WEEK NO.: 8 | DATE: 2 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
They will suggest the DNS scheme to solve the problem in this study.
|
The key goal of this study is to ensure that they have enough security from cyber-attacks.
|
DNSTSM is the tool that is used to gather trustworthy data.
|
Algorithms are used to identify any problems or attacks in the DNS system that are ongoing or have occurred.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
They will run into the dilemma where their current solution is unable to find a solution.
|
2 May 2021s | They would also have to deal with the issue of blockchain expansion.
|
Yes |
Author: rameshbandlamudi9999
Week-7
WEEK NO.: 7 | DATE: 27 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
In this research, they will propose the DNS system to solve the problem.
|
The main aim of this research is that they achieve the proper protection against cyber-attacks. | The method which is used for collecting the trusted data is DNSTSM. | Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
They will face the problem that their existing solution cannot find the solution.
|
27 April 2021 | They will also face the problem of expansion of the blockchain. | Yes |
Week-6
WEEK NO.: 6 | DATE: 17 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Improves many faults and issues which are faced in this research as they proposed the DNS Cache resources.
|
Prior aim of this research is that they achieve the proper protection against cyber-attacks. | The method which is used for collecting the trusted data is DNSTSM. | Algorithms are used to find out all the issues or attacks that are occurring or happened in the DNS system. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The problems which are faced by the using the previous techniques and method is the confliction of IP address.
|
17 April 2021 | They didn’t improve the room in the ability to resist positioning the cache attacks. | Yes |
Week-5
WEEK NO.: 5 | DATE: 11 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
This proposed scheme contributes as the DNS is used for the consortium blockchain for the P2P network collaboration scheme.
|
To find out the solution for the protection from the malicious attacker as the attacker can access the DNS server easily. | a new method is developed that is used for the evaluation of node credibility in the proposed model. | The DNSTSM method is used to provide the validation of the data between the multiple servers in the peer network.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The registration of new names is not controlled by the applications. This may lead to cybersquatting.
|
11 April 2021 | The main issues get separated from the network that has the validity by this architecture. | Yes |
Week-4
WEEK NO.: 4 | DATE: 03 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
They proposed the DNS (Domain Name System). For resolving the response problems which gets in the querying and sending.
|
They provide the different methods and techniques for getting effective results. | Existing method is used as an imperfect incentive method and low credibility of the DNS. | Many algorithms are used for providing the node signature or digital signature. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
Faced the issues of message reliability issues in the trusting sharing models. Issues of the block chain expansions that the researcher has faced in the research.
|
03 April 2021 | User can easily trust the solution which is coming from the DNS host. Attacker easily inserts the fake IP address into the DNS server. | Yes |
Week-3
WEEK NO.: 3 |
|
29th March 2020 |
|
|
|||
PLANNING |
|||
MILESTONE: |
PLANNED |
ACTUAL |
COMMENT |
Provide the different methods and techniques for getting effective results, but the researchers didn’t get effective results; thus, they proposed different methods and techniques. |
They achieve the proper protection against cyber attacks |
They proposed the DNS getting the high credibility of results in the domain name resolutions. |
They proposed the DNS DNSTSM, which is used for satisfying the domain name resolution situation for the high-reliability needs & low latency |
ISSUES |
|||
DESCRIPTION |
DATE |
RESULT |
FINISHED |
there are some issues from the early techniques and models which are used for protection from cyber-attacks which leads to the strong demand for IP addresses |
29th March 2020 |
Existing solutions cannot find the solutions that internal attacks and they didn’t improve the room in the ability to resist positioning the cache attacks |
Yes |
Week 2
NAME: Ramesh Bandlamudi | |||
PROJECT TITLE: Distributed DNS (Domain Name System) using Blockchain | |||
WEEK NO.: 2 | DATE:16 March 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
The Domain Name System is used for the important protocol on the internet, which maintains the proper interactive mapping relation among the IP and DNS. | I make the DNS for resolving the issues and the trust response at the time of receiving the queries. | In this week, we make collect the system equipment for making the system, and it makes ensures that users can access that the system. | The use of blockchain technology improves the DNS. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The reliability issues in the system are occurring, and that makes the system inefficient. | 16 March 2021 | Blockchain technology improves system reliability and the other minor issues which the researcher has faced. | Yes |
Project brief, blog setup
My name is Ramesh Bandlamudi and my student ID is 11705378. I am from south India Amaravathi. After completing my schooling, I persuaded my Bachelor’s in Computer Science from Vignan University, Guntur. After completing my Bachelor’s, I came to Australia for Master’s of Information Technology. Currently, I am pursuing a Master’s of Information Technology specialization in Networking.
According to my specialization, the selected topic is “Distributed DNS (Domain Name System) using Blockchain”.The aim of this research is that they provide the different methods and techniques for getting effective results, but the researchers didn’t get effective results; thus, they proposed different methods and techniques. The prior aim of this research is that they achieve the proper protection against cyber attacks. For this, they proposed the DNS getting the high credibility of results in the domain name resolutions. And this proposed scheme contributes as the DNS is used for the consortium blockchain for the P2P network collaboration scheme for the forgery-detections as it is created as the identify base access for the control system for the valuation of the potential issues or threads through the untrusted nodes. The other contribution of this is that they used it for calculating the credibility of the DNS resolution node. In this research, they used the different method and techniques which are used for maintaining the proper results in the field of research. They proposed the DNS DNSTSM, which is used for satisfying the domain name resolution situation for the high-reliability needs & low latency (El Houda et al., 2020).
Hello world!
Welcome to your brand new blog at CSU Thinkspace .
For Guides to getting started check out:
For support visit: http://thinkspace.csu.edu.au/support/.