Now 97 visitors
Today:628 Yesterday:586
Total: 16741 64S 56P 11R
2024-10-18, Week 42
Journal Homepage
Call for Paper
Author HomePage
Paper Procedure
Paper Submission
Registration Invoice
Welcome Message
Statistics & History
Committee
Paper Archives
Outstanding Papers
Conference Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Archives Login
Sponsors


















Work Method
Step.1: Submit Slide (Number + File + Description) + Write button (Save) one by one
Step.2: Edit it by selecting the Slide Hyper Link below + Write button (Save)
*** Looking though a Slide Submission Sample (Click!!)

Paper Number
Paper Title
Keyword
On-line Presentation ** Submit YouTube URL
Slide Number * Slide .jpg File: icact2022_20220132_9.jpg  
** Min. 15 to Max. 40 slides!!
Slide Display
Verbal Description
**Must fill up
Save the slide and description

* You can edit any slide by selecting the Slide # below, edit anything, and then 'Write' button (Save)
ICACT20220132 Slide.23        [Big Slide]       [YouTube] Chrome Click!!
That¡®s all for my presentation. Thank you.

ICACT20220132 Slide.22        [Big Slide]       [YouTube] Chrome Click!!
The future work includes four tasks. The first one is performance improvement for the specific process. The second one is to conditionally stop the DNSSEC validation on end clients when it receives responses from the DNSSEC enabled cache DNS server. The third one is to improve the performance of client DNSSEC validation system with changing the server configuration and packet process procedure. The last one is to consider the topology of cache DNS servers in the proposed system.

ICACT20220132 Slide.21        [Big Slide]       [YouTube] Chrome Click!!
As a summary, in this paper, we proposed an acceleration method of a client based DNSSEC validation system in parallel with two full service resolvers. The first try of domain name resolution took about 100-150 milliseconds and the results will be cached on the end client if the validation successes. From the second try on the same client the domain name resolution took 20-40 milliseconds. If we use the parallel query to a cache DNS server, the first try with DNSSEC took 10 seconds if the validation was performed from the root DNS server. Therefore, in the proposed system, the first try for a domain name resolution will use the client based DNSSEC validation system. On the other hand, the first try on other clients for the same domain name resolution, it took 25-60 milliseconds. Accordingly, in the proposed system, the acceleration of the first try of name resolution on other clients has been realized.

ICACT20220132 Slide.20        [Big Slide]       [YouTube] Chrome Click!!
This slide shows the evaluation results comparing the four types of DNS queries on client2. From the results, we can see the the latency of the previously proposed client based DNSSEC validation system was the biggest one as well.Then the latency of the case when there is cache on the client is the smallest. Moreover, when there is no cache on the client the latency of using the specific process in the parallel query is the smallest one.

ICACT20220132 Slide.19        [Big Slide]       [YouTube] Chrome Click!!
This slide shows the evaluation results comparing for types of DNS queries in client1. From the results, we can see that when we used the specific process for the parallel query the name resolution latency is the smallest. While the latency of the previously proposed client based DNSSEC validation system was the biggest.

ICACT20220132 Slide.18        [Big Slide]       [YouTube] Chrome Click!!
This slide shows the evaluation results on client2.When there is no cache hit on the client and the cache DNS server, the name resolution for google.com took 106 milliseconds and 17.6 milliseconds when there was cache on the client. When we used the proposed system, in case of using fork function it took about 33.6 milliseconds and 24.4 milliseconds when we used the specific process. From the results, we can see that the overhead of using fork function causes 10 milliseconds more latency.

ICACT20220132 Slide.17        [Big Slide]       [YouTube] Chrome Click!!
This slide shows the evaluation results on client1. We measured the latency of name resolution for domain name google.com.The first try on the client based DNSSSEC validation took 13.7 milliseconds and from the second try it took 46.4 milliseconds. In the proposed system, when we used the fork function it took 60.2 milliseconds and when we used the specific process it took 48.6 milliseconds.

ICACT20220132 Slide.16        [Big Slide]       [YouTube] Chrome Click!!
We used two physical servers and several virtual machines in the prototype system. We used Perl language and Perl modules in the proposed system as shown in this slide.

ICACT20220132 Slide.15        [Big Slide]       [YouTube] Chrome Click!!
We implemented 2 types of prototype systems using Perl language. The first type was implemented using fork function. In this type, when the system receives a DNS query, a child process will be created and the child process conducts the normal query and the query on the previously proposed client based DNSSEC validation system. The second type was implemented by creating a specific name resolution process. In this type, the specific process conducts normal DNS query and the previously proposed client based DNSSEC validation system works as usual. As a result, two processes reply DNS responses individually. We evaluated the two types of prototype systems and compared them with the conventional DNS name resolution method.

ICACT20220132 Slide.14        [Big Slide]       [YouTube] Chrome Click!!
From the second time of DNS query for the same domain name, since the validation finished DNS resource records have been cached in the DNSSEC enabled cache DNS server, thus the response from the DNSSEC enabled cache DNS Server will be fast. Accordingly, the response from the DNSSEC disabled cache DNS Server will need validation on the client, thus the response will be late and dropped.

ICACT20220132 Slide.13        [Big Slide]       [YouTube] Chrome Click!!
This figure shows the procedure of domain name resolution in the proposed system. The client sends DNS query to DNSSEC enabled cache DNS server and DNSSEC disabled cache DNS server simultaneously. Since the overload of DNSSEC enabled cache DNS Server is high, thus the validation in the DNSSEC enabled cache DNS Server will be slow.On the other hand, the response from the DNSSEC disabled cache DNS Server will be fast and it need validation on the client.

ICACT20220132 Slide.12        [Big Slide]       [YouTube] Chrome Click!!
Considering the possible issues in the two approaches, in this paper, we propose a new method by using two cache DNS server in parallel. In the proposed system, we assume that DNSSEC validation feature is enabled on each end client by installing the client based DNSSEC validation system. In the proposed system, the first try of name resolution for a domain name will be validated on each end client and the same request will also be sent to an external cache DNS server with DNSSEC enabled in parallel. Since the DNSSEC validation on the cache DNS server will take time thus the results of the end client will be used while the result of the cache DNS server will be cached on its own. From the second time, the response from the external cache DNS server will be fast since the successfully validated DNS resource records have been cached. Consequently, the results from the external cache DNS server will be used.

ICACT20220132 Slide.11        [Big Slide]       [YouTube] Chrome Click!!
The second approach is that in addition to add a DNS sharing server, the DNS sharing server also performs DNSSEC validation before caching the updated DNS resource records. However, it needs complicated configuration on the DNS sharing server and the DNS sharing server needs to communicate with the external DNS servers in the Internet thus it may cause security concerns.

ICACT20220132 Slide.10        [Big Slide]       [YouTube] Chrome Click!!
The first approach we considered is to share successfully DNSSEC validated DNS resources records using a DNS sharing server. Each end client updates the successfully validated DNS resource records to the DNS sharing server using dynamic DNS update. Then each end client queries the DNS sharing server first in the domain name resolution and if there is no cache hit the end client will continue to query the external cache DNS server. However, this approach has a critical flaw that the malicious users or infected clients may add fake DNS resource records to the DNS sharing server. Moreover, although TSIG will be used in the dynamic DNS update, when the TSIG key is stolen it can be used maliciously.

ICACT20220132 Slide.09        [Big Slide]       [YouTube] Chrome Click!!
The objective of this paper is to accelerate name resolution on end clients by improving the cache hit rate.In addition to use the client based DNSSEC validation system, a method to share the successfully validated DNS resource records will be added. Specifically, the DNSSEC validation will be enabled on each end client and the each end client also uses the successfully validated DNS resource records achieved from external cache DNS server.

ICACT20220132 Slide.08        [Big Slide]       [YouTube] Chrome Click!!
Although the previous work can solve some existing issues in DNSSEC, it also causes another issue. In the previous system, each end client conducts DNSSEC validation and the results only store in the internal cache. It means that the successfully validated DNS resources records cannot be shared with other end clients. Accordingly, the system may cause low name resolution performance on end clients.

ICACT20220132 Slide.07        [Big Slide]       [YouTube] Chrome Click!!
In order to solve the existing issues of DNSSEC we have proposed a client based DNSSEC validation system.In the system, the DNSSEC validation will be conducted on each end client and the DNSSEC validation will be turned off. This system can solve some existing issues in DNSSEC such as the workload increase of cache DNS server and domain name resolution failure due to DNSSEC misconfiguration. In addition, the system also provides a function that displays a pop-up message to the users in case of DNSSEC validation failure and timeout.

ICACT20220132 Slide.06        [Big Slide]       [YouTube] Chrome Click!!
As an effective solution for cache poisoning attack, DNSSEC has been proposed and standardized. DNSSEC uses public cryptography and guarantees the integrity of DNS responses between cache DNS server and authoritative DNS server. As shown in this figure, the authoritative DNS server signs the zone file using its secret key and replies the corresponding DNS resource records with the signature and the public key to the cache DNS server. Then, the cache DNS server verifies the signature using the public key and check the integrity of the DNS response. Although DNSSEC can avoid cache poisoning attacks but it also cause some issues in terms of workload increase on cache DNS server and domain name resolution failure in case of DNSSEC validation failure.

ICACT20220132 Slide.05        [Big Slide]       [YouTube] Chrome Click!!
Although cache DNS server can improve domain name resolution performance, it has a well-known security concern named cache poisoning attack. The attacker can make cache DNS server add fake DNS resource records which make the client access malicious web sites. A normal cache DNS server has no function to verify the integrity of DNS responses.

ICACT20220132 Slide.04        [Big Slide]       [YouTube] Chrome Click!!
In domain name system, there are two types of DNS servers, authoritative DNS server and cache DNS server. Authoritative DNS server runs domain name management with authorization while cache DNS server provides name resolution service for the end clients. As shown in the figure, the client sends DNS query to the cache DNS server and the cache DNS server performs domain name resolution by querying each authoritative DNS server. Finally, the cache DNS server replies the answer back to the client.

ICACT20220132 Slide.03        [Big Slide]       [YouTube] Chrome Click!!
As you know well, IP addresses are necessary for the communication in the Internet but they are not appropriate for memorizing. Therefore domain names are mainly used instead for Internet users and service providers. Accordingly, domain name system is necessary for the translation between IP addresses and domain names.

ICACT20220132 Slide.02        [Big Slide]       [YouTube] Chrome Click!!
Here is the outline of my presentation.

ICACT20220132 Slide.01        [Big Slide]       [YouTube] Chrome Click!!
My name is Yong Jin from Tokyo Institute of Technology, Japan, today, I am going to talk about acceleration of a client based DNSSEC validation system in parallel with two full-service resolvers".