Find available RRs of SUTDs domain name

Assignment Help Computer Engineering
Reference no: EM131753828

Domain Name System (DNS)

Task 1 -

Find available RRs of SUTD's domain name

Send the same request from university's and your ISP's network

  • Is this zone signed?
  • What query type do you think is more profitable for a DNS amplification attack?

Send the same request to an open DNS recursive NS (choose one of the public DNS service providers)

  • Do you observe any difference on the responses? If you do, can you explain why these differences occur?
  • What RR types do you observe on the responses to figure out whether the zone is signed or not?
  • Are they any difference between a direct query to their authoritative NS and a query through an open DNS recursive?

Task 2 -

Assess the amplification capabilities of the TLD Authoritative NSs.

Download the latest version of root.zone file and extract the pairs <domain name, Authoritative IPv4>

Send directly to each Authoritative IPv4 address a DNS query about the domain_name and capture (sniffer) the responses. Choose the most profitable query type

Calculate the amplification factor with AF1

  • IP packet
  • UDP packet
  • DNS packet (UDP payload)

Present the measurements in an appropriate figure or table.

Task 3 -

Assess the reflection capabilities of the TLD Authoritative NSs.

For the same pairs of <domain_name, Authoritative_IPv4>, send directly to each of the NS a bunch of 500 DNS queries in a narrow time window. Again, choose the most profitable query type

Evaluate only unique IPv4 addresses, namely probe the same server (IPv4 address) for only one of the domain names that is authoritative

For each authoritative NS calculate percentage of successful responses

Calculate the cumulative amplification factor with AF2

  • IP packet
  • UDP packet
  • DNS packet (OOP payload)

Present the measurements in an appropriate figure or table.

Task 4 -

Download the Top 1M (most visited) websites list from Statvoo (excel file)

From 1,000 websites

  • What is the percentage of the domains that have enabled DNSSEC?
  • What is the percentage of the authoritative that support recursive queries?

Assess the amplification and reflection capabilities of only the DNSSEC-enabled (repeat the same steps as T2 & T3 ONLY for these authoritatives)

Probably you will get better result if you query about the domain zone instead of the website's hostname (query about example.com instead of www.example.com)

Calculate the amplification factor with AF, & AF2 respectively

  • IP packet
  • UDP packet
  • DNS packet (UDP payload)

Deliverables -

Report: Explain the steps for each task (T)

Executed commands

Answers to the questions

Measurements (figure or table)

Screenshots of the tool's output

Shell script or source code (separate files)

The submitted file(s) should be contained in a compress file (.zip or .rar) and named after your details (for example: firstname_lastname.zip) On the first page of the report mention you full name and student ID. Keep the pcap files, you may be asked to deliver them as well.

Purpose of project -

  • To be familiarized with DNS service.
  • To assess the role of TLD Authoritative nameservers as amplifiers.
  • To assess the role of TLD Authoritative nameservers as reflectors.
  • To estimate a globalized view of DNS amplification attack potentials.

Description

You should submit a report that explains the steps you have followed for each task (T), executed commands, your answers to the questions, the measurements, screenshots of the utilized tools' output and shell script or source code (deliver in separate files). The submitted file(s) should be contained in a compress file (.zip or .rar) and named after your details (for example: firstname_lastname.zip). Also, on the first page of the report mention you full name and student ID.

Attachment:- Assignment Files.rar

Reference no: EM131753828

Questions Cloud

Steve is a partner at frank rimerman accounting : Steve is a Partner at Frank Rimerman Accounting and heads up their early stage practice.
Explain why there occurred numerous experimental : Explain why there occurred numerous experimental or innovative approaches to residential real estate brokerage in the United States in the years following 2000.
Audiovisual enhancements to traditional training methods : Analyze two to three specific benefits that students can derive from the addition of audiovisual enhancements to traditional training methods.
Cumulative distribution function : Let X be a random variable, with cumulative distribution function FX . Prove that P(X = a) = 0 if and only if the function FX is continuous at a.
Find available RRs of SUTDs domain name : Domain Name System (DNS) - Find available RRs of SUTD's domain name. What query type do you think is more profitable for a DNS amplification attack
Improved to improve the performance of your library : Are there any ways this process could be improved to improve the performance of your library or your school? Diagram the improved process.
Review death penalty background information : Read the textbook subchapter "The Death Penalty" on pages 462 and 464-466 review death penalty background information on Should the Death Penalty Be Allowed?
Determine the distribution function for the pareto : Determine the distribution function for the Pareto(a)distribution of Problem 2.4.20.
Improvement of performance and achieve supply chain value : how should transportation managers promote continuous improvement of performance and achieve supply chain value?

Reviews

len1753828

12/6/2017 11:58:48 PM

The submitted file(s) should be contained in a compress file (.zip or .rar) and named after your details (for example: firstname_lastname.zip) On the first page of the report mention you full name and student ID. Keep the pcap files, you may be asked to deliver them as well. You should submit a report that explains the steps you have followed for each task (T), executed commands, your answers to the questions, the measurements, screenshots of the utilized tools’ output and shell script or source code (deliver in separate files). The submitted file(s) should be contained in a compress file (.zip or .rar) and named after your details (for example: firstname_lastname.zip). Also, on the first page of the report mention you full name and student ID.

len1753828

12/6/2017 11:58:42 PM

The objective of this project is to understand the basics of DNS protocol and the feasibility of exploiting DNS infrastructure, and specifically Top-Level Domain (TLD) servers, for launching Denial of Service (DoS) attacks. For your implementation, you should have in mind what is the best strategy followed by an attacker to increase the impact of his actions. Your approach will be from the offensive side not the defensive.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd