Abstract
WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available by the malicious third party. In this paper, we first analyzed the whole process of the WHOIS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nikolaos, A., Stylianos, B., Panagiotis, K., Tushar, D., Scott, A.S.: Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking. In: IEEE 12th International Symposium on High Assurance Systems Engineering, pp. 94–103 (2010)
Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., Lynch, D., Postel, J., et al.: A Brief History of the Internet, version 3.32, http://www.isoc.org/internet/history/brief.shtml (last revised December 10, 2003)
Gueye, B., Ziviani, A., Crovella, M., Fdida, S.: Constrait based geolocation of internet hosts. IEEE/ACM Transactions on Networking (TON) 14(6), 1219–1232 (2006)
Katz-Bassett, E., John, J., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y., Towards, I.P.: Geolocation using delay andtopology measurements. In: Proceedings of the 6th ACM SIGCOMM on Internet Measurement, pp. 71–84 (2006)
Cowperthwaite, A., Somayaji, A.: The futility of DNSSec. In: Proc. 5th Annual Symp. Information Assurance (ASIA 2010), pp. 2–8 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, W., Wang, W., Zhang, X., Shi, H. (2015). Research on Privacy Protection of WHOIS Information in DNS. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-45402-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45401-5
Online ISBN: 978-3-662-45402-2
eBook Packages: EngineeringEngineering (R0)