Week-8

WEEK NO.: 8   DATE: 2 May 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
They will suggest the DNS scheme to solve the problem in this study.

 

The key goal of this study is to ensure that they have enough security from cyber-attacks.

 

DNSTSM is the tool that is used to gather trustworthy data.

 

Algorithms are used to identify any problems or attacks in the DNS system that are ongoing or have occurred.

 

ISSUES
DESCRIPTION DATE RESULT FINISHED
They will run into the dilemma where their current solution is unable to find a solution.

 

2 May 2021s They would also have to deal with the issue of blockchain expansion.

 

Yes

Week-7

WEEK NO.: 7   DATE: 27 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
In this research, they will propose the DNS system to solve the problem.

 

The main aim of this research is that they achieve the proper protection against cyber-attacks. The method which is used for collecting the trusted data is DNSTSM. Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system.
ISSUES
DESCRIPTION DATE RESULT FINISHED
They will face the problem that their existing solution cannot find the solution.

 

27 April 2021 They will also face the problem of expansion of the blockchain. Yes

Week-6

WEEK NO.: 6   DATE: 17 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
Improves many faults and issues which are faced in this research as they proposed the DNS Cache resources.

 

 

Prior aim of this research is that they achieve the proper protection against cyber-attacks. The method which is used for collecting the trusted data is DNSTSM. Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system.
ISSUES
DESCRIPTION DATE RESULT FINISHED
The problems which are faced by the using the previous techniques and method is the confliction of IP address.

 

 

17 April 2021 They didn’t improve the room in the ability to resist positioning the cache attacks. Yes

Week-5

WEEK NO.: 5   DATE: 11 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
This proposed scheme contributes as the DNS is used for the consortium blockchain for the P2P network collaboration scheme.

 

 

To find out the solution for the protection from the malicious attacker as the attacker can access the DNS server easily. a new method is developed that is used for the evaluation of node credibility in the proposed model. The DNSTSM method is used to provide the validation of the data between the multiple servers in the peer network.

 

ISSUES
DESCRIPTION DATE RESULT FINISHED
The registration of new names is not controlled by the applications. This may lead to cybersquatting.

 

11 April 2021 The main issues get separated from the network that has the validity by this architecture. Yes
Step 1 of 2
Please sign in first
You are on your way to create a site.