Secure glue: A cache and zone transfer considering automatic renumbering

Y Jin, K Fujikawa, H Harai… - 2015 IEEE 39th Annual …, 2015 - ieeexplore.ieee.org
Domain Name System (DNS) is the most widely used name resolution system for computers
and services in the Internet. The number of domain name registrations is reaching 276 …

Adaptive deterrence of dns cache poisoning

SY Chau, O Chowdhury, V Gonsalves, H Ge… - Security and Privacy in …, 2018 - Springer
Many long-lived network protocols were not designed with adversarial environments in
mind; security is often an afterthought. Developing security mechanisms for protecting such …

A CDN-based domain name system

Z Qin, C Xiao, Q Wang, Y Jin, A Kuzmanovic - Computer communications, 2014 - Elsevier
To enhance end-user experiences, Content Distribution Networks (CDNs) effectively exploit
the Domain Name System (DNS) to redirect end-users to close-by content replicas over …

[PDF][PDF] D-DNS: towards re-decentralizing the DNS

A Hounsel, K Borgolte, P Schmitt… - CoRR, abs …, 2020 - kevin.borgolte.me
Nearly all Internet services rely on the Domain Name System (DNS) to resolve human-
readable names to IP addresses. However, the content of DNS queries and responses can …

DNS-tunneling-detection Method by Monitoring DNS Subdomain Length for General Usage

S Sugasawa, Y Shibahashi… - 2022 IEEE 11th …, 2022 - ieeexplore.ieee.org
Attackers have been using Domain Name System (DNS) tunneling, which exploits the DNS,
as a covert communication to leak confidential information and establish command and …

Name dependency and domain name resolution risk assessment

H Xu, Z Zhang, J Yan, T Chai - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
The Domain name system (DNS) is crucial to Internet services. Previous studies have
pointed out that the name dependency in domain name resolution poses a risk to the …

Ports distribution management for privacy protection inside local domain name system

F Song, W Quan, T Zhao, H Zhang, Z Hu… - Proceedings of the 8th …, 2016 - dl.acm.org
Domain Name System (DNS) had been recognized as an indispensable and fundamental
infrastructure of current Internet. However, due to the original design philosophy and easy …

[HTML][HTML] An elastic and resiliency defense against DDoS attacks on the critical DNS authoritative infrastructure

Z Wang - Journal of Computer and System Sciences, 2019 - Elsevier
The critical DNS authoritative infrastructure is increasingly targeted by DDoS attacks in
recent years. This paper proposes a novel mitigating solution to DDoS attacks on DNS …

Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox

Y Takanashi, S Kimura - 2023 Eleventh International …, 2023 - ieeexplore.ieee.org
DNS over HTTPS (DoH) enhances user privacy by encrypting DNS communications over
HTTPS instead of plaintext. When all DNS messages are sent in plaintext, DNS queries can …

Detecting data exfiltration over encrypted DNS

J Steadman, S Scott-Hayward - 2022 IEEE 8th International …, 2022 - ieeexplore.ieee.org
Data breaches linked to individual and company information are exposed on an almost daily
basis. With increasing media attention and visibility of this security issue, users are …