Skip to main content

Research on Privacy Protection of WHOIS Information in DNS

  • Conference paper
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 330))

Abstract

WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available by the malicious third party. In this paper, we first analyzed the whole process of the WHOIS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nikolaos, A., Stylianos, B., Panagiotis, K., Tushar, D., Scott, A.S.: Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking. In: IEEE 12th International Symposium on High Assurance Systems Engineering, pp. 94–103 (2010)

    Google Scholar 

  2. Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., Lynch, D., Postel, J., et al.: A Brief History of the Internet, version 3.32, http://www.isoc.org/internet/history/brief.shtml (last revised December 10, 2003)

  3. Gueye, B., Ziviani, A., Crovella, M., Fdida, S.: Constrait based geolocation of internet hosts. IEEE/ACM Transactions on Networking (TON) 14(6), 1219–1232 (2006)

    Article  Google Scholar 

  4. Katz-Bassett, E., John, J., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y., Towards, I.P.: Geolocation using delay andtopology measurements. In: Proceedings of the 6th ACM SIGCOMM on Internet Measurement, pp. 71–84 (2006)

    Google Scholar 

  5. Cowperthwaite, A., Somayaji, A.: The futility of DNSSec. In: Proc. 5th Annual Symp. Information Assurance (ASIA 2010), pp. 2–8 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, W., Wang, W., Zhang, X., Shi, H. (2015). Research on Privacy Protection of WHOIS Information in DNS. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45402-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45401-5

  • Online ISBN: 978-3-662-45402-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics