• Title/Summary/Keyword: Internet Domain Name

Search Result 65, Processing Time 0.024 seconds

The Law and Case Study on the Domain Name Protection (도메인네임의 보호(保護)에 관한 법리(法理) 및 사례연구(事例硏究))

  • Kim, Yeon-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.169-209
    • /
    • 2001
  • As a domain name can be registered simply by filing an application for registration, disputes over the domain name between the holder of domain name and the holder of trademark increased. Since the holder of trademark who was late for registering domain name is willing to pay for the return of domain name, cybersquatters increased. Cybersqatters are not genuine users of the Internet. This article is to compare the construction of law by American Courts and by Korean Courts and to assert the creation of the law similar to the law of US as to anti-cybersqatting. American Courts applied the Trademark Act and the Anti-Dilution Act to resolve the disputes over domain name. To apply the Trademark Act, the Court required the plaintiffs to prove that the goods or the services expressed by the domain name should be identical or similar to the goods or the services represented by the trademark. However, there were many cases where the holder of domain name used it for the goods or the services irrelevant to those of the holder of trademark. Also, the Anti-Dilution Act could not successfully protect the holder of trademark from cybersquatters because it required that the trademark should be famous or distinctive. As a result, the US promulgated a new law which is designed to prohibit cybersquatters from being free of sanction by the existing laws. Korea Courts applied the Trademark Act and the Unfair Competition Prohibition Act to the cases disputing domain name. Likewise in the US, Korean Courts must cope with the issue of identity of the goods or the services, and the famousness or distinctiveness of trademark. The Courts hesitate to give a winning judgement to the holder of trademark simply because the domain name of alleged violator confused the trademark. Some scholars advocate the broadening of construction of the Unfair Competition Prohibition Act to illegalize cybersquatting but it is beyond the meaning of the law. Accordingly, it is a time to make a law similar to the Anti-Cybersquatting Act of the US. The law must be a fair and reasonable compromise to resolve the collision between system of registration of domain name and the system of registration of trademark. Some commentators advocate that the registration of domain name should be examined just as the one of trademark and to facilitate it, the Patent and Trademark Office should have jurisdiction of registration of domain name. But it abandons the distinction of domain name and trademark and results in obstructing e-commerce. By adopting the Anti-Cybersqatting Act, we can prohibit it. In other cases, we get a reasonable adjustment between the holder of domain name and the holder of trademark through the Trademark Act and the Unfair Competition Prohibition Act.

  • PDF

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Cybersquatting-related Precedent Tendency (사이버스쿼팅 관련 판례 동향)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.221-227
    • /
    • 2013
  • Cybersquatting is a type of conflicts between a trademark and a domain, and refers to "behaviors of registering, retaining, transferring, and using the identical or similar domain name in bad faith for the profit from the mark such as trademark". That is, it is preoccupying behavior to abuse the fact that the domain name in the Internet can be freely registered on a first come, first served basis and can't duplicate. Though this should be prohibited, given the reality that most of our daily lives are based in the Internet, this is creating many problems in IT environment beyond social structure in rule of law. Therefore, this study has the purpose that it provides cybersquatting-related information and suggests legislative implications hereafter through the analysis of cybersquatting-related precedent from the Supreme Court.

A Reliability Improvement Technique of DNS Services Based on Anycast (Anycast 기술을 통한 신뢰적 향상 기법의 DNS 서비스에 관한 연구)

  • Kim, Bo Seung;Kim, Jeong Jai;Kim, Kyung Min;Park, Chan Kil;Shin, Yong Tae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.95-105
    • /
    • 2010
  • DNS(Domain Name System) is a huge distributed database that converts host name to IP address. We are expecting the importance of DNS is more increased because many Internet application services appear according to the continuous increase of Internet users and nearly all the Internet application services use DNS. To prevent the interruption of DNS service, DNS server is configured with primary DNS server and a secondary DNS server which takes the place of primary DNS server in case of the service interruption. But this scheme is difficult for providing DNS service constantly in case of DDoS attack, which brings about much network load or network problems in DNS server group. Therefore, This paper proposed the scheme to locally distribute load of DNS server, and the use of address system to group the distributed DNS servers. Also, it proposed the authentication scheme of the correspondent server in case the server is changed in DNS server group having grouping address. In this paper, it is shown that the prosed scheme guarantees the improved service reliability with maintaining the present service performance through the evaluation. Through this, we can expect the high improved DNS service can be provided in the Internet environment in the future.

An Architecture and Experimentation for Efficient and Reliable Name Service Systems (효율적이고 신뢰성 있는 네임 서비스 시스템의 구조 및 실험)

  • 심영철;박준철;강호석;이준원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.375-390
    • /
    • 2004
  • Domain Name System(DNS), one of the most important Internet services, handles mapping from host names to Internet addresses and vice versa, and precedes many Internet applications such as Web, e-mail, file transfer, etc. In this paper, we propose a structural design of a generic name server system providing name services for a huge domain for the purpose of improving the performance as well as the reliability of the system. We demonstrate the validity of the design by implementing and running a testbed system. Our testbed employs a couple of master name sowers for distributing the service overhead over two, rather than one, servers and for achieving high availability of the system as a whole. We suggest the use of dynamic update to add and delete records from a zone for which the name server has authority. The slave name servers located remotely then get a new, updated copy of the zone via incremental zone transfers(IXFRs). The experiments with the implemented testbed show that the proposed structure would easily manage increasing demands on the server power, and be highly available in the face of transient faults of a module in the system.

Design and Implementation of a Forwarding Server for Using the Logical URL (논리적 URL 사용을 위한 포워딩 서버의 설계 및 구현)

  • 양희재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.239-249
    • /
    • 2003
  • A lot many WWW sites are come into the world more and more as Web is considered as the unified Internet information tool. The location of each site or resource is usually specified by a physical URL, which is often too long to remember and tends to raise difficulty to show the aim of the site intuitively by seeing it. Since any person or organization can get his/her own domain name easily, it is more desirable to use a logical URL with the domain name which can be chosen more compact to remember and meaningful to represent the ultimate intention of the site. This paper presents an implementation of a URL forwarding server which forwards a URL to another, so that a WWW site can use a logical URL instead of a physical one. The server consists of a domain mapper which uses the redirection transaction of the HTTP protocol, and a name server based on the HIND. The paper shows how the interaction between the domain mapper and the name sever can make forwarding possible and describes its implementation in detail. Experimental results shows that the overhead incurred by URL forwarding is negligible compared to the typical delay of current Internet traffic condition.

Design and Implementation of DNS Name Autoconfiguration for Internet of Things Devices (사물인터넷 디바이스를 위한 DNS 네임 자동설정의 설계 및 구현)

  • Lee, Sejun;Jeong, Jaehoon
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1441-1451
    • /
    • 2015
  • As one of the most spotlighted research areas, these days, the Internet of Things (IoT) aims to provide users with various services through many devices. Since there exist so many devices in IoT environments, it is inefficient to manually configure the domain name system (DNS) names of such devices. Thus, for IPv6-based IoT environments, this paper proposes a scheme called the DNS Name Autoconfiguration (DNSNA) that autoconfigures an IoT device's DNS name and manages it. In the procedure for generating and registering an IoT device's DNS name, the standard protocols of the Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through a DNS server, it generates less traffic than multicast-based mDNS (Multicast DNS) which is a legacy DNS application for the DNS name service in the smart home. Thus, the proposed scheme is more appropriate in multi-hop IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenarios, such as smart home and smart road. It also explains the implementation and testing of the proposed scheme in the smart grid.

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

Internet상에서의 지적재산권 -유명 상표의 Domain Name등록과 관련한 지적재산권법상의 문제-

  • 전용진
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.10a
    • /
    • pp.229-233
    • /
    • 1999
  • Internet사용자는 도메인네임을 이용하여 웹사이트에 접속하게 되기 때문에 웹사이트의 성격을 가장 간결하게 잘 나타내어서 일반 소비자들이 기억하기 쉬운 도메인네임을 등록하는 일은 매우 중요한 일입니다. 도메인네임을 선택함에 있어서, 보통은 자신의 상호, 상표, 서비표 혹은 이들의 약자를 선호하게 되는 것이 일반적 경향입니다. (중략)

  • PDF

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.