Indobet11
   | Home  | About ScienceAsia  | Publication charge  | Advertise with us  | Subscription for printed version  | Contact us  
Editorial Board
Journal Policy
Instructions for Authors
Online submission
Author Login
Reviewer Login
Volume 50 Number 2
Volume 50 Number 1
Volume 49 Number 6
Volume 49 Number 5
Volume 49S Number 1
Volume 49 Number 4
Earlier issues
https://nagaempire7.xyz/ https://empire88t.com/ https://botak-empire5.com/ https://uncleempire19.xyz/ https://indobet11j.com/ https://mukapoker1.lol/ https://mukacasinoc.com/ https://138.197.6.28 https://138.68.168.98 https://152.42.182.182/ https://planetaryconquest.com/ https://internationalpeaceday.com/ https://weidenfeldlaw.com/ https://notariamc.com/ https://inetskate.com/ https://newdatingway.com/ https://korem083.tniad.mil.id/shop/slot-100-perak/ https://korem083.tniad.mil.id/product/slot-qris/ https://korem083.tniad.mil.id/store/bet-200-perak/ https://abkpmi.ac.id/wp-content/uploads/products/slot-qris-10k/
https://www.arabiaphone.com/ https://www.benchmarcsystems.com/ https://www.dndock.com/ https://www.virtuallytheoffice.com/ https://www.mikechomes.com/ https://www.studioelpizo.com/ https://www.musicrebellion.com/ https://www.patmcgann.com/ https://www.hotel-gufler.com/ https://www.aegeaneating.com/ https://www.peterclementbooks.com/ https://www.mahshidabbasi.com/ https://www.elizabethtoop.com/ https://www.stonedeadforever.com/ https://www.longislandsites.com/ https://www.stevenmaloff.com/ https://www.viananaturalhealing.com/ https://www.dascomputers.com/ https://www.systemf3.com/ https://www.visitguanacaste.com/ https://www.independentnepa.com/ https://www.theobooks.org/ https://www.charlieshd.com/ https://www.robertcatkinson.com/ https://www.lechevart.com/ https://www.conkerco.com/ https://www.postgal.com/ https://www.drharoldlong.com/ https://www.blackmenvent.com/ https://www.paranormalresearchonline.com/ http://www.joshkrischer.com/ https://www.riccmho.org/ https://www.iflorabella.com/ https://www.marcellatracco.com/ https://www.juliehutchinson.com/ https://www.fiestadocumentary.com/ https://prakerja.cybersacademy.id/uk/sgacor https://jurnal-fastek.ikopin.ac.id/styles/ http://rodaberita.id/wp-content/botakempire/ https://rodaberita.id/wp-content/empire88/ https://rodaberita.id/wp-content/uncleempire/ https://univ.ikopin.ac.id/wp-content/uncleempire/ https://univ.ikopin.ac.id/wp-content/indobet11/ https://univ.ikopin.ac.id/wp-content/empire88/ https://univ.ikopin.ac.id/wp-content/botak-empire/ https://rodaberita.id/wp-content/indobet11 Botak Empire
Maxwin Botak Empire
Botak Empire Scatter
Daftar Botak Empire
Botak Empire Rekomendasi
Botak Empire Menang
Botak Empire Akun Pro
Scatter Botak Empire
Botak Empire Deposit Receh
Empire88 Slot 4D
Botak Empire Alternatif
https://sakairesources1.ug.edu.gh/uncle-empire https://glodokplaza.com/wp-content/uploads/botak-empire/ https://glodokplaza.com/wp-content/uploads/indobet11/ https://ff.universitasypib.ac.id/wp-content/theme/botak-empire/ https://elearn.nli.gov.mn/naga-empire/ https://dkonveksi.com/ https://elearn.nli.gov.mn/uncle-empire/ https://expressshoerepairnyc.com/wp-content/botak-empire/ https://www.shidokan.org.uk/naga-empire/ https://nagaempire-naga.tumblr.com/ https://ies.edu.vn/wp-content/uncle-empire/ https://glodokplaza.com/wp-content/uncle-empire https://golfdebeaune.com/uncle-empire
Volume  Number 

previous article next article

Research articles

ScienceAsia (): 49-55 |doi: 10.2306/scienceasia1513-1874...049


Model checking the DNS under DNS cache-poisoning attacks using SPIN


Wei˙Zhanga,b,*, Meihong˙Yanga, Xinchang˙Zhanga, Huiling˙Shia

 
ABSTRACT:     Domain name system (DNS) security has garnered substantial interest due to DNS cache-poisoning attacks. In this article, a model checking method is employed to verify the security of the DNS protocol, especially when it is under DNS cache-poisoning attacks. The DNS protocol is first translated into a simpler model that preserves all the attack behaviour to be verified. Extended finite state machine models are given and represented in PROMELA which can be identified by SPIN; and then the whole process of model checking is proposed. The initial results on verification of the DNS under DNS cache-poisoning attacks using SPIN are also proposed. From the experimental results it can be seen that the security of DNS should be carefully considered.

Download PDF

48 Downloads 1699 Views


a Shandong˙Key˙Laboratory˙of˙Computer˙Networks, Shandong˙Computer˙Science˙Centre (National˙Supercomputer˙Centre˙in˙Jinan), Jinan˙250000, China
b College˙of˙Information˙Science˙and˙Engineering, Shandong˙University˙of˙Science˙and˙Technology, Qingdao˙266510, China

* Corresponding author, E-mail: wzhang@sdas.org

Received 31 Aug 2014, Accepted 20 Jul 2016