scholarly journals Identifying Influential SLD Authoritative Name Servers on the Internet

2021 ◽  
Vol 9 ◽  
Author(s):  
Haiyan Xu ◽  
Zhaoxin Zhang ◽  
Bing Han ◽  
Jianen Yan

DNS plays an important role on the Internet. The addressing of most applications depends on the proper operation of DNS. The root servers and the top-level domain servers are relied upon by many domains on the Internet, and their security affects the whole Internet. As a result, more attention has been paid to the security of servers at these two levels. However, the security of second-level domains and their servers also needs to be brought to the forefront. This paper focuses on showing the complex resolving dependencies and identifying influential name servers for second-level domains. We start by detecting domain name resolution paths and building up a name dependency graph. Then we construct domain name resolution networks of different numbers and sizes, which are connected by a certain number of domain name resolution graphs. On this basis, the network is analyzed from the perspective of complex network analysis, and a multi-indicators node importance evaluation method based on partial order is proposed to identify the influential name servers of the network. Once these name servers are not properly configured and fail or are compromised by DDoS attacks, it will cause resolution failure for a wide range of domain names.

Author(s):  
Torsten Bettinger

Although the Internet has no cross-organizational, financial, or operational management responsible for the entire Internet, certain administrative tasks are coordinated centrally. Among the most important organizational tasks that require global regulation is the management of Internet Protocol (IP) addresses and their corresponding domain names. The IP address consists of an existing 32 bit (IP4) or 128 bit (IP6) sequence of digits and is the actual physical network address by which routing on the Internet takes place and which will ensure that the data packets reach the correct host computer.


2013 ◽  
Vol 765-767 ◽  
pp. 1098-1102
Author(s):  
Yu Xia ◽  
Fei Peng

in order to improve the efficiency and validity of node importance evaluation, a new evaluation method for node importance in complex networks was proposed based on node approach degree and node correlation degree. The basic idea of the method is that the larger the approach degree of a node is, the closer to center of a complex network the node is and the more important it is; the bigger the correlation degree of a node is, the more important the node is. An evaluation algorithm corresponding to the method was designed for the warship fleet cooperation anti-missile network. Finally, the validity of the proposed method was verified by simulation experiments.


2006 ◽  
Vol 16 (3) ◽  
pp. 343-367 ◽  
Author(s):  
Richard A. Spinello

Abstract:The Internet presents opportunities for corporations to efficiently build their brands online and to enhance their global reach. But there are threats as well as opportunities, since anti-branding and free-riding activities are easier in cyberspace. One such threat is the unauthorized incorporation of a trademark into a domain name. This can lead to trademark dilution and cause consumer confusion. But some users claim a right to use these trademarks for the purpose of parody or criticism. Underlying these trademark conflicts is the familiar tension between property rights and free speech rights. While some trademark scholars are reluctant to consider a trademark as property, we find strong support for the property paradigm in Hegel’s philosophy. Assuming that a trademark is an earned property right, we propose that a trademark owner should be allowed to control the permutations of its trademark incorporated into domain names unless a reasonable person would not confuse that domain name with the company’s mark. But we also conclude that there must be latitude to employ a domain name for negative editorial comment, so long as the source and purpose of that domain name is plainly apparent.


2007 ◽  
Vol 6 ◽  
pp. 39-63
Author(s):  
Jorge Alberto Fierro Abella

El desarrollo de la llamada red de redes o internet ha supuesto un cambio sustancial en la forma de entender las relaciones comerciales. La extensión del acceso a aquella a un número cada vez mayor de agentes económicos, unido a un crecimiento continuo de los contenidos de toda índole disponibles en la red, implica que la facilidad con que se acceda a la información de una determinada compañía tenga un elevado valor. El objetivo de este documento de reflexión es ofrecer en primer lugar, un panorama general del marco teórico en el que se desarrolla la actividad de registro de nombres de dominio, tanto en el ámbito internacional como en el local (España) y su relación con el derecho de marcas, para a partir de ello exponer una serie de casos, que tienen una relación directa con España, bien por tratarse de resoluciones de nuestros tribunales, bien por ser asuntos en los que se discutía la titularidad de nombres de dominio en los que aparecía como perjudicado (real o pretendido) una marca o nombre comercial española o al menos con presencia en este país. Abstract Domain names are the familiar and easy-to-remember names for internet computers. They map to unique Internet Protocol (IP) numbers that serve as routing addresses on the Internet. The domain name system (DNS) translates internet names into the IP numbers needed for transmission of information across the network. The challenge pursued by the following research is to provide a general outlook of the theoretical frame for the technical activity of domain name registration procedure, as well as the implication of complementary sources of rules. The territorial context of the analysis is only apparent, since the empirical application of concepts can also be applied by other jurisdictions. Palabras Claves Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas. Keywords Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas


Author(s):  
Ian J. Lloyd

Internet access is dependent on two major factors: Internet (generally referred to as IP) addresses, which are a functional equivalent to telephone numbers, and domain names. The former element raises a number of technical issues but is generally non-contentious. Systems of domain names—which effectively serve as an alias for IP numbers—are much more controversial and raise major issues how the Internet should be regulated. This chapter begins with a discussion of the emergence of Internet regulation. It then turns to domain names and the regulation of the domain-name system.


Author(s):  
Torsten Bettinger ◽  
Mike Rodenbaugh

Since its creation in 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) has been responsible for ensuring free trade and marketplace competition in the sale and regulation of domain names, as well as overseeing the stability of the Domain Name System (DNS) and the creation of consistent, functional policies. Therefore, its responsibilities include assessing when, and to what degree, additional generic top-level domains (gTLDs) are needed in order to ensure the proper functioning of the DNS. In order to make such a determination, ICANN relied on the input of interested Internet stakeholders as mandated through its multi-stakeholder model, which involves interested business entities, individuals, and governments from around the world.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-24
Author(s):  
Lieven Desmet ◽  
Jan Spooren ◽  
Thomas Vissers ◽  
Peter Janssen ◽  
Wouter Joosen

DNS is one of the most essential components of the Internet, mapping domain names to the IP addresses behind almost every online service. Domain names are therefore also a fundamental tool for attackers to quickly locate and relocate their malicious activities on the Internet. In this article, we design and evaluate P remadoma , a solution for DNS registries to predict malicious intent well before a domain name becomes operational. In contrast to blacklists, which only offer protection after some harm has already been done, this system can prevent domain names from being used before they can pose any threats. We advance the state of the art by leveraging recent insights into the ecosystem of malicious domain registrations, focusing explicitly on facilitators employed for bulk registration and similarity patterns in registrant information. We thoroughly evaluate the proposed prediction model’s performance and adaptability on an 11-month testing set and address complex and domain-specific dataset challenges. Moreover, we have successfully deployed P remadoma in the operational environment of the .eu ccTLD registry, resulting in a decline of malicious registrations. Finally, we have identified and quantified three possible evasion patterns and have observed changes in the malicious registration ecosystem since P remadoma has been operationalized.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Weiming Yang ◽  
Congdong Li ◽  
Yinyun Yu ◽  
Mingsheng Zhong

The identification and evaluation of important parts play an important role in effective production arrangement and shortening the product development in the product design stage. In this paper, a complex product node importance evaluation method based on multilayer network is proposed to identify and evaluate importance parts faster. First, a complex product design expression network based on “function behavior structure (FBS)” multilayer complex network is established. Second, the evaluation index system of important design parts for complex products based on multilayer network is constructed. Third, a three-parameter grey relational model based on the fuzzy analytic hierarchy process and the Gini coefficient method is proposed. Finally, this method is available and feasible through taking the large permanent magnet synchronous centrifugal unit as an example.


Sign in / Sign up

Export Citation Format

Share Document