DocumentCode :
3285915
Title :
Predicting the DNSSEC overhead using DNS traces
Author :
Ager, Bernhard ; Dreger, Holger ; Feldmann, Anja
Author_Institution :
Technische Univ. Munchen
fYear :
2006
fDate :
22-24 March 2006
Firstpage :
1484
Lastpage :
1489
Abstract :
Even though the key ideas behind DNSSEC have been introduced quite some time ago DNSSEC has not yet seen large scale deployment. This is in large part due to the anticipated overhead of DNSSEC. While the overheads have been reduced by the introduction of the delegation signer model, it is still not clear if they are bearable. Therefore, we in this paper examine the actual overheads of DNSSEC. We first examine how the packet sizes of a DNS trace increase if DNSSEC would be used. Then we explore the CPU and memory overheads imposed by DNSSEC by replaying a DNS client trace in a testbed initialized with roughly 100,000 zones.
Keywords :
Internet; client-server systems; distributed databases; query processing; CPU overhead; DNS client traces; DNSSEC overhead prediction; Internet; delegation signer model; distributed database; memory overhead; packet sizes; Bandwidth; Distributed databases; Internet; Large-scale systems; Network servers; Public key; Public key cryptography; Testing; Traffic control; Web server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Sciences and Systems, 2006 40th Annual Conference on
Conference_Location :
Princeton, NJ
Print_ISBN :
1-4244-0349-9
Electronic_ISBN :
1-4244-0350-2
Type :
conf
DOI :
10.1109/CISS.2006.286699
Filename :
4068040
Link To Document :
بازگشت