Please use this identifier to cite or link to this item: http://hdl.handle.net/2381/33171
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRadwan, Marwan-
dc.contributor.authorHeckel, Reiko-
dc.date.accessioned2015-10-02T09:47:21Z-
dc.date.available2015-10-02T09:47:21Z-
dc.date.issued2015-04-10-
dc.identifier.citationElectronic Proceedings in Theoretical Computer Science 181, 2015, pp. 113-128, 2015en
dc.identifier.issn2075-2180-
dc.identifier.urihttp://eptcs.web.cse.unsw.edu.au/paper.cgi?GAM2015.8en
dc.identifier.urihttp://arxiv.org/abs/1504.02615en
dc.identifier.urihttp://hdl.handle.net/2381/33171-
dc.descriptionIn Proceedings GaM 2015, arXiv:1504.02448en
dc.description.abstractThe Domain Name System (DNS) is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.en
dc.language.isoenen
dc.relation.urihttp://arxiv.org/abs/1504.02615v1-
dc.rightsCopyright © M. Radwan & R. Heckel, 2015. All rights reserved.en
dc.subjectcs.NIen
dc.subjectcs.NIen
dc.subjectcs.CRen
dc.titleDetecting and Refactoring Operational Smells within the Domain Name Systemen
dc.typeJournal Articleen
dc.identifier.doi10.4204/EPTCS.181.8-
dc.description.statusPeer-revieweden
dc.description.versionPost-printen
pubs.organisational-group/Organisationen
pubs.organisational-group/Organisation/COLLEGE OF SCIENCE AND ENGINEERINGen
pubs.organisational-group/Organisation/COLLEGE OF SCIENCE AND ENGINEERING/Department of Computer Scienceen
Appears in Collections:Published Articles, Dept. of Computer Science

Files in This Item:
File Description SizeFormat 
1504.02615v1.pdfPost-review (final submitted)1.42 MBAdobe PDFView/Open


Items in LRA are protected by copyright, with all rights reserved, unless otherwise indicated.