Icann’S New gTLD Program

Author(s):  
Torsten Bettinger ◽  
Mike Rodenbaugh

Since its creation in 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) has been responsible for ensuring free trade and marketplace competition in the sale and regulation of domain names, as well as overseeing the stability of the Domain Name System (DNS) and the creation of consistent, functional policies. Therefore, its responsibilities include assessing when, and to what degree, additional generic top-level domains (gTLDs) are needed in order to ensure the proper functioning of the DNS. In order to make such a determination, ICANN relied on the input of interested Internet stakeholders as mandated through its multi-stakeholder model, which involves interested business entities, individuals, and governments from around the world.

Author(s):  
Torsten Bettinger

Although the Internet has no cross-organizational, financial, or operational management responsible for the entire Internet, certain administrative tasks are coordinated centrally. Among the most important organizational tasks that require global regulation is the management of Internet Protocol (IP) addresses and their corresponding domain names. The IP address consists of an existing 32 bit (IP4) or 128 bit (IP6) sequence of digits and is the actual physical network address by which routing on the Internet takes place and which will ensure that the data packets reach the correct host computer.


2007 ◽  
Vol 6 ◽  
pp. 39-63
Author(s):  
Jorge Alberto Fierro Abella

El desarrollo de la llamada red de redes o internet ha supuesto un cambio sustancial en la forma de entender las relaciones comerciales. La extensión del acceso a aquella a un número cada vez mayor de agentes económicos, unido a un crecimiento continuo de los contenidos de toda índole disponibles en la red, implica que la facilidad con que se acceda a la información de una determinada compañía tenga un elevado valor. El objetivo de este documento de reflexión es ofrecer en primer lugar, un panorama general del marco teórico en el que se desarrolla la actividad de registro de nombres de dominio, tanto en el ámbito internacional como en el local (España) y su relación con el derecho de marcas, para a partir de ello exponer una serie de casos, que tienen una relación directa con España, bien por tratarse de resoluciones de nuestros tribunales, bien por ser asuntos en los que se discutía la titularidad de nombres de dominio en los que aparecía como perjudicado (real o pretendido) una marca o nombre comercial española o al menos con presencia en este país. Abstract Domain names are the familiar and easy-to-remember names for internet computers. They map to unique Internet Protocol (IP) numbers that serve as routing addresses on the Internet. The domain name system (DNS) translates internet names into the IP numbers needed for transmission of information across the network. The challenge pursued by the following research is to provide a general outlook of the theoretical frame for the technical activity of domain name registration procedure, as well as the implication of complementary sources of rules. The territorial context of the analysis is only apparent, since the empirical application of concepts can also be applied by other jurisdictions. Palabras Claves Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas. Keywords Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas


Author(s):  
Ian J. Lloyd

Internet access is dependent on two major factors: Internet (generally referred to as IP) addresses, which are a functional equivalent to telephone numbers, and domain names. The former element raises a number of technical issues but is generally non-contentious. Systems of domain names—which effectively serve as an alias for IP numbers—are much more controversial and raise major issues how the Internet should be regulated. This chapter begins with a discussion of the emergence of Internet regulation. It then turns to domain names and the regulation of the domain-name system.


2019 ◽  
Vol 2 (3) ◽  
pp. 238-242
Author(s):  
Andreas Tedja ◽  
Charles Lim ◽  
Heru Purnomo Ipung

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.


2020 ◽  
pp. 377-390
Author(s):  
Ian J. Lloyd

Internet access is dependent on two major factors: Internet (generally referred to as IP) addresses, which are a functional equivalent to telephone numbers, and domain names. The former element raises a number of technical issues but is generally non-contentious. Systems of domain names—which effectively serve as an alias for IP numbers—are much more controversial and raise major issues how the Internet should be regulated. This chapter begins with a discussion of the emergence of Internet regulation. It then turns to domain names and the regulation of the domain-name system at both a global and country specific level.


DNS have a crucial role in adequate functioning/performance of the Internet. Even though every single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.


2015 ◽  
Vol 27 ◽  
pp. 204-240
Author(s):  
James Plotkin

The internet has revolutionized the way we interact with information and each other. Among the internet’s many applications, e-commerce ranks at the top. Businesses derive significant value from a robust online presence which arguably begins with a strong domain name.Websites are identified by internet protocol (IP) addresses which consist of sets of numbers. The Domain Name System (DNS) is the internet’s address book. Its function is to allow internet users to identify websites with more memorable indicia than a set of numbers such as words, phrases and acronyms. Given that businesses often devote significant resources to growing brand recognition and the goodwill associated with their trademarks, many of them tend to register domain names under those trademarks. Domain names (unlike trademarks) are unique which further increases a trademark holder’s interest in securing ones that consumers would likely associate with its goods or services.Cyber-squatters seek to profit from the DNS by engaging in a form of “online speculation”.  They register domain names that are either identical or confusingly similar to trademarks and then attempt to sell the domain name(s) to a legitimate trademark holder for a profit.The current regulatory framework dealing with cyber-squatting comprises of: 1) The Internet Corporation for Assigned Names and Numbers (ICANN) Uniform Dispute Resolution Policy (UDRP) and variants thereof; 2) The American Anticybersquatting Consumer Protection Act (ACPA); and 3) National trademark laws. This paper argues that while partially effective, the current framework is lacking.A review of UDRP panel statistics reveals a steady flow of complaints since 2000 with a marked upswing from 2005 forward. The WIPO Arbitration and Mediation Center, the largest UDRP resolution provider, receives between 1700-2600 complaints per year relating to cyber-squatting. Cyber-squatting is therefore clearly an issue that requires further or better regulation.The UDRP, ACPA and trademark statutes all suffer from significant shortcomings. This paper seeks to identify those shortcomings and propose a potential solution: a model law relating to cyber-squatting and other abusive domain name practices. The model law would create specific causes of action for cybersquatting and the abusive practice known as “reverse-domain name hijacking”. It would also comport certain key provisions to aid in the harmonization of an internationally accepted body of “domain name law”.While a model law approach itself suffers from certain shortcomings (most notably the requirement that it be adopted in a significant number of states to become effective), this paper demonstrates that those shortcomings are far outweighed by its benefits.


Info ◽  
2014 ◽  
Vol 16 (2) ◽  
pp. 16-46 ◽  
Author(s):  
Richard Hill

Purpose – The purpose of this article is to provide an overview of key issues and concepts related to discussions of the internet, its governance, and its multi-stakeholder model. Design/methodology/approach – The method adopted is to discuss definitions of internet, to identify the key characteristics of internet, to define the multi-stakeholder approach, and to discuss the results it has achieved. Findings – The article finds that the internet is different from other networks, albeit not exactly in the ways that are commonly mentioned, and it finds that the internet's current governance mechanisms can be improved, in particular by increasing the role of more traditional governance mechanisms such as intergovernmental organizations. Originality/value – The analysis and conclusions are not found in previous literature, and they are meant to provoke further research and discussion.


Author(s):  
Lauren Movius

As the Internet has spread globally, and its economic, political, and cultural influences have increased, it is necessary to develop appropriate policy to govern it, in order to manage and protect it’s presence in our lives. While national governments apply their laws on the Internet, the Internet presents many issues that span national jurisdictions, and therefore requires global governance. Early Internet governance was self-regulatory and involved organizations and a community of users that made decisions through rough consensus. ICANN and the technical issue of domain name and addressing began debates over the issue of Internet governance. Larger issues of Internet governance emerged during the World Summit on the Information Society, whose existence illustrates the shift towards accepting the need for a global, more formal framework of governance. This chapter explores Internet governance and covers the following themes: understanding the challenge of governing the Internet; frameworks and definitions of Internet governance; and the evolution of the Internet governance debate. As there is much disagreement about what Internet governance is, this chapter synthesizes the main issues and debates and provides an overview of Internet governance.


2006 ◽  
Vol 16 (3) ◽  
pp. 343-367 ◽  
Author(s):  
Richard A. Spinello

Abstract:The Internet presents opportunities for corporations to efficiently build their brands online and to enhance their global reach. But there are threats as well as opportunities, since anti-branding and free-riding activities are easier in cyberspace. One such threat is the unauthorized incorporation of a trademark into a domain name. This can lead to trademark dilution and cause consumer confusion. But some users claim a right to use these trademarks for the purpose of parody or criticism. Underlying these trademark conflicts is the familiar tension between property rights and free speech rights. While some trademark scholars are reluctant to consider a trademark as property, we find strong support for the property paradigm in Hegel’s philosophy. Assuming that a trademark is an earned property right, we propose that a trademark owner should be allowed to control the permutations of its trademark incorporated into domain names unless a reasonable person would not confuse that domain name with the company’s mark. But we also conclude that there must be latitude to employ a domain name for negative editorial comment, so long as the source and purpose of that domain name is plainly apparent.


Sign in / Sign up

Export Citation Format

Share Document