direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

All publications

Predicting the DNSSEC overhead using DNS traces
Citation key ADF-PDODT-06
Author Ager, Bernhard and Dreger, Holger and Feldmann, Anja
Title of Book Proceedings of the 40th Conference on Information Sciences and Systems
Pages 1484–1489
Year 2006
DOI http://dx.doi.org/10.1109/CISS.2006.286699
Month March
Abstract Even though the key ideas behind DNSSEC have been introduced quite some time ago DNSSEC has not yet seen large scale deployment. This is in large part due to the anticipated overhead of DNSSEC. While the overheads have been reduced by the introduction of the delegation signer model [1], it is still not clear if they are bearable. Therefore, we in this paper examine the actual overheads of DNSSEC. We first examine how the packet sizes of a DNS trace increase if DNSSEC would be used. Then we explore the CPU and memory overheads imposed by DNSSEC by replaying a DNS client trace in a testbed initialized with roughly 100,000 zones.
Link to publication Download Bibtex entry

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Auxiliary Functions