The Domain Name System (DNS) is a critical part of the internet infrastructure. It is a distributed data base that maps domain names (URL) on to their respective IP Address. DNS was designed for a trusted environment. Todayâs malicious activity has reduced the trustworthiness of the DNS mapping. DNSSEC has been proposed as a secure alternative, but is not suited for all environments. For example, in the tactical environment DNSSEC implementations are particularly challenging. In this proposal we seek to evaluate and prototype a new DNS server â such server should have security close to DNSSEC and operational convenience similar to current DNS servers. Our research in Self Cleansing Intrusion Tolerance (SCIT) technology has yielded an Authoritative DNS server which meets this challenge, by resetting the server every minute or so. In this project we will evaluate alternate approaches and formulate an appropriate strategy for DNS servers that meet the above conditions for new DNS server. We will explore the authoritative and recursive DNS servers that are suitable for the Armyâs environment. Although, we are motivated by SCIT in this project we will explore alternate approaches and formulate the best approach to meet the security and operational requirements.
Keywords: System Integrity, Malware Deletion, Cache Poisoning, Dnssec, Self Cleansing Intrusion Tolerance, Dns, Malicious Activity