Security System for DNS Using Cryptography Java Full Project

The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS) Java project.

Security-for-Domain-Name-System-Java project

The DNS Security is designed by CSE Final year students using java programming to provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key.

The DNS security uses Message Digest Algorithm to compress the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key

The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches with the Signature of the message received, the message is Decrypted and read else discarded.

 

The DNS as an Internet standard to solve the issues of scalability surrounding the hosts.txt file. Since then, the widespread use of the DNS and its ability to resolve host names into IP addresses for both users and applications alike in a timely and fairly reliable manner, makes it a critical component of the Internet.

The distributed management of the DNS and support for redundancy of DNS zones across multiple servers promotes its robust characteristics. However, the original DNS protocol specifications did not include security. Without security, the DNS is vulnerable to attacks stemming from cache poisoning techniques, client flooding, dynamic update vulnerabilities, information leakage, and compromise of a DNS server’s authoritative files.

In order to add security to the DNS to address these threats, the IETF added security extensions to the DNS, collectively known as DNSSEC. DNSSEC provides authentication and integrity to the DNS. With the exception of information leakage, these extensions address the majority of problems that make such attacks possible. Cache poisoning and client flooding attacks are mitigated with the addition of data origin authentication for RRSets as signatures are computed on the RRSets to provide proof of authenticity.

Dynamic update vulnerabilities are mitigated with the addition of transaction and request authentication, providing the necessary assurance to DNS servers that the update is authentic. Even the threat from compromise of the DNS server’s authoritative files is almost eliminated as the SIG RR are created using a zone’s private key that is kept off-line as to assure key’s integrity which in turn protects the zone file from tampering. Keeping a copy of the zone’s master file off-line when the SIGs are generated takes that assurance one step further.

DNSSEC can not provide protection against threats from information leakage. This is more of an issue of controlling access, which is beyond the scope of coverage for DNSSEC. Adequate protection against information leakage is already provided through such things as split DNS configuration.

Conclusion.

DNSSEC demonstrates some promising capability to protect the Internet infrastructure from DNS based attacks. DNSSEC has some fairly complicated issues surrounding its development, configuration, and management. Although the discussion of these issues is beyond the scope of this survey, they are documented in RFC 2535 and RFC 2541 and give some interesting insight into the inner design and functions of DNSSEC.

In addition to keep the scope of this paper down, many topics such as secure zone transfer have been omitted but are part of the specifications in RFC 2535. The first official release of a DNSSEC implementation is available in BIND version 8.1.2.

37 Replies to “Security System for DNS Using Cryptography Java Full Project”

  1. I hope other users think your post right here as helpful as I have. I run a blog personally and would be more than happy for you or the visitors on your site to check out. Please go ahead and browse through my website like I have with yours and leave a remark or two if you discover anything interesting. Thanks again.

  2. this project is fully not running there are some files missing. even source.BAT exe file is not included & we dont getting flow of this project
    im so worried abt this 🙁 🙁

  3. i want uml diagrams for this project and also resend the how to execute the project and all screen shots for this project…. thnk you

  4. Hey..!!! Its such a nice project….
    I want to know how do you create the Password, Req and Server batch files.
    Could you please tell me on my email id which i had mention here.

  5. iam having some problem in executing the program…..and i want the use case diagram,class diagram,interaction diagram…..know about the program flow….also send complete snapshots of this project…….mail me at [email protected]

  6. I recently downloaded this project as it is quite appealing. I tried executing it quite a lot of time now but the destination node never gets any encrypted message, seems like there is a file or piece of code missing.
    I really need your help now sir. please contact me through my mail id: [email protected]

  7. That project is nice but
    I have some problem for executing the program and also some files are missing that project .please send to me the flow of that project and give the snapshot of the executing that’s project on that mail
    [email protected]

  8. This project is giving java.lang.NullPointer.Ecxception error while running and it is not the full project.

  9. I want complete source code
    ppt and documentation of the
    project.and also I need how to run the project.please send it.

  10. I recently downloaded this project as i liked the idea. I tried executing it quite a lot of time bt it always shows “The destination may be switched OFF”,”restart the server”, seems like there is a file or piece of code missing.
    Please help me out as soon as possible.

Leave a Reply

Your email address will not be published. Required fields are marked *