WEEK NO.: 8 | DATE: 2 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
They will suggest the DNS scheme to solve the problem in this study.
|
The key goal of this study is to ensure that they have enough security from cyber-attacks.
|
DNSTSM is the tool that is used to gather trustworthy data.
|
Algorithms are used to identify any problems or attacks in the DNS system that are ongoing or have occurred.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
They will run into the dilemma where their current solution is unable to find a solution.
|
2 May 2021s | They would also have to deal with the issue of blockchain expansion.
|
Yes |
Month: May 2021
Week-7
WEEK NO.: 7 | DATE: 27 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
In this research, they will propose the DNS system to solve the problem.
|
The main aim of this research is that they achieve the proper protection against cyber-attacks. | The method which is used for collecting the trusted data is DNSTSM. | Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
They will face the problem that their existing solution cannot find the solution.
|
27 April 2021 | They will also face the problem of expansion of the blockchain. | Yes |
Week-6
WEEK NO.: 6 | DATE: 17 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Improves many faults and issues which are faced in this research as they proposed the DNS Cache resources.
|
Prior aim of this research is that they achieve the proper protection against cyber-attacks. | The method which is used for collecting the trusted data is DNSTSM. | Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The problems which are faced by the using the previous techniques and method is the confliction of IP address.
|
17 April 2021 | They didn’t improve the room in the ability to resist positioning the cache attacks. | Yes |
Week-5
WEEK NO.: 5 | DATE: 11 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
This proposed scheme contributes as the DNS is used for the consortium blockchain for the P2P network collaboration scheme.
|
To find out the solution for the protection from the malicious attacker as the attacker can access the DNS server easily. | a new method is developed that is used for the evaluation of node credibility in the proposed model. | The DNSTSM method is used to provide the validation of the data between the multiple servers in the peer network.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The registration of new names is not controlled by the applications. This may lead to cybersquatting.
|
11 April 2021 | The main issues get separated from the network that has the validity by this architecture. | Yes |