Encrypted DNS--> privacy? A traffic analysis perspective

S Siby, M Juarez, C Diaz, N Vallina-Rodriguez… - arXiv preprint arXiv …, 2019 - arxiv.org
Virtually every connection to an Internet service is preceded by a DNS lookup which is
performed without any traffic-level protection, thus enabling manipulation, redirection …

Characterizing privacy leakage of public wifi networks for users on travel

N Cheng, XO Wang, W Cheng… - 2013 Proceedings …, 2013 - ieeexplore.ieee.org
Deployment of public wireless access points (also known as public hotspots) and the
prevalence of portable computing devices has made it more convenient for people on travel …

[HTML][HTML] DoH tunneling detection system for enterprise network using deep learning technique

TA Nguyen, M Park - Applied Sciences, 2022 - mdpi.com
In spite of protection mechanisms for Domain Name System (DNS), such as IP blacklist and
DNS Firewall, DNS still has privacy issues in reality, since DNS is a plain-text protocol …

On the impact of DNS over HTTPS paradigm on cyber systems

K Bumanglag, H Kettani - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The Domain Name System (DNS) protocol has been in use for over thirty years. As the
primary method of resolving domain names to Internet Protocol (IP) addresses, it is a …

A comprehensive study of {DNS-over-HTTPS} downgrade attack

Q Huang, D Chang, Z Li - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
DNS-over-HTTPS (DoH) is one major effort to protect DNS confidentiality and integrity,
which has been deployed by most of the popular browsers. However, we found this effort …

An end-middle-end approach to connection establishment

S Guha, P Francis - Proceedings of the 2007 conference on Applications …, 2007 - dl.acm.org
The current model for flow establishment in the Internet: DNS Names, IP addresses, and
transport ports, is inadequate. Not all of the problem is due to the small IPv4 address space …

I know where you are and what you are sharing: exploiting p2p communications to invade users' privacy

S Le Blond, C Zhang, A Legout, K Ross… - Proceedings of the 2011 …, 2011 - dl.acm.org
In this paper, we show how to exploit real-time communication applications to determine the
IP address of a targeted user. We focus our study on Skype, although other real-time …

Large scale analysis of doh deployment on the internet

S García, J Bogado, K Hynek, D Vekshin… - … on Research in …, 2022 - Springer
DNS over HTTPS (DoH) is one of the standards to protect the security and privacy of users.
The choice of DoH provider has controversial consequences, from monopolisation of …

Understanding the privacy implications of ecs

P Kintis, Y Nadji, D Dagon, M Farrell… - Detection of Intrusions …, 2016 - Springer
The edns-client-subnet (ECS) is a new extension for the Domain Name System (DNS) that
delivers a “faster Internet” with the help of client-specific DNS answers. Under ECS …

[PDF][PDF] Understanding the Growth and Security Considerations of ECS.

A Kountouras, P Kintis, A Avgetidis, T Papastergiou… - NDSS, 2021 - cs.stonybrook.edu
The Domain Name System (DNS) is fundamental to communication on the Internet.
Therefore, any proposed changes or extensions to DNS can have profound consequences …