoint only; we also know that it should be efficient and we can study its efficiency on another day, so to speak. In another mood we may ask ourselves whether, and if so: why, the program is desirable. But nothing is gained -on the contrary!- by tackling these various aspects simultaneously.
It is what I sometimes have called โthe separation of concernsโ, which, even if not perfectly possible, is yet the only available technique for effective ordering of oneโs thoughts, that I know of. E. W. Dijkstra (1982)
Some notable examples of this idea in practice includes the Open Systems Inter- connection (OSI) Basic Reference. Model ย H. Zimmermann(1980). It provides a set of layered abstractions for computer network protocol design which allows for separation of concerns between the layers and so improves operability between protocols. More recently the influential contributors to the World Wide Web protocol standards have also conceded to this idea and created two languages, namely eXtensible HyperText Markup Language (XHTML) and Cascading Style Sheets (CSS), to separate style from content when designing web pages. Separation of concerns is also made explicit through accepted programming paradigms such as procedural programming and object-oriented programming. Aspect Oriented programming pushes this idea even further by allowing cross-cutting concerns, which could include security, logging, tracing, profiling, pooling and cacheing among others, to be dynamically added to objects at runtime (or compile time) without the objects needing to have any knowledge of the particular type of addition. The implications and usefulness of this paradigm is an active topic for current research. K. Ostermann (2008).
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
INTRODUCTION
In this third chapter of this research, the system undergoes some analysis that made the design effective. The Domain Name System (DNS) was investigated to find some fact that helps to analyze the problems and capitalizing on them to build a secured and adaptive DNS software
SYSTEM ANALYSIS
After investigating the system, the result arrived at is going to determine the problem that lies in the DNS that is not secured, so that the new system will not have the same problem.
CHAPTER FOUR
SYSTEM IMPLEMENTATION
ย INTRODUCTION
This fact of this research work introduces the project to system implementation. This cut across the procedure of implementation, software and hardware requirement programming down to testing the proposed system that leads to implementation and its maintenance.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
This chapter of this project work brings every work about simulation of authentication and adaptive security for DNS system to conclusion by summarizing the topic giving recommendations.
SUMMARY
In summary, the term DNS security describe the use of system that constantly monitors a DNS system for slow failing components and that notifies the network administrator in case of outages via sms, emails, pager or alarms.
This project work (DNS secured system) is the most critical part of any network, since it is the one that sounds the alarm if something is wrong within or without.
CONCLUSION
After a research made on secured DNS and its implementation. The researcher wish to conclude by saying that the research verifies the problems and difficulties encountered by a DNS not monitored and solution were suggested on how to correct it, so that the establishment can experience efficient service.
Based on these, it is the researcherโs opinion that if implementations are carried out according to the research sequentially, there will be absolutely an effective operation in the establishment.
RECOMMENDATION
After thorough examination and testing the system whether there will be flaw in the DNS and none is found for now, the researcher hereby recommend this security system for all establishments, companies, and firms etc that operate on network or that provides DNS software. It will be of more benefit to the company network and integrity even keeps them in standard.
REFERENCES
- W. Dijkstra, โOn the role of scientific thought,โ in Selected Writings on Computing: A Personal Perspective. ย Springer-Verlag, 1982, pp. 60โ66.
- Zimmermann, โOSI Reference ModelโThe ISO Model of Architecture for Open Systems Interconnection,โ IEEE Transactions on Communications [legacy, pre – 1988] , vol. 28, no. 4, pp. 425โ432, Apr 1980.
- Ostermann, โReasoning about aspects with common sense,โ in AOSD โ08: Proceedings of the 7th international conference on Aspect-oriented software development. ย New York, NY, USA: ACM, 2008, pp. 48โ59.
- Beznosov, โObject security attributes: Enabling application-specific access control in middleware,โ in On the Move to Meaningful Internet Systems, 2002 – DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002. ย ย London, UK: Springer-Verlag, 2002, pp. 693โ710.
- Venkatesan and S. Bhattacharya, โThreat-adaptive security policy,โPerformance, Comput-ing, and Communications Conference, 1997. IPCCC 1997., IEEE International, pp. 525โ531,Feb 1997.
- Alampalayam and A. Kumar, โAn adaptive security model for mobile agents in wireless networks,โ Global Telecommunications Conference, 2003. GLOBECOM โ03. IEEE, vol. 3, pp. 1516โ1521 vol.3, Dec. 2003
- Chigan, L. Li, and Y. Ye, โResource-aware self-adaptive security provisioning in mobile adhoc networks,โ Wireless Communications and Networking Conference, 2005 IEEE, vol. 4, pp. 2118โ2124 Vol. 4, March 2005.
- Schneck and K. Schwan, โDynamic authentication for high-performance networked applications,โQuality of Service, 1998. (IWQoS 98) 1998 Sixth International Workshop on, pp.127โ136, May 1998.
- Hinton, C. Cowan, L. Delcambre, and S. Bowers, โSAM: Security Adaptation Manager,โComputer Security Applications Conference, 1999. (ACSAC โ99) Proceedings. 15th Annual ,pp. 361โ370, 1999.
- Marcus, โLocal and global requirements in an adaptive security infrastructure,โ International Workshop on Requirements for High Assurance Systems (RHAS 2003), Sept 2003.
- Shnitko, โPractical and theoretical issues on adaptive security,โ Proceedings of FCSโ04 Workshop on Foundations of Computer Security, Workshop on Logical Foundations of anAdaptive Security Infrastructure, June 2004.