DocumentCode :
2411101
Title :
Comparative Analysis of ccTLD Security Policies
Author :
Umana, Collins ; Zavarsky, Pavol ; Ruhl, Ron ; Lindskog, Dale ; Ake-Johnson, Oluwatoin Gloria
Author_Institution :
Inf. Syst. Security Manage., Concordia Univ. Coll. of Alberta, Edmonton, AB, Canada
fYear :
2010
fDate :
20-22 Aug. 2010
Firstpage :
926
Lastpage :
933
Abstract :
This paper analyzes and compares country code Top Level Domain (ccTLD) administration policies. The study investigated the effect of security-related components of these policies on the ccTLD security to determine whether the strength of the security components had any significant effect on the rate of malicious activities in the domains. To achieve this, thirty ccTLDs were selected based on the Human Development Index (HDI), and the administrative policies of the ccTLDs were analyzed and compared for the content of security-related components. The analysis shows that 40% of the ccTLDs have security policies that can be classified as strong, 47% weak, and 13% have no domain security policies. We verified the hypothesis that the ccTLDs of countries with high HDI tend to have strong domain security-related policies, while ccTLDs of countries with medium and low HDI have weak or non-existent policies. The data analysis also confirmed that the lack of enforceable, strong security-related policies in ccTLD administration results in Internet domains that are vulnerable to abuses. The analysis shows that the number of malicious ccTLD domains (N) is inversely proportional to the rate of attacks (P) for ccTLDs with strong security-related policies, and directly proportional to the rate of attacks for ccTLDs with weak security-related policies. The paper also shows no significant correlation between involvement of governments in the domain registration process and the rate of attacks. The importance of the hybrid governance model that combines bottom-up and top-down security administration of the ccTLDs is emphasized in the paper.
Keywords :
data analysis; public administration; public information systems; security of data; social aspects of automation; bottom-up security administration; ccTLD security policies; country code top level domain administration policies; data analysis; human development index; malicious ccTLD domains; top-down security administration; Australia; Government; Internet; Law; Registers; Security; ccTLD; domain security; security policies;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Social Computing (SocialCom), 2010 IEEE Second International Conference on
Conference_Location :
Minneapolis, MN
Print_ISBN :
978-1-4244-8439-3
Electronic_ISBN :
978-0-7695-4211-9
Type :
conf
DOI :
10.1109/SocialCom.2010.137
Filename :
5591418
Link To Document :
بازگشت