Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains

G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou… - Proceedings of the …, 2023 - dl.acm.org
Non-Existent Domain (NXDomain) is one type of the Domain Name System (DNS) error
responses, indicating that the queried domain name does not exist and cannot be resolved …

[PDF][PDF] Blockstack: Design and implementation of a global naming system with blockchains

M Ali, J Nelson, R Shea, MJ Freedman - Last visited on, 2016 - the-blockchain.com
Cryptocurrency blockchains like Bitcoin and Namecoin and their respective P2P networks
have seen significant adoption in the past few years, and show promise as naming systems …

A comprehensive measurement-based investigation of DNS hijacking

R Houser, S Hao, Z Li, D Liu, C Cotton… - … on Reliable Distributed …, 2021 - ieeexplore.ieee.org
Attacks against the domain name system (DNS) have long plagued the Internet, requiring
continual investigation and vigilance to prevent the abuse of this critical infrastructure …

[PDF][PDF] Using blockchain technology and smart contracts for access management in IoT devices

R Bagchi - Computer Science, 2017 - helda.helsinki.fi
Blockchains have been around for 9 years now, with the introduction of Bitcoins by Satoshi
Nakamoto. While there is still a lot to learn about the blockchain technology and its potential …

Addressing ZSM Security Issues with Blockchain Technology

M Xevgenis, DG Kogias, PA Karkazis, HC Leligou - Future Internet, 2023 - mdpi.com
Undoubtedly, we are witnessing a new era of computer networks that aspire to support
modern demanding applications by providing the highest Quality of Experience (QoE) to the …

Thirty years of DNS insecurity: Current issues and perspectives

G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …

Exploring the attack surface of blockchain: A comprehensive survey

M Saad, J Spaulding, L Njilla… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Improving PKI, BGP, and DNS using blockchain: A systematic review

FS Ali, A Kupcu - arXiv preprint arXiv:2001.00747, 2020 - arxiv.org
The Internet has many backbone components on top of which the whole world is connected.
It is important to make these components, like Border Gateway Protocol (BGP), Domain …

Understanding the threats to DNS and how to secure it

C Marrison - Network Security, 2015 - Elsevier
Essentially the address book of the Internet, the Domain Name System (DNS) is a mission-
critical infrastructure used by all organisations and without which they cannot function. Yet …

A blockchain ontology for DApps development

L Besancon, CF Da Silva, P Ghodous, JP Gelas - IEEE Access, 2022 - ieeexplore.ieee.org
Decentralized Applications, or DApps, provide distributed trusted applications that use
blockchains. They are often composed of several services, such as transaction scalability …