Filters








1,930 Hits in 3.4 sec

Serving DNS Using a Peer-to-Peer Lookup Service [chapter]

Russ Cox, Athicha Muthitacharoen, Robert T. Morris
2002 Lecture Notes in Computer Science  
We explore one such alternative using DHash, a peer-to-peer distributed hash table built on top of Chord.  ...  We use this comparison to draw conclusions about general issues that still need to be addressed in peer-to-peer systems and distributed hash tables in particular.  ...  In this paper, we explore one alternate service structure based on Chord [10] , a peer-to-peer lookup service.  ... 
doi:10.1007/3-540-45748-8_15 fatcat:xgjn7xtlkvbolezzxgwi3nix2a

The design and implementation of a next generation name service for the internet

Venugopalan Ramasubramanian, Emin Gün Sirer
2004 Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04  
Backwards compatibility with existing protocols and wire formats enables CoDoNS to serve as a backup for legacy DNS, as well as a complete replacement.  ...  The Domain Name System (DNS) used on the Internet, however, is slow, vulnerable to denial of service attacks, and does not support fast updates.  ...  Acknowledgments We are grateful to Robert Morris, Hari Balakrishnan, Jaeyon Jung, and Emil Sit for providing their DNS traces.  ... 
doi:10.1145/1015467.1015504 dblp:conf/sigcomm/RamasubramanianS04 fatcat:24vi25x33bhaljhxb3lgefayfy

The design and implementation of a next generation name service for the internet

Venugopalan Ramasubramanian, Emin Gün Sirer
2004 Computer communication review  
Backwards compatibility with existing protocols and wire formats enables CoDoNS to serve as a backup for legacy DNS, as well as a complete replacement.  ...  The Domain Name System (DNS) used on the Internet, however, is slow, vulnerable to denial of service attacks, and does not support fast updates.  ...  Acknowledgments We are grateful to Robert Morris, Hari Balakrishnan, Jaeyon Jung, and Emil Sit for providing their DNS traces.  ... 
doi:10.1145/1030194.1015504 fatcat:mmtavzmtbnherlowexzg3rpgmi

A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies

Lihua Yuan, Chao-Chih Chen, Prasant Mohapatra, Chen-Nee Chuah, Krishna Kant
2013 ACM Transactions on Internet Technology  
This analytical study prompts us to present Domain Name Cross-Referencing (DoX), a peer-to-peer systems for DNS proxies to cooperatively defend cache poisoning attacks.  ...  KRISHNA KANT, Intel The Domain Name System (DNS) provides a critical service for the Internet -mapping of user-friendly domain names to their respective IP addresses.  ...  to provide DNS lookup services.  ... 
doi:10.1145/2461321.2461324 fatcat:jlila5w2ozhavochn72f5wldiq

DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-nee Chuah
2006 2006 IEEE International Conference on Communications  
In this paper, we propose a peer-to-peer based scheme to quickly detect and correct inaccurate DNS records caused by cache poisoning attacks.  ...  Recently, the DNS infrastructure has suffered several malicious attacks including DNS cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold for more insidious  ...  Substantial work has been done using structured overlays to provide scalable DNS lookups. Overlook [16] is a new name service based on Pastry. DDNS [17] is a P2P lookup service based on Chord.  ... 
doi:10.1109/icc.2006.255120 dblp:conf/icc/YuanKMC06 fatcat:rzy4l2wq7nh5njd5ljttkxqmc4

A Proxy View of Quality of Domain Name Service

L. Yuan, K. Kant, P. Mohapatra, C.-N. Chuah
2007 IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications  
The Domain Name System (DNS) provides a critical service for the Internet -mapping of user-friendly domain names to their respective IP addresses.  ...  In particular, we compare the performance of two newly proposed DNS security solutions: one based on cryptography and one using collaborative overlays. II. BACKGROUND AND RELATED WORK A.  ...  First, if the record remains unchanged, the response can be served to clients immediately. Second, if there is a modification, proxy A sends a verification request to N peers.  ... 
doi:10.1109/infcom.2007.45 dblp:conf/infocom/YuanKMC07 fatcat:csiws4ktc5h4jp5xyrm4633zii

Chord: A distributed Overlay Network Mechanism for Peer-to-Peer Systems

TUNAZZINA TAFANNUM, SANJIDA AFRIN JISAN
2022 Zenodo  
This research is based on "Chord: A distributed overlay network mechanism for Peer-to-Peer Systems".  ...  An essential issue that goes up against peer-to-peer applications is the efficient area of the node that stores a suitable data item. For this issue, Chord provides support to fix it.  ...  DNS: DNS provides a lookup service, with host names as keys and IP addresses (and other host information) as values. Chord could provide the same service by hashing each host name to a key (R.  ... 
doi:10.5281/zenodo.6190664 fatcat:maw3mjs4pbdxrf42qpbhblnauy

Prototyping a multi-root ONS

Roberto Quilez, Nathalie Mitton, Marcelo Dias de Amorim, Nicolas Pauvre
2012 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)  
The Object Naming System (ONS) is a central lookup service used in the EPCglobal network for retrieving location information about a specific Electronic Product Code (EPC).  ...  We present the design principles of a fully-distributed multi-root solution for ONS lookup service.  ...  In this way, we also propose a DNS-independent scenario where queries to the root service are implemented in a more generic way. Each peer root node serves as a gateway to the DHT.  ... 
doi:10.1109/wcncw.2012.6215481 dblp:conf/wcnc/QuilezMAP12 fatcat:vq7sxn4wxfbp3p2kvesjsc6fzy

Framework for Decentralizing Legacy Applications

Jani Hautakorpi, Gonzalo Camarillo, David López
2009 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid  
Today many Peer-to-peer (P2P) applications are widely used on the Internet.  ...  However, there are still a number of legacy applications that utilize a centralized infrastructure as opposed to a decentralized approach.  ...  DNS resolver and some parts of the modules to the prototype.  ... 
doi:10.1109/ccgrid.2009.75 dblp:conf/ccgrid/HautakorpiCL09 fatcat:7au2qijgwjajnplr7cacd5h7se

Discovery Systems in Ubiquitous Computing

W.K. Edwards
2006 IEEE pervasive computing  
Discovery lets services and devices spontaneously become aware of the availability and capability of peers on the network without explicit administration.  ...  In practice, this means that a client can discover and potentially use a device without prior knowledge of it.  ...  In the simplest case, clients and services use a multicast protocol to find lookup services on their networks.  ... 
doi:10.1109/mprv.2006.28 fatcat:35fexyqednbbzifquxffkwvjhi

Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks [chapter]

Shou-Chih Lo, Wen-Tsuen Chen
2005 IFIP International Federation for Information Processing  
In this paper, we propose an enhancing version of Mobile IP by using the Peer-to-Peer (P2P) network technology.  ...  We organize home agents into P2P networks and use the Domain Name System (DNS) to provide the universal telephone number that can uniquely identify one person regardless of the type of equipped device.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous referees for their helpful suggestions.  ... 
doi:10.1007/0-387-23150-1_8 fatcat:wu3gollesbdvpd5tdbqftvqb3m

Peer-to-peer internet telephony using SIP

Kundan Singh, Henning Schulzrinne
2005 Proceedings of the international workshop on Network and operating systems support for digital audio and video - NOSSDAV '05  
Internet telephony can be viewed as an application of P2P architecture where the participants form a self-organizing P2P overlay network to locate and communicate with other participants.  ...  We propose a pure P2P architecture for the Session Initiation Protocol (SIP)-based IP telephony systems.  ...  The work is supported by a grant from SIPquest, Inc.  ... 
doi:10.1145/1065983.1065999 dblp:conf/nossdav/SinghS05 fatcat:nbnggtevqfdnhbjzbmuel5gc3y

TrickleDNS: Bootstrapping DNS security using social trust

Sriram Sankararaman, Jay Chen, Lakshminarayanan Subramanian, Venugopalan Ramasubramanian
2012 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)  
First, TrickleDNS organizes participating nameservers into a well-connected peer-to-peer Secure Network of Nameservers (SNN) using two types of trust links: (a) strongly trusted social relationships across  ...  TrickleDNS provides resilience from data corruption attacks and denial of service attacks, including sybil attacks, using three key steps.  ...  [9] propose an architecture to proactively push DNS records using a peer-to-peer overlay for high performance and failure resilience.  ... 
doi:10.1109/comsnets.2012.6151334 dblp:conf/comsnets/SankararamanCSR12 fatcat:pycg23seojfjvababq5ndmqrwe

Peering Peer-to-Peer Providers [chapter]

Hari Balakrishnan, Scott Shenker, Michael Walfish
2005 Lecture Notes in Computer Science  
The key issue is whether a multiplicity of DHT services can coordinate to provide a single coherent DHT service, much the way ISPs peer to provide a completely connected Internet.  ...  While this cooperative end-user approach works well in many application settings, it does not provide a sufficiently stable platform for certain peer-to-peer applications (e.g., DHTs as a building block  ...  Acknowledgments We thank Sean Rhea for useful comments. This research was supported by the National Science Foundation under Cooperative Agreement No.  ... 
doi:10.1007/11558989_10 fatcat:dlghjohbxnaqjffwyqbubwblzq

Exploiting Host Name Locality for Reduced Stretch P2P Routing

Gert Pfeifer, Christof Fetzer, Thomas Hohnstein
2007 Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)  
Providing competitive performance with traditional distributed services is however very difficult because existing services like DNS are highly tuned using a combination of caching and localized communication  ...  Structured P2P networks are a promising alternative for engineering new distributed services and for replacing existing distributed services like DNS.  ...  Today, there is one global-scale distributed lookup service that is deployed and used in the Internet: DNS.  ... 
doi:10.1109/nca.2007.22 dblp:conf/nca/PfeiferFH07 fatcat:ps6thdyldzcgnkfm3hmoic33h4
« Previous Showing results 1 — 15 out of 1,930 results