DNS Science
The basis of scientific work is literature research, which can vary in length depending on the topic, time, and skills. This website offers a first overview to find scientific articles, doctoral and master's theses, books, and other works that revolve around the subject of DNS in a broader sense. Sure, there are services like ResearchGate and Google Scholar, but sometimes a curated list is more accessible. Of course, this site is free of charge (please note some works need access through your institution) and does not claim to be complete. Right now, this site covers about 680 works. This list will be updated irregularly. If you have suggestions for new entries, please get in touch by email: works@dnsscience.org.
Date | Author(s) | Title | Title | Type |
---|---|---|---|---|
2024-01 | Li et al. | TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed PacketsDOI: 10.1109/SP54263.2024.00046 | TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets | Proceedings |
2023-12 | Yoon et al. | Delegation of TLS Authentication to CDNs using Revocable Delegated CredentialsDOI: 10.1145/3627106.3627144 | Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials | Proceedings |
2023-12 | Sharif & Beitollahi | Detection of application-layer DDoS attacks using machine learning and genetic algorithmsDOI: 10.1016/j.cose.2023.103511 | Detection of application-layer DDoS attacks using machine learning and genetic algorithms | Journal Article |
2023-12 | Sebastián et al. | Domain and Website Attribution beyond WHOISDOI: 10.1145/3627106.3627190 | Domain and Website Attribution beyond WHOIS | Proceedings |
2023-12 | Kurihara et al. | ODNS: A distributed approach to DNS anonymization with collusion resistance☆DOI: 10.1016/j.comnet.2023.110078 | ODNS: A distributed approach to DNS anonymization with collusion resistance☆ | Journal Article |
2023-12 | Koide et al. | PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain NamesDOI: 10.1145/3627106.3627111 | PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names | Proceedings |
2023-12 | Bovenzi et al. | Blockchain Performance in Industry 4.0: Drivers, use cases, and future directionsDOI: 10.1016/j.jii.2023.100513 | Blockchain Performance in Industry 4.0: Drivers, use cases, and future directions | Journal Article |
2023-12 | Abdelhafez et al. | TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environmentDOI: 10.1016/j.jksuci.2023.101797 | TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment | Journal Article |
2023-11 | Zhu & Qi | Unravelling DNS Performance: A Historical Examination of F-ROOT in Southeast AsiaDOI: 10.48550/arXiv.2311.16545 | Unravelling DNS Performance: A Historical Examination of F-ROOT in Southeast Asia | Journal Article |
2023-11 | Zhang et al. | Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersDOI: 10.1145/3576915.3616647 | Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers | Proceedings |
2023-11 | Zhang et al. | TrustedDomain Compromise Attack in App-in-app EcosystemsDOI: 10.1145/3605762.3624430 | TrustedDomain Compromise Attack in App-in-app Ecosystems | Proceedings |
2023-11 | Xu et al. | TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS AmplifiersDOI: 10.1145/3576915.3616668 | TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers | Proceedings |
2023-11 | Wei et al. | CDN-DF: A Learning-based CDN Domain Name Detection Method with DNS Deep Feature ExtractionDOI: 10.1145/3625156.3625174 | CDN-DF: A Learning-based CDN Domain Name Detection Method with DNS Deep Feature Extraction | Proceedings |
2023-11 | Torrealba Aravena et al. | Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic AnalysisDOI: 10.23919/CNSM59352.2023.10327913 | Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic Analysis | Proceedings |
2023-11 | Theoder et al. | Securing Domain Name Systems with BlockchainDOI: 10.1109/IDSTA58916.2023.10317833 | Securing Domain Name Systems with Blockchain | Proceedings |
2023-11 | Singh Samra & Barcellos | DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at ScaleDNS: 10.1145/3629135 | DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at Scale | Proceedings |
2023-11 | Schwartz, B. | RFC 9461: Service Binding Mapping for DNS ServersDOI: 10.17487/RFC9461 | RFC 9461: Service Binding Mapping for DNS Servers | Internet Specification |
2023-11 | Schwartz et al. | RFC 9460: Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)DOI: 10.17487/RFC9460 | RFC 9460: Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records) | Internet Specification |
2023-11 | Pauly et al. | RFC 9462: Discovery of Designated ResolversDOI: 10.17487/RFC9462 | RFC 9462: Discovery of Designated Resolvers | Internet Specification |
2023-11 | Ma et al. | HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learningDOI: 10.1016/j.ipm.2023.103518 | HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning | Journal Article |
2023-11 | Kaiser et al. | Poster: Longitudinal Analysis of DoS AttacksDOI: 10.1145/3576915.3624382 | Poster: Longitudinal Analysis of DoS Attacks | Proceedings |
2023-11 | He et al. | TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on EthereumDOI: 10.1145/3576915.3623210 | TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum | Proceedings |
2023-11 | Hanna et al. | Performance Evaluation of Secure and Privacy-preserving DNS at the 5G EdgeDOI: 10.1109/MASS58611.2023.00019 | Performance Evaluation of Secure and Privacy-preserving DNS at the 5G Edge | Proceedings |
2023-11 | Gibb et al. | Where on Earth is the Spatial Name System?DOI: 10.1145/3626111.3628210 | Where on Earth is the Spatial Name System? | Proceedings |
2023-11 | De Coninck et al. | URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoTDOI: 10.1145/3628356.3630115 | URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoT | Proceedings |
2023-11 | Chaudhary & Mishra | DDoS attacks in Industrial IoT: A surveyDOI: 10.1016/j.comnet.2023.110015 | DDoS attacks in Industrial IoT: A survey | Journal Article |
2023-11 | Boucadair et al. | RFC 9463: DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)DOI: 10.17487/RFC9463 | RFC 9463: DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR) | Internet Specification |
2023-11 | Boucadair et al. | RFC 9464: Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNSDOI: 10.17487/RFC9464 | RFC 9464: Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS | Internet Specification |
2023-10 | Zheng et al. | Automated Verification of an In-Production DNS Authoritative EngineDOI: 10.1145/3600006.3613153 | Automated Verification of an In-Production DNS Authoritative Engine | Proceedings |
2023-10 | Zhang et al. | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingDOI: 10.48550/arXiv.2310.03202 | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | Research Paper |
2023-10 | Zhang et al. | Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesDOI: 10.1145/3618257.3624839 | Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services | Proceedings |
2023-10 | Suman, O.P. | A Novel Approach for Malicious Domain Classification Based on Dns Traffic Analysis and Machine LearningDOI: 10.2139/ssrn.4592811 | A Novel Approach for Malicious Domain Classification Based on Dns Traffic Analysis and Machine Learning | Research Paper |
2023-10 | Song, H. | Enable Cross-domain QoS for Internet-Scale MetaverseDOI: 10.1109/MetaCom57706.2023.00062 | Enable Cross-domain QoS for Internet-Scale Metaverse | Proceedings |
2023-10 | Sommese & Jonker | Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain NamesDOI: 10.1145/3618257.3624994 | Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names | Proceedings |
2023-10 | Singh, H.P. | Domain Name Disputes and Their Resolution under UDRP Route: A ReviewDOI: 10.14738/abr.612.5786 | Domain Name Disputes and Their Resolution under UDRP Route: A Review | Journal Article |
2023-10 | Pan et al. | PACLASS: A Lightweight Classification Framework on DNS-Over-HTTPSDOI: 10.1109/ICC45041.2023.10279398 | PACLASS: A Lightweight Classification Framework on DNS-Over-HTTPS | Proceedings |
2023-10 | Nosyk et al. | Extended DNS Errors: Unlocking the Full Potential of DNS TroubleshootingDOI: 10.1145/3618257.3624835 | Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting | Proceedings |
2023-10 | Moure-Garrido et al. | Real time detection of malicious DoH traffic using statistical analysisDOI 10.1016/j.comnet.2023.109910 | Real time detection of malicious DoH traffic using statistical analysis | Journal Article |
2023-10 | McQuistin et al. | A First Look at the Privacy Harms of the Public Suffix List10.1145/3618257.3624836 | A First Look at the Privacy Harms of the Public Suffix List | Proceedings |
2023-10 | Liu et al. | Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent DomainsDOI: 10.1145/3618257.3624805 | Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains | Proceedings |
2023-10 | Liu et al. | DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain AnalysisDOI: 10.1109/ICC45041.2023.10279472 | DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis | Proceedings |
2023-10 | Lemogue et al. | Towards Flexible and Compact encoded DNS Messages using CBOR Structures.DOI: 10.1109/IPCCC59175.2023.10253849 | Towards Flexible and Compact encoded DNS Messages using CBOR Structures. | Proceedings |
2023-10 | Jimenez-Berenguel et al. | Characterizing Mobile Applications Through Analysis of DNS TrafficDOI: 10.1145/3616394.3618268 | Characterizing Mobile Applications Through Analysis of DNS Traffic | Proceedings |
2023-10 | Frankston, B. | Forever URLsDOI: 10.1109/MCE.2023.3297925 | Forever URLs | Journal Article |
2023-10 | Du et al. | IRRegularities in the Internet Routing RegistryDOI: 10.1145/3618257.3624843 | IRRegularities in the Internet Routing Registry | Proceedings |
2023-10 | Davis & Calvert | SoK: On Named Content and Inter-domain RoutingDOI: 10.1145/3623565.3623716 | SoK: On Named Content and Inter-domain Routing | Proceedings |
2023-10 | Czybik et al. | Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the WildDOI: 10.1145/3618257.3624827 | Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild | Proceedings |
2023-09 | Zhu & Qi | A Comparative Study of DNS Root Query Performance Between ContinentsDOI: 10.1109/CCCAI59026.2023.00010 | A Comparative Study of DNS Root Query Performance Between Continents | Proceedings |
2023-09 | Zhou et al. | Regional IP Anycast: Deployments, Performance, and PotentialsDOI: 10.1145/3603269.3604846 | Regional IP Anycast: Deployments, Performance, and Potentials | Proceedings |
2023-09 | Zhang et al. | Detection of Data Leakage Based on DNS TrafficDOI: 10.1109/ICPICS58376.2023.10235404 | Detection of Data Leakage Based on DNS Traffic | Proceedings |
2023-09 | Yamamoto et al. | Iterative Resolution with IPv6 Packets FailingDOI: 10.1109/ICCCN58024.2023.10230170 | Iterative Resolution with IPv6 Packets Failing | Proceedings |
2023-09 | Yamamoto et al. | Poster: Evaluation of IPv6-only-Capable Iterative ResolversDOI: 10.1145/3603269.3610850 | Poster: Evaluation of IPv6-only-Capable Iterative Resolvers | Proceedings |
2023-09 | Xiao et al. | Demo: PDNS: A Fully Privacy-Preserving DNSDOI: 10.1145/3603269.3610860 | Demo: PDNS: A Fully Privacy-Preserving DNS | Proceedings |
2023-09 | Wan et al. | Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoderDOI: 10.1109/LCN58197.2023.10223356 | Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder | Proceedings |
2023-09 | Tusa et al. | DNS++: Dynamic Name Resolution with Homomorphic Encryption Based PrivacyDOI: 10.1109/ICCCN58024.2023.10230137 | DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy | Proceedings |
2023-09 | Tu et al. | DNS tunnelling detection by fusing encoding feature and behavioral featureDOI 10.1016/j.cose.2023.103357 | DNS tunnelling detection by fusing encoding feature and behavioral feature | Journal Article |
2023-09 | Thiagarajan et al. | Poster: A Peek Backstage: Organizations in DNS Resolver HierarchiesDOI: 10.1145/3603269.3610870 | Poster: A Peek Backstage: Organizations in DNS Resolver Hierarchies | Proceedings |
2023-09 | Rader et al. | Detecting DoH-Based Data Exfiltration: FluBot Malware Case StudyDOI: 10.1109/LCN58197.2023.10223341 | Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study | Proceedings |
2023-09 | Ma et al. | Exploring False Hard Negative Sample in Cross-Domain RecommendationDOI: 10.1145/3604915.3608791 | Exploring False Hard Negative Sample in Cross-Domain Recommendation | Proceedings |
2023-09 | Liu et al. | A Formal Framework for End-to-End DNS ResolutionDOI: 10.1145/3603269.3604870 | A Formal Framework for End-to-End DNS Resolution | Proceedings |
2023-09 | Li et al. | Evaluating the Quality of Service of the DNS Root Server From the Service ScopeDOI: 10.1109/MICCIS58901.2023.00033 | Evaluating the Quality of Service of the DNS Root Server From the Service Scope | Proceedings |
2023-09 | Kumari & Hoffman | RFC 9476: The .alt Special-Use Top-Level DomainDOI: 10.17487/RFC9476 | RFC 9476: The .alt Special-Use Top-Level Domain | Internet Specification |
2023-09 | Heftrig et al. | Poster: Off-Path DNSSEC Downgrade AttacksDOI: 10.1145/3603269.3610840 | Poster: Off-Path DNSSEC Downgrade Attacks | Proceedings |
2023-09 | Andrews et al. | RFC 9471: DNS Glue Requirements in Referral ResponsesDOI: 10.17487/RFC9471 | RFC 9471: DNS Glue Requirements in Referral Responses | Internet Specification |
2023-09 | Aggarwal & Kumar | An ensemble framework for detection of DNS-Over-HTTPS (DOH) trafficDOI: 10.1007/s11042-023-16956-9 | An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic | Journal Article |
2023-08 | Chen et al. | Multi-View Graph Convolutional Networks with Differentiable Node SelectionDOI 10.1145/3608954 | Multi-View Graph Convolutional Networks with Differentiable Node Selection | Journal Article |
2023-08 | Yazdani et al. | Hazardous Echoes: The DNS Resolvers that Should Be Put on MuteDOI: 10.23919/TMA58422.2023.10198955 | Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute | Proceedings |
2023-08 | Torrealba Aravena et al. | Not all DGAs are Born the Same – Improving Lexicographic based Detection of DGA Domains through AI/MLDOI: 10.23919/TMA58422.2023.10198918 | Not all DGAs are Born the Same – Improving Lexicographic based Detection of DGA Domains through AI/ML | Proceedings |
2023-08 | Rizvi et al. | Defending root DNS servers against DDoS using layered defenses (Extended)DOI 10.1016/j.adhoc.2023.103259 | Defending root DNS servers against DDoS using layered defenses (Extended) | Journal Article |
2023-08 | Ren et al. | Owner name entity recognition in websites based on multiscale features and multimodal co-attention☆DOI 10.1016/j.eswa.2023.120014 | Owner name entity recognition in websites based on multiscale features and multimodal co-attention☆ | Journal Article |
2023-08 | Qiu et al. | Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment RiskDOI: 10.1109/ISCC58397.2023.10217976 | Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk | Proceedings |
2023-08 | Principi et al. | Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network TrafficDOI: 10.1109/CSR57506.2023.10224973 | Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network Traffic | Proceedings |
2023-08 | Peng et al. | A Study on a Full-node Problem of the Domain Name System based on EthereumDOI: 10.1109/ICCE-Taiwan58799.2023.10227070 | A Study on a Full-node Problem of the Domain Name System based on Ethereum | Proceedings |
2023-08 | Ohmori, M. | Let’s Block Encrypted Malicious SitesDOI: 10.1109/COMPSAC57700.2023.00293 | Let’s Block Encrypted Malicious Sites | Proceedings |
2023-08 | More, S. | Trust Scheme Interoperability: Connecting Heterogeneous Trust SchemesDOI 10.1145/3600160.3605046 | Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes | Proceedings |
2023-08 | Mirian et al. | In the Line of Fire: Risks of DPI-triggered Data CollectionDOI 10.1145/3607505.3607526 | In the Line of Fire: Risks of DPI-triggered Data Collection | Proceedings |
2023-08 | Li et al. | Configuration anormaly detection and resolution risk assessment of authoritative domain name serverDOI 10.1016/j.cose.2023.103426 | Configuration anormaly detection and resolution risk assessment of authoritative domain name server | Journal Article |
2023-08 | Li et al. | Research on Optimal Selection Measurement of DNS Root InstanceDOI 10.1109/ACCESS.2023.3307139 | Research on Optimal Selection Measurement of DNS Root Instance | Journal Article |
2023-08 | Li et al. | The Maginot Line: Attacking the Boundary of DNS Caching ProtectionISBN 978-1-939133-37-3 | The Maginot Line: Attacking the Boundary of DNS Caching Protection | Proceedings |
2023-08 | Le Louet et al. | Effects of secured DNS transport on resolver performanceDOI: 10.1109/ISCC58397.2023.10217887 | Effects of secured DNS transport on resolver performance | Proceedings |
2023-08 | Jin & Tomoishi | A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT SystemsDOI: 10.1109/COMPSAC57700.2023.00139 | A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems | Proceedings |
2023-08 | Jiao et al. | CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6DOI: 10.1109/ISCC58397.2023.10218057 | CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6 | Proceedings |
2023-08 | Goertzen & Stebila | Post-Quantum Signatures in DNSSEC via Request-Based FragmentationDOI 10.1007/978-3-031-40003-2_20 | Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation | Proceedings |
2023-08 | Gioacchini et al. | i-DarkVec: Incremental Embeddings for Darknet Traffic AnalysisDOI 10.1145/3595378 | i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis | Journal Article |
2023-08 | Ginesin & Mirkovic | Understanding DNS Query Composition at B-RootDOI 10.48550/arXiv.2308.07966 | Understanding DNS Query Composition at B-Root | Proceedings |
2023-08 | Drury et al. | Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name NotationDOI 10.1145/3600160.3604989 | Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation | Proceedings |
2023-08 | Brown et al. | Augmenting Rule-based DNS Censorship Detection at Scale with Machine LearningDOI 10.1145/3580305.3599775 | Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning | Proceedings |
2023-08 | Allen et al. | Why airdrop cryptocurrency tokens?DOI 10.1016/j.jbusres.2023.113945 | Why airdrop cryptocurrency tokens? | Journal Article |
2023-08 | AbdulGhaffar et al. | An Analysis of DHCP Vulnerabilities, Attacks, and CountermeasuresDOI: 10.1109/BSC57238.2023.10201458 | An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures | Proceedings |
2023-07 | Žiža et al. | DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviourDOI 10.1007/s10207-023-00723-w | DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour | Journal Article |
2023-07 | Zirngibl et al. | A First Look at SVCB and HTTPS DNS Resource Records in the WildDOI 10.1109/EuroSPW59978.2023.00058 | A First Look at SVCB and HTTPS DNS Resource Records in the Wild | Proceedings |
2023-07 | van Dijk et al. | RFC 9432: DNS Catalog ZonesDOI 10.17487/RFC9432 | RFC 9432: DNS Catalog Zones | Internet Specification |
2023-07 | Singh & Kavita | SSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throughput Domain Name SystemDOI: 10.1109/ICACITE57410.2023.10182552 | SSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throughput Domain Name System | Proceedings |
2023-07 | Sheth et al. | Call for Collaboration: DNS IntegrationsDOI 10.1145/3606464.3606471 | Call for Collaboration: DNS Integrations | Proceedings |
2023-07 | Ozery et al. | Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and PreventionDOI 10.48550/arXiv.2307.02614 | Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention | Journal Article |
2023-07 | Osborn & Alan | Web3 Disruption and the Domain Name System: Understanding the Trends of Blockchain Domain Names and the Policy ImplicationsDOI 10.2139/ssrn.4498160 | Web3 Disruption and the Domain Name System: Understanding the Trends of Blockchain Domain Names and the Policy Implications | Research Paper |
2023-07 | Olson et al. | Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO RoutersDOI 10.1145/3586007 | Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers | Journal Article |
2023-07 | Nur, A.Y. | Accuracy and Coverage Analysis of IP Geolocation DatabasesDOI: 10.1109/BalkanCom58402.2023.10167899 | Accuracy and Coverage Analysis of IP Geolocation Databases | Proceedings |
2023-07 | Nosyk et al. | Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying DefensesDOI 10.1109/EuroSPW59978.2023.00067 | Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses | Proceedings |
2023-07 | Naab et al. | Gotta Query 'Em All, Again!: Repeatable Name Resolution with Full Dependency ProvenanceDOI 10.1145/3606464.3606478 | Gotta Query 'Em All, Again!: Repeatable Name Resolution with Full Dependency Provenance | Proceedings |
2023-07 | Munteanu et al. | Enabling Multi-hop ISP-Hypergiant CollaborationDOI 10.1145/3606464.3606487 | Enabling Multi-hop ISP-Hypergiant Collaboration | Proceedings |
2023-07 | Lloyd et al. | Towards more rigorous domain-based metrics: quantifying the prevalence and implications of “Active” DomainsDOI: 10.1109/EuroSPW59978.2023.00066 | Towards more rigorous domain-based metrics: quantifying the prevalence and implications of “Active” Domains | Proceedings |
2023-07 | Huraj et al. | Performance of DNS Over HTTPS Implementation on Low-Power DevicesDOI 10.1007/978-3-031-35317-8_38 | Performance of DNS Over HTTPS Implementation on Low-Power Devices | Proceedings |
2023-07 | Hilbig et al. | security.txt revisited: Analysis of Prevalence and Conformity in 2022DOI 10.1145/3609234 | security.txt revisited: Analysis of Prevalence and Conformity in 2022 | Journal Article |
2023-07 | Han et al. | Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the WildDOI: 10.23919/IFIPNetworking57963.2023.10186440 | Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild | Proceedings |
2023-07 | Dikshit et al. | Evaluating DNS Resiliency and Responsiveness with Truncation, Fragmentation & DoTCP FallbackDOI 10.48550/arXiv.2307.06131 | Evaluating DNS Resiliency and Responsiveness with Truncation, Fragmentation & DoTCP Fallback | Journal Article |
2023-07 | Chen et al. | QoS Assessment of Root DNS Servers Based on Fuzzy Comprehensive EvaluationDOI 10.1109/ICEIEC58029.2023.10200218 | QoS Assessment of Root DNS Servers Based on Fuzzy Comprehensive Evaluation | Proceedings |
2023-07 | Bushart & Rossow | Anomaly-based Filtering of Application-Layer DDoS Against DNS AuthoritativesDOI 10.1109/EuroSP57164.2023.00040 | Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives | Proceedings |
2023-07 | Bremler-Barr et al. | It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUDDOI 10.1145/3606464.3606472 | It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUD | Proceedings |
2023-07 | Bouraga, S. | Assessing the impact of network factors and Twitter data on Ethereum's popularityDOI 10.1016/j.bcra.2023.100150 | Assessing the impact of network factors and Twitter data on Ethereum's popularity | Journal Article |
2023-07 | Boeira et al. | Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS ServersDOI 10.48550/arXiv.2307.01300 | Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers | Journal Article |
2023-07 | Bannat Wala et al. | Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted NetworkDOI 10.1145/3589012.3594895 | Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted Network | Proceedings |
2023-07 | Arouna et al. | Lowering the Barriers to Working with Public RIR-Level DataDOI 10.1145/3606464.3606473 | Lowering the Barriers to Working with Public RIR-Level Data | Proceedings |
2023-07 | Adarsh Geoffrey Daniel & Albert | Analyzing the likeness of a person based on DNS logs using machine learningDOI: 10.1109/IConSCEPT57958.2023.10170228 | Analyzing the likeness of a person based on DNS logs using machine learning | Proceedings |
2023-07 | Abbas et al. | Security Assessment and Evaluation of VPNs: A Comprehensive SurveyDOI 10.1145/3579162 | Security Assessment and Evaluation of VPNs: A Comprehensive Survey | Journal Article |
2023-06 | Zhang et al. | Detecting and Measuring Security Risks of Hosting-Based Dangling DomainsDOI 10.1145/3578338.3593534 | Detecting and Measuring Security Risks of Hosting-Based Dangling Domains | Proceedings |
2023-06 | Yamai et al. | Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative ServersDOI 10.1109/COMPSAC57700.2023.00146 | Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers | Proceedings |
2023-06 | Wang et al. | Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning MethodDOI: 10.1109/CSCWD57460.2023.10152678 | Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning Method | Proceedings |
2023-06 | Singh et al. | TI-16 DNS Labeled Dataset for Detecting BotnetsDOI 10.1109/ACCESS.2023.3287141 | TI-16 DNS Labeled Dataset for Detecting Botnets | Journal Article |
2023-06 | Sengupta et al. | On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and DatasetDOI 10.48550/arXiv.2306.11643 | On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and Dataset | Journal Article |
2023-06 | Sengupta et al. | Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3DOI 10.23919/IFIPNetworking57963.2023.10186362 | Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3 | Proceedings |
2023-06 | Samreen & Alalfi | An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps)DOI 10.1016/j.bcra.2022.100120 | An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps) | Journal Article |
2023-06 | Saha et al. | YODA: Covert Communication Channel over Public DNS ResolversDOI 10.1109/DSN58367.2023.00034 | YODA: Covert Communication Channel over Public DNS Resolvers | Proceedings |
2023-06 | Sagatov et al. | Countering DNS Amplification Attacks Based on Analysis of Outgoing TrafficDOI 10.23919/JCIN.2023.10173727 | Countering DNS Amplification Attacks Based on Analysis of Outgoing Traffic | Journal Article |
2023-06 | Quezada et al. | Real-time bot infection detection system using DNS fingerprinting and machine-learningDOI 10.1016/j.comnet.2023.109725 | Real-time bot infection detection system using DNS fingerprinting and machine-learning | Journal Article |
2023-06 | Paul et al. | Implementing Dead Letter Exchanges in MQTT and Proposing a Broker Failure Algorithm Utilizing Blockchain DNSDOI: 10.1109/ViTECoN58111.2023.10157491 | Implementing Dead Letter Exchanges in MQTT and Proposing a Broker Failure Algorithm Utilizing Blockchain DNS | Proceedings |
2023-06 | Okuthe & Terzoli | Assessing the Impact of DNS Configuration on Low Bandwidth NetworksDOI 10.1007/978-3-031-34896-9_6 | Assessing the Impact of DNS Configuration on Low Bandwidth Networks | Proceedings |
2023-06 | Ohwo et al. | Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM)DOI 10.18280/isi.280329 | Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM) | Journal Article |
2023-06 | Murakami et al. | Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS ServersDOI 10.1109/COMPSAC57700.2023.00169 | Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers | Proceedings |
2023-06 | Mitsuhashi et al. | Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic AnalysisDOI 10.1109/TNSM.2022.3215681 | Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis | Journal Article |
2023-06 | Li et al. | FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory NetworksDOI: 10.1109/ICCECE58074.2023.10135366 | FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory Networks | Proceedings |
2023-06 | Li et al. | Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile ApplicationsDOI 10.23919/IFIPNetworking57963.2023.10186431 | Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications | Proceedings |
2023-06 | Kumar et al. | Each at its Own Pace: Third-Party Dependency and Centralization Around the WorldDOI 10.1145/3578338.3593539 | Each at its Own Pace: Third-Party Dependency and Centralization Around the World | Proceedings |
2023-06 | Kostopoulos et al. | SHAP Interpretations of Tree and Neural Network DNS Classifiers for Analyzing DGA Family CharacteristicsDOI 10.1109/ACCESS.2023.3286313 | SHAP Interpretations of Tree and Neural Network DNS Classifiers for Analyzing DGA Family Characteristics | Journal Article |
2023-06 | Kashif et al. | Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud ComputingDOI: 10.1109/REEDCON57544.2023.10150684 | Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud Computing | Proceedings |
2023-06 | Hsu et al. | Fiat Lux: Illuminating IPv6 Apportionment with Different DatasetsDOI 10.1145/3578338.3593542 | Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets | Proceedings |
2023-06 | Heijligenberg et al. | BigMac: Performance Overhead of User Plane Integrity Protection in 5G NetworksDOI 10.1145/3558482.3581777 | BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks | Proceedings |
2023-06 | Gao et al. | Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learningDOI: 10.1109/CSCWD57460.2023.10152708 | Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning | Proceedings |
2023-06 | Fujiwara et al. | Latency analysis of JP and Root DNS servers from packet capture dataDOI 10.1109/COMPSAC57700.2023.00076 | Latency analysis of JP and Root DNS servers from packet capture data | Proceedings |
2023-06 | Dikshit et al. | Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP FallbackDOI 10.23919/IFIPNetworking57963.2023.10186392 | Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP Fallback | Proceedings |
2023-06 | Alayoff & Einziger | Optimizing DNS Resolvers for High LoadsDOI 10.23919/IFIPNetworking57963.2023.10186425 | Optimizing DNS Resolvers for High Loads | Proceedings |
2023-06 | Al Badri & Alouneh | Detection of Malicious Requests to Protect Web Applications and DNS Servers Against SQL Injection Using Machine LearningDOI 10.1109/ICCNS58795.2023.10193085 | Detection of Malicious Requests to Protect Web Applications and DNS Servers Against SQL Injection Using Machine Learning | Proceedings |
2023-06 | Ahn et al. | IoT Edge-Cloud: An Internet-of-Things Edge-Empowered Cloud System for Device Management in Smart SpacesDOI: 10.1109/MNET.137.2200565 | IoT Edge-Cloud: An Internet-of-Things Edge-Empowered Cloud System for Device Management in Smart Spaces | Journal Article |
2023-05 | Weqar et al. | DNS Traffic Monitoring to Access Vulnerability in the Internet of Healthcare Things Networks: A SurveyDOI 10.1109/REEDCON57544.2023.10150996 | DNS Traffic Monitoring to Access Vulnerability in the Internet of Healthcare Things Networks: A Survey | Proceedings |
2023-05 | Tsai et al. | CERTainty: Detecting DNS Manipulation at Scale using TLS CertificatesDOI 10.48550/arXiv.2305.08189 | CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates | Journal Article |
2023-05 | Shao et al. | Lightweight and Effective Website Fingerprinting Over Encrypted DNSDOI 10.1109/SVCC56964.2023.10165086 | Lightweight and Effective Website Fingerprinting Over Encrypted DNS | Proceedings |
2023-05 | Luo et al. | Who Are Querying For Me? Egress Measurement For Open DNS ResolversDOI 10.1109/CSCWD57460.2023.10152616 | Who Are Querying For Me? Egress Measurement For Open DNS Resolvers | Proceedings |
2023-05 | Liang et al. | FECC: DNS tunnel detection model based on CNN and clusteringDOI 10.1016/j.cose.2023.103132 | FECC: DNS tunnel detection model based on CNN and clustering | Journal Article |
2023-05 | Jerabek et al. | DNS Over HTTPS Detection Using Standard Flow TelemetryDOI 10.1109/ACCESS.2023.3275744 | DNS Over HTTPS Detection Using Standard Flow Telemetry | Journal Article |
2023-05 | Hasegawa et al. | Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture AttackDOI: 10.1109/TNSM.2023.3277880 | Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack | Journal Article |
2023-04 | Wang et al. | MIS: A Multi-Identifier Management and Resolution System in the MetaverseDOI 10.1145/3597641 | MIS: A Multi-Identifier Management and Resolution System in the Metaverse | Journal Article |
2023-04 | Singh Gurjar & Somani | Amplification/Reflection Attack Suppression Using Victim SeparationDOI: 10.1109/LNET.2023.3264827 | Amplification/Reflection Attack Suppression Using Victim Separation | Journal Article |
2023-04 | Qian et al. | Research on DNS Attack Detection Based on HMMDOI 10.1109/ICCECT57938.2023.10141170 | Research on DNS Attack Detection Based on HMM | Proceedings |
2023-04 | Nourin et al. | Measuring and Evading Turkmenistan’s Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration CountryDOI 10.1145/3543507.3583189 | Measuring and Evading Turkmenistan’s Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country | Proceedings |
2023-04 | Moura & Heidemann | Vulnerability Disclosure Considered StressfulDOI 10.1145/3610381.3610383 | Vulnerability Disclosure Considered Stressful | Journal Article |
2023-04 | Lu et al. | GAT-DNS: DNS Multivariate Time Series Prediction Model Based on Graph Attention NetworkDOI 10.1145/3543873.3587329 | GAT-DNS: DNS Multivariate Time Series Prediction Model Based on Graph Attention Network | Proceedings |
2023-04 | Lim et al. | ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshakeDOI 10.1145/3543507.3583516 | ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshake | Proceedings |
2023-04 | Li et al. | A Longitudinal and Comprehensive Measurement of DNS Strict PrivacyDOI: 10.1109/TNET.2023.3262651 | A Longitudinal and Comprehensive Measurement of DNS Strict Privacy | Journal Article |
2023-04 | Kumar Sachan et al. | Identifying malicious accounts in blockchains using domain names and associated temporal propertiesDOI 10.1016/j.bcra.2023.100136 | Identifying malicious accounts in blockchains using domain names and associated temporal properties | Journal Article |
2023-04 | Jiarong et al. | Unsupervised Anomaly Detection Method Based on DNS Log DataDOI 10.1007/978-981-99-1256-8_5 | Unsupervised Anomaly Detection Method Based on DNS Log Data | Proceedings |
2023-04 | Harrilal-Parchment et al. | Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC ApplicationsDOI 10.1109/ICIT58465.2023.10143155 | Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications | Proceedings |
2023-04 | Dikshit et al. | Recent Trends on Privacy-Preserving Technologies under Standardization at the IETFDOI 10.1145/3610381.3610385 | Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF | Journal Article |
2023-04 | Davies & Baber | RFC 9121: Deprecating Infrastructure "int" DomainsDOI 10.17487/RFC9121 | RFC 9121: Deprecating Infrastructure "int" Domains | Internet Specification |
2023-04 | Ahad et al. | DPIDNS:A Deep Packet Inspection Based IPS for Security Of P4 Network Data PlaneDOI: 10.1109/ICSCA57840.2023.10087377 | DPIDNS:A Deep Packet Inspection Based IPS for Security Of P4 Network Data Plane | Proceedings |
2023-03 | Xu et al. | Simulation Research on Fast Matching of Big Data Based on SparkDOI: 10.1109/ACCESS.2023.3262989 | Simulation Research on Fast Matching of Big Data Based on Spark | Journal Article |
2023-03 | Qu et al. | Who is DNS serving for? A human-software perspective of modeling DNS services☆DOI 10.1016/j.knosys.2023.110279 | Who is DNS serving for? A human-software perspective of modeling DNS services☆ | Journal Article |
2023-03 | Nosyk et al. | Intercept and Inject: DNS Response Manipulation in the WildDOI 10.1007/978-3-031-28486-1_19 | Intercept and Inject: DNS Response Manipulation in the Wild | Proceedings |
2023-03 | Nosyk et al. | The Closed Resolver Project: Measuring the Deployment of Inbound Source Address ValidationDOI: 10.1109/TNET.2023.3257413 | The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation | Journal Article |
2023-03 | Nguyen et al. | Domain Name System Resolution System with Hyperledger Fabric BlockchainDOI 10.1007/978-981-19-7402-1_5 | Domain Name System Resolution System with Hyperledger Fabric Blockchain | Proceedings |
2023-03 | Mitsuhashi et al. | Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning AnalysisDOI: 10.1109/CCNC51644.2023.10059835 | Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis | Proceedings |
2023-03 | Magnusson et al. | A Second Look at DNS QNAME MinimizationDOI 10.1007/978-3-031-28486-1_21 | A Second Look at DNS QNAME Minimization | Proceedings |
2023-03 | Lozano, G. | RFC 9361: ICANN Trademark Clearinghouse (TMCH) Functional SpecificationsDOI 10.17487/RFC9361 | RFC 9361: ICANN Trademark Clearinghouse (TMCH) Functional Specifications | Internet Specification |
2023-03 | Jin et al. | Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User AlertDOI: 10.1109/ICEIC57457.2023.10049906 | Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert | Proceedings |
2023-03 | Jerabek et al. | Analysis of Well-Known DNS over HTTPS ResolversDOI 10.1109/CCWC57344.2023.10099347 | Analysis of Well-Known DNS over HTTPS Resolvers | Proceedings |
2023-03 | Blancaflor et al. | Exploitation Simulation of DNS Spoofing and Ransomware In a Virtualized Android DeviceDOI 10.1145/3592307.3592341 | Exploitation Simulation of DNS Spoofing and Ransomware In a Virtualized Android Device | Proceedings |
2023-03 | Bhowmick et al. | TTL Violation of DNS Resolvers in the WildDOI 10.1007/978-3-031-28486-1_23 | TTL Violation of DNS Resolvers in the Wild | Proceedings |
2023-03 | Adiwal et al. | DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacksDOI 10.1016/j.fraope.2023.100010 | DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks | Journal Article |
2023-02 | Streibelt et al. | How Ready Is DNS for an IPv6-Only World?DOI 10.48550/arXiv.2302.11393 | How Ready Is DNS for an IPv6-Only World? | Journal Article |
2023-02 | Kumar & Bustamante | Reclaiming Privacy and Performance over Centralized DNSDOI 10.48550/arXiv.2302.13274 | Reclaiming Privacy and Performance over Centralized DNS | Journal Article |
2023-02 | Jafarian et al. | Detecting Network Scanning Through Monitoring and Manipulation of DNS TrafficDOI 10.1109/ACCESS.2023.3250106 | Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic | Journal Article |
2023-02 | Ishida et al. | Analysis of DNS Graph of Phishing Websites Using Digital CertificatesDOI 10.23919/ICACT56868.2023.10079566 | Analysis of DNS Graph of Phishing Websites Using Digital Certificates | Proceedings |
2023-02 | Hoffman, P. | RFC 9364: DNS Security Extensions (DNSSEC)DOI 10.17487/RFC9364 | RFC 9364: DNS Security Extensions (DNSSEC) | Internet Specification |
2023-02 | Dogra et al. | Detection of Communication Tunnels in Network Using DNS LogsDOI 10.1109/ICECCT56650.2023.10179803 | Detection of Communication Tunnels in Network Using DNS Logs | Proceedings |
2023-01 | Xue et al. | APT Attack Detection Scheme Based on CK Sketch and DNS TrafficDOI 10.3390/s23042217 | APT Attack Detection Scheme Based on CK Sketch and DNS Traffic | Journal Article |
2023-01 | Xu et al. | Measuring the Centrality of DNS Infrastructure in the WildDOI 10.3390/app13095739 | Measuring the Centrality of DNS Infrastructure in the Wild | Journal Article |
2023-01 | Singh et al. | Identifying bot infection using neural networks on DNS trafficDOI 10.1007/s11416-023-00462-5 | Identifying bot infection using neural networks on DNS traffic | Journal Article |
2023-01 | Salat et al. | DNS Tunnelling, Exfiltration and Detection over Cloud EnvironmentsDOI 10.3390/s23052760 | DNS Tunnelling, Exfiltration and Detection over Cloud Environments | Journal Article |
2023-01 | Rizvi et al. | Defending Root DNS Servers Against DDoS Using Layered DefensesDOI 10.1109/COMSNETS56262.2023.10041415 | Defending Root DNS Servers Against DDoS Using Layered Defenses | Proceedings |
2023-01 | Qasem Abu Al-Haija | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning ApproachDOI 10.3390/s23073489 | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach | Journal Article |
2023-01 | Niakanlahiji et al. | Toward practical defense against traffic analysis attacks on encrypted DNS trafficDOI 10.1016/j.cose.2022.103001 | Toward practical defense against traffic analysis attacks on encrypted DNS traffic | Journal Article |
2023-01 | Melcher et al. | Tunneling through DNS over TLS Providers | Tunneling through DNS over TLS Providers | Proceedings |
2023-01 | Irénée et al. | XTS: A Hybrid Framework to Detect DNS-Over-HTTPS Tunnels Based on XGBoost and Cooperative Game TheoryDOI 10.3390/math11102372 | XTS: A Hybrid Framework to Detect DNS-Over-HTTPS Tunnels Based on XGBoost and Cooperative Game Theory | Journal Article |
2023-01 | Hatanaka et al. | Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor FactorizationDOI: 10.1109/TNSM.2023.3238858 | Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor Factorization | Journal Article |
2023-01 | Gao & Dong | DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium BlockchainDOI 10.3390/s23146366 | DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain | Journal Article |
2023-01 | Ayoub et al. | DNS for IoT: A SurveyDOI 10.3390/s23094473 | DNS for IoT: A Survey | Journal Article |
2023-01 | Albalawi et al. | The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based VulnerabilitiesDOI 10.3390/electronics12122664 | The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities | Journal Article |
2023-01 | Adiwal et al. | Health Assessment of 1485 Top Level Domain's Name ServersDOI 10.1109/COMSNETS56262.2023.10041391 | Health Assessment of 1485 Top Level Domain's Name Servers | Proceedings |
2023-01 | Abualghanam et al. | Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine LearningDOI 10.3390/electronics12061467 | Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning | Journal Article |
2022-12 | Wu & Fei | An Abnormal Domain Name Generation Method Based on a Character-Level ModelDOI 10.1145/3584376.3584519 | An Abnormal Domain Name Generation Method Based on a Character-Level Model | Proceedings |
2022-12 | Goertzen, J. | Enabling Post-Quantum Signatures in DNSSEC: One ARRF at a time | Enabling Post-Quantum Signatures in DNSSEC: One ARRF at a time | Master's Thesis |
2022-12 | Faulkenberry et al. | View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyDOI 10.1145/3564625.3564646 | View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy | Proceedings |
2022-12 | Fainchtein et al. | User Perceptions of the Privacy and Usability of Smart DNSDOI 10.1145/3564625.3567978 | User Perceptions of the Privacy and Usability of Smart DNS | Proceedings |
2022-12 | Csikor et al. | ZeroDNS: Towards Better Zero Trust Security using DNSDOI 10.1145/3564625.3567968 | ZeroDNS: Towards Better Zero Trust Security using DNS | Proceedings |
2022-12 | Chiscop et al. | AI-based detection of DNS misuse for network securityDOI 10.1145/3565009.3569523 | AI-based detection of DNS misuse for network security | Proceedings |
2022-11 | Zang et al. | Encrypted DNS Traffic Analysis for Service Intention InferringDOI 10.1109/TNSM.2022.3223902 | Encrypted DNS Traffic Analysis for Service Intention Inferring | Journal Article |
2022-11 | Streibelt et al. | Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic DatasetsDOI 10.48550/arXiv.2211.06537 | Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets | Journal Article |
2022-11 | Shulman & Waidner | DNS in Routers Considered HarmfulDOI 10.1145/3548606.3563509 | DNS in Routers Considered Harmful | Proceedings |
2022-11 | Schwenk, J. | DNS SecurityDOI 10.1007/978-3-031-19439-9_15 | DNS Security | Book Section |
2022-11 | Maghsoudlou et al. | FlowDNS: correlating netflow and DNS streams at scaleDOI 10.1145/3555050.3569135 | FlowDNS: correlating netflow and DNS streams at scale | Proceedings |
2022-11 | Lyu et al. | Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic AnalysisDOI: 10.1109/TNSM.2022.3221981 | Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis | Journal Article |
2022-11 | Hlavacek et al. | Behind the Scenes of RPKIDOI 10.1145/3548606.3560645 | Behind the Scenes of RPKI | Proceedings |
2022-11 | Couto et al. | Characterizing Low Credibility Websites in Brazil through Computer Networking AttributesDOI 10.1109/ASONAM55673.2022.10068660 | Characterizing Low Credibility Websites in Brazil through Computer Networking Attributes | Journal Article |
2022-10 | Yazdani et al. | Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksDOI 10.1145/3545948.3545959 | Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks | Proceedings |
2022-10 | Xia et al. | Challenges in decentralized name management: the case of ENSDOI 10.1145/3517745.3561469 | Challenges in decentralized name management: the case of ENS | Proceedings |
2022-10 | Voelker et al. | Where .ru?: assessing the impact of conflict on russian domain infrastructureDOI 10.1145/3517745.3561423 | Where .ru?: assessing the impact of conflict on russian domain infrastructure | Proceedings |
2022-10 | Toorn et al. | Saving Brian's privacy: the perils of privacy exposure through reverse DNSDOI 10.1145/3517745.3561424 | Saving Brian's privacy: the perils of privacy exposure through reverse DNS | Proceedings |
2022-10 | Sommese et al. | Assessing e-Government DNS Resilience | Assessing e-Government DNS Resilience | Proceedings |
2022-10 | Sommese et al. | Investigating the impact of DDoS attacks on DNS infrastructureDOI 10.1145/3517745.3561458 | Investigating the impact of DDoS attacks on DNS infrastructure | Proceedings |
2022-10 | Sommese et al. | Observable KINDNS: validating DNS hygieneDOI 10.1145/3517745.3563016 | Observable KINDNS: validating DNS hygiene | Proceedings |
2022-10 | Nie et al. | Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers | Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers | Proceedings |
2022-10 | Kosek et al. | DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceDOI 10.1145/3517745.3561445 | DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performance | Proceedings |
2022-10 | Kaplan & Feibish | Practical handling of DNS in the data planeDOI 10.1145/3563647.3563654 | Practical handling of DNS in the data plane | Proceedings |
2022-10 | Joback et al. | A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolDOI 10.1145/3477997.3478007 | A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System Protocol | Proceedings |
2022-10 | Jin et al. | An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersDOI 10.1145/3556223.3556263 | An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers | Proceedings |
2022-10 | Izhikevich et al. | ZDNS: a fast DNS toolkit for internet measurementDOI 10.1145/3517745.3561434 | ZDNS: a fast DNS toolkit for internet measurement | Proceedings |
2022-10 | Arouna et al. | On unifying diverse DNS data sourcesDOI 10.1145/3517745.3563022 | On unifying diverse DNS data sources | Proceedings |
2022-10 | AlSabah et al. | Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSDOI 10.1145/3545948.3545958 | Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS | Proceedings |
2022-10 | Allman, M. | Putting DNS in ContextDOI 10.1145/3419394.3423659 | Putting DNS in Context | Proceedings |
2022-10 | Akiwate et al. | Retroactive identification of targeted DNS infrastructure hijackingDOI 10.1145/3517745.3561425 | Retroactive identification of targeted DNS infrastructure hijacking | Proceedings |
2022-09 | Yang et al. | A deep dive into DNS behavior and query failuresDOI 10.1016/j.comnet.2022.109131 | A deep dive into DNS behavior and query failures | Journal Article |
2022-09 | Wala & Cotton | "Off-Label" Use of DNSDOI 10.1145/3491261 | "Off-Label" Use of DNS | Journal Article |
2022-09 | Sattler, T. | Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat. | Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat. | Master's Thesis |
2022-09 | Luo et al. | A global name mapping system for ICN-IP coexistenceDOI 10.1145/3517212.3559492 | A global name mapping system for ICN-IP coexistence | Proceedings |
2022-09 | Cheng et al. | Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesDOI 10.1093/comjnl/bxab062 | Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules | Journal Article |
2022-08 | Rajendran et al. | A Universal Domain Name Resolution Service – Need and Challenges - Study on Blockchain Based Naming ServicesDOI 10.1109/TENSYMP54529.2022.9864361 | A Universal Domain Name Resolution Service – Need and Challenges - Study on Blockchain Based Naming Services | Proceedings |
2022-08 | Nisenoff et al. | Understanding User Awareness and Behaviors Concerning Encrypted DNS SettingsDOI 10.48550/arXiv.2208.04991 | Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings | Journal Article |
2022-07 | McGhee et al. | NetInfra - A Framework for Expressing Network Infrastructure as CodeDOI 10.1145/3491418.3530762 | NetInfra - A Framework for Expressing Network Infrastructure as Code | Proceedings |
2022-07 | Mathews et al. | A Deep Learning Approach to Create DNS Amplification AttacksDOI 10.1145/3535782.3535838 | A Deep Learning Approach to Create DNS Amplification Attacks | Proceedings |
2022-07 | Lyu et al. | A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesDOI 10.1145/3547331 | A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques | Journal Article |
2022-07 | Jia, W.-K. | PFQDN: SDN- and DNS-Assisted Transparent Communications Among Behind-NAT NetworksDOI: 10.1109/JSYST.2022.3177645 | PFQDN: SDN- and DNS-Assisted Transparent Communications Among Behind-NAT Networks | Journal Article |
2022-07 | Bauer, P. | Ethereum Name ServiceDOI 10.1007/978-1-4842-8045-4_9 | Ethereum Name Service | Book Section |
2022-06 | Jayaprakash & Kalariyil Venugopal | A Novel Framework For Detecting Subdomain State Against Takeover Attacks | A Novel Framework For Detecting Subdomain State Against Takeover Attacks | Master's Thesis |
2022-06 | Hounsel, A. | Measuring the Feasibility of DNS Privacy and Security | Measuring the Feasibility of DNS Privacy and Security | Doctoral Thesis |
2022-05 | Roure et al. | Investigating link service infrastructuresDOI 10.1145/336296.336325 | Investigating link service infrastructures | Proceedings |
2022-04 | Laprade & Huang | Domain name service trust delegation in cloud computing: exploitation, risks, and defenseDOI 10.1145/3477314.3507016 | Domain name service trust delegation in cloud computing: exploitation, risks, and defense | Proceedings |
2022-04 | Kosek et al. | Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeDOI 10.1145/3544912.3544918 | Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edge | Journal Article |
2022-03 | Mahdavifar et al. | Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningDOI 10.1145/3507509.3507520 | Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning | Proceedings |
2022-03 | Blanchet, M. | RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceDOI 10.17487/RFC9224 | RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) Service | Internet Specification |
2022-02 | Park et al. | A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetDOI 10.1109/TNET.2021.3105599 | A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet | Journal Article |
2022-02 | Dan et al. | IP Geolocation through Reverse DNSDOI 10.1145/3457611 | IP Geolocation through Reverse DNS | Journal Article |
2022-02 | Cheng, Y. | Disclosing Features and Characteristics of. COM Registrars' WHOIS ServersDOI 10.1109/ACCTCS53867.2022.00018 | Disclosing Features and Characteristics of. COM Registrars' WHOIS Servers | Proceedings |
2021-12 | Sattler et al. | RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC9167 | RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2021-12 | Nawrocki et al. | Transparent forwarders: an unnoticed component of the open DNS infrastructureDOI 10.1145/3485983.3494872 | Transparent forwarders: an unnoticed component of the open DNS infrastructure | Proceedings |
2021-12 | Lenders et al. | Securing name resolution in the IoT: DNS over CoAPDOI 10.1145/3488658.3493790 | Securing name resolution in the IoT: DNS over CoAP | Proceedings |
2021-12 | He et al. | DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation SystemsDOI: 10.1109/TITS.2021.3135197 | DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems | Journal Article |
2021-12 | Gould & Wilhelm | RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferDOI 10.17487/RFC9154 | RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for Transfer | Internet Specification |
2021-11 | Zhang et al. | Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisDOI 10.1016/j.cose.2021.102445 | Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis | Journal Article |
2021-11 | Randall et al. | Home is where the hijacking is: understanding DNS interception by residential routersDOI 10.1145/3487552.3487817 | Home is where the hijacking is: understanding DNS interception by residential routers | Proceedings |
2021-11 | Nawrocki et al. | The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreDOI 10.1145/3487552.3487835 | The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core | Proceedings |
2021-11 | Moura et al. | TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSDOI 10.1145/3487552.3487824 | TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS | Proceedings |
2021-11 | Man et al. | DNS Cache Poisoning Attack: Resurrections with Side ChannelsDOI 10.1145/3460120.3486219 | DNS Cache Poisoning Attack: Resurrections with Side Channels | Proceedings |
2021-11 | Kakarla et al. | How Complex is DNS?DOI 10.1145/3484266.3487369 | How Complex is DNS? | Proceedings |
2021-11 | Hounsel et al. | Designing for Tussle in Encrypted DNSDOI 10.1145/3484266.3487383 | Designing for Tussle in Encrypted DNS | Proceedings |
2021-11 | Chhabra et al. | Measuring DNS-over-HTTPS performance around the worldDOI 10.1145/3487552.3487849 | Measuring DNS-over-HTTPS performance around the world | Proceedings |
2021-11 | Bernard, A. | Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutions | Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutions | Doctoral Thesis |
2021-11 | Akiwate et al. | Risky BIZness: risks derived from registrar name managementDOI 10.1145/3487552.3487816 | Risky BIZness: risks derived from registrar name management | Proceedings |
2021-10 | Tatang et al. | The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsDOI 10.1145/3471621.3471842 | The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws | Proceedings |
2021-10 | Jin et al. | Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationDOI 10.1145/3478472.3478481 | Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification | Proceedings |
2021-09 | Khan et al. | Development and Optimisation of a DNS Solver Using Open-source Library for High-performance ComputingDOI 10.1080/10618562.2021.1971656 | Development and Optimisation of a DNS Solver Using Open-source Library for High-performance Computing | Research Paper |
2021-08 | Kwan et al. | Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsDOI 10.1145/3473604.3474563 | Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels | Proceedings |
2021-08 | Khodjaeva & Zincir-Heywood | Network Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsDOI 10.1145/3465481.3470089 | Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels | Proceedings |
2021-08 | Kaplan & Feibish | DNS water torture detection in the data planeDOI 10.1145/3472716.3472854 | DNS water torture detection in the data plane | Proceedings |
2021-08 | Crocker, S. | A Framework for Expressing Registration Data Directory Services (née WHOIS) RulesDOI 10.2139/ssrn.3897125 | A Framework for Expressing Registration Data Directory Services (née WHOIS) Rules | Proceedings |
2021-07 | Imana et al. | Institutional privacy risks in sharing DNS dataDOI 10.1145/3472305.3472324 | Institutional privacy risks in sharing DNS data | Proceedings |
2021-07 | Hounsel et al. | Encryption without centralization: distributing DNS queries across recursive resolversDOI 10.1145/3472305.3472318 | Encryption without centralization: distributing DNS queries across recursive resolvers | Proceedings |
2021-07 | García et al. | Large Scale Measurement on the Adoption of Encrypted DNSDOI 10.48550/arXiv.2107.04436 | Large Scale Measurement on the Adoption of Encrypted DNS | Research Paper |
2021-07 | Dai et al. | DNS-over-TCP considered vulnerableDOI 10.1145/3472305.3472884 | DNS-over-TCP considered vulnerable | Proceedings |
2021-07 | Al-Drees et al. | Building a DNS Tunneling DatasetDOI 10.2174/2210327910999201124205758 | Building a DNS Tunneling Dataset | Research Paper |
2021-06 | Tehrani et al. | Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIDOI 10.1145/3442381.3450033 | Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI | Proceedings |
2021-06 | Jawad, A. | Monitoring security of enterprise hosts via DNS data analysisDOI 10.26190/unsworks/22739 | Monitoring security of enterprise hosts via DNS data analysis | Doctoral Thesis |
2021-06 | Inoue et al. | Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowDOI 10.1145/3468081.3471123 | Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlow | Proceedings |
2021-06 | Hollenbeck & Newton | RFC 9082: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC9082 | RFC 9082: Registration Data Access Protocol (RDAP) Query Format | Internet Specification |
2021-06 | Hollenbeck & Newton | RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC9083 | RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP) | Internet Specification |
2021-05 | Ibarra et al. | RFC 9022: Domain Name Registration Data (DNRD) Objects MappingDOI 10.17487/RFC9022 | RFC 9022: Domain Name Registration Data (DNRD) Objects Mapping | Internet Specification |
2021-05 | Gould & Casanova | RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesDOI 10.17487/RFC9038 | RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled Namespaces | Internet Specification |
2021-05 | Gañán, C. | A Primer in Registration Data Access Protocol (RDAP) Performance | A Primer in Registration Data Access Protocol (RDAP) Performance | Research Paper |
2021-04 | Xia et al. | Ethereum Name Service: the Good, the Bad, and the UglyDOI 10.48550/arXiv.2104.05185 | Ethereum Name Service: the Good, the Bad, and the Ugly | Research Paper |
2021-04 | Pengcheng et al. | Identifying and Characterizing COVID-19 Themed Malicious Domain CampaignsDOI 10.1145/3422337.3447840 | Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns | Proceedings |
2021-04 | Jin et al. | Understanding the Impact of Encrypted DNS on Internet CensorshipDOI 10.1145/3442381.3450084 | Understanding the Impact of Encrypted DNS on Internet Censorship | Proceedings |
2021-04 | Davis, J. | The DNS Bake Sale: Advertising DNS Cookie Support for DDoS Protection | The DNS Bake Sale: Advertising DNS Cookie Support for DDoS Protection | Master's Thesis |
2021-04 | Alieyan et al. | DNS rule-based schema to botnet detectionDOI 10.1080/17517575.2019.1644673 | DNS rule-based schema to botnet detection | Research Paper |
2021-03 | Ravi et al. | Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep LearningDOI: 10.1109/TEM.2021.3059664 | Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning | Journal Article |
2021-03 | Michner, K. | Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher Sicht | Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher Sicht | Master's Thesis |
2021-03 | Lyu et al. | Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksDOI 10.1109/TNSM.2021.3050091 | Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks | Journal Article |
2021-03 | Hounsel et al. | Can Encrypted DNS Be Fast?DOI 10.1007/978-3-030-72582-2_26 | Can Encrypted DNS Be Fast? | Proceedings |
2021-03 | Doan et al. | Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesDOI 10.1007/978-3-030-72582-2_12 | Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response Times | Proceedings |
2021-03 | Alageel & Maffeis | Hawk-Eye: holistic detection of APT command and control domainsDOI 10.1145/3412841.3442040 | Hawk-Eye: holistic detection of APT command and control domains | Proceedings |
2021-02 | Orduña-Malea, E. | Dot-science top level domain: Academic websites or dumpsites?DOI 10.1007/s11192-020-03832-8 | Dot-science top level domain: Academic websites or dumpsites? | Journal Article |
2021-02 | Lu et al. | From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRDOI 10.14722/ndss.2021.23134 | From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR | Proceedings |
2021-02 | Loffredo & Martinelli | RFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseDOI 10.17487/RFC8982 | RFC 8982: Registration Data Access Protocol (RDAP) Partial Response | Internet Specification |
2021-01 | Loffredo et al. | RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingDOI 10.17487/RFC8977 | RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and Paging | Internet Specification |
2021-01 | Desmet et al. | Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLDDOI 10.1145/3419476 | Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD | Journal Article |
2020-12 | Yin et al. | Decentralization of DNS: Old Problems and New ChallengesDOI 10.1145/3444370.3444594 | Decentralization of DNS: Old Problems and New Challenges | Proceedings |
2020-12 | Kumar & Liu | Decentralization, Privacy and Performance for DNSDOI 10.1145/3426746.3434060 | Decentralization, Privacy and Performance for DNS | Proceedings |
2020-12 | Agostinho et al. | An Approach Adopting Ethereum as a Wallet Domain Name System within the Economy of Things ContextDOI 10.1109/UCC48980.2020.00036 | An Approach Adopting Ethereum as a Wallet Domain Name System within the Economy of Things Context | Proceedings |
2020-11 | Yang et al. | Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersDOI 10.1145/3425329.3425335 | Mechanism of Parked Domains Recognition Based on Authoritative DNS Servers | Proceedings |
2020-11 | Yang et al. | Naruto: DNS Covert Channels Detection Based on Stacking ModelDOI 10.1145/3425329.3425336 | Naruto: DNS Covert Channels Detection Based on Stacking Model | Proceedings |
2020-11 | Udiyono et al. | Botnet Detection Using DNS and HTTP Traffic AnalysisDOI 10.1145/3429789.3429818 | Botnet Detection Using DNS and HTTP Traffic Analysis | Proceedings |
2020-11 | Lozano, G. | RFC 8909: Registry Data Escrow SpecificationDOI 10.17487/RFC8909 | RFC 8909: Registry Data Escrow Specification | Internet Specification |
2020-11 | Klein et al. | Black-box caches fingerprintingDOI 10.1145/3386367.3432148 | Black-box caches fingerprinting | Proceedings |
2020-11 | Hsu et al. | DNS Does Not Suffice for MEC-CDNDOI 10.1145/3422604.3425931 | DNS Does Not Suffice for MEC-CDN | Proceedings |
2020-11 | Bautista et al. | Numeric domains meet algebraic data typesDOI 10.1145/3427762.3430178 | Numeric domains meet algebraic data types | Proceedings |
2020-11 | Alowaisheq et al. | Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralDOI 10.1145/3372297.3417864 | Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral | Proceedings |
2020-10 | ten Oever, N. | Wired norms: Inscription, resistance, and subversion in the governance of the Internet infrastructure | Wired norms: Inscription, resistance, and subversion in the governance of the Internet infrastructure | Doctoral Thesis |
2020-10 | Sengupta et al. | A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSDOI 10.1145/3418073 | A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNS | Journal Article |
2020-10 | Randall et al. | Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversDOI 10.1145/3419394.3423640 | Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers | Proceedings |
2020-10 | Quinkert et al. | Be the Phisher -- Understanding Users' Perception of Malicious DomainsDOI 10.1145/3320269.3384765 | Be the Phisher -- Understanding Users' Perception of Malicious Domains | Proceedings |
2020-10 | Müller et al. | Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECDOI 10.1145/3431832.3431838 | Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC | Journal Article |
2020-10 | Moura et al. | Clouding up the Internet: how centralized is DNS traffic becoming?DOI 10.1145/3419394.3423625 | Clouding up the Internet: how centralized is DNS traffic becoming? | Proceedings |
2020-10 | Man et al. | DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsDOI 10.1145/3372297.3417280 | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | Proceedings |
2020-10 | Kashaf et al. | Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?DOI 10.1145/3419394.3423664 | Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident? | Proceedings |
2020-10 | Deccio et al. | Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityDOI 10.1145/3419394.3423649 | Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security | Proceedings |
2020-09 | Sommese et al. | The Forgotten Side of DNS: Orphan and Abandoned RecordsDOI 10.1109/EuroSPW51379.2020.00079 | The Forgotten Side of DNS: Orphan and Abandoned Records | Proceedings |
2020-09 | Hermita et al. | Designing IT Service Management at Indonesia Internet Domain Names Registry Association's Helpdesk FunctionDOI 10.1145/3418981.3418987 | Designing IT Service Management at Indonesia Internet Domain Names Registry Association's Helpdesk Function | Proceedings |
2020-09 | Hercog, D. | DNS: Distributed Directory and ProtocolDOI 10.1007/978-3-030-50405-2_20 | DNS: Distributed Directory and Protocol | Book Section |
2020-09 | Albalawi & Garcia-Luna-Aceves | Named-Data Transport: An End-to-End Approach for an Information-Centric IP InternetDOI 10.1145/3405656.3418714 | Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet | Proceedings |
2020-08 | Yu & Sheng | Knowledge diffusion paths of blockchain domain: the main path analysisDOI 10.1007/s11192-020-03650-y | Knowledge diffusion paths of blockchain domain: the main path analysis | Journal Article |
2020-08 | Vekshin et al. | DoH Insight: detecting DNS over HTTPS by machine learningDOI 10.1145/3407023.3409192 | DoH Insight: detecting DNS over HTTPS by machine learning | Proceedings |
2020-08 | Rodriguez, P. | Perceptions of IT Decision-Makers on the Use of Domain Name System Security Extension (DNSSEC): Qualitative Exploratory Case Study | Perceptions of IT Decision-Makers on the Use of Domain Name System Security Extension (DNSSEC): Qualitative Exploratory Case Study | Doctoral Thesis |
2020-08 | Rivera et al. | Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesDOI 10.1145/3407023.3407041 | Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries | Proceedings |
2020-08 | Postolka, M. | Performance Measurement Tool for DNS Servers | Performance Measurement Tool for DNS Servers | Master's Thesis |
2020-08 | Gould & Pozun | RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8807 | RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2020-08 | Burton, R. | Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksDOI 10.1145/3377869 | Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks | Journal Article |
2020-07 | Szurdi, J. | Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations | Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations | Doctoral Thesis |
2020-07 | Schomp et al. | Akamai DNS: Providing Authoritative Answers to the World's QueriesDOI 10.1145/3387514.3405881 | Akamai DNS: Providing Authoritative Answers to the World's Queries | Proceedings |
2020-07 | Nabeel et al. | Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceDOI 10.1145/3401897 | Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference | Journal Article |
2020-07 | Kostopoulos et al. | Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersDOI 10.1145/3404868.3406665 | Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers | Proceedings |
2020-07 | Korczyński et al. | Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversDOI 10.1145/3404868.3406668 | Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers | Proceedings |
2020-07 | Ke & Sudhir | Privacy Rights and Data Security: GDPR and Personal Data MarketsDOI 10.2139/ssrn.3643979 | Privacy Rights and Data Security: GDPR and Personal Data Markets | Research Paper |
2020-07 | Kakarla et al. | GRooT: Proactive Verification of DNS ConfigurationsDOI 10.1145/3387514.3405871 | GRooT: Proactive Verification of DNS Configurations | Proceedings |
2020-05 | Bao et al. | Using Passive DNS to Detect Malicious Domain NameDOI 10.1145/3387168.3387236 | Using Passive DNS to Detect Malicious Domain Name | Proceedings |
2020-04 | Zembruzki, L. | Dnstracker : measuring centralization of DNS infrastructure in the wild | Dnstracker : measuring centralization of DNS infrastructure in the wild | Master's Thesis |
2020-04 | Li et al. | CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsDOI 10.1145/3388176.3388206 | CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records | Proceedings |
2020-04 | Li et al. | Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesDOI 10.1145/3388176.3388205 | Role Identification of Domain Name Server Using Machine Learning based on DNS Response Features | Proceedings |
2020-04 | Hounsel et al. | Comparing the Effects of DNS, DoT, and DoH on Web PerformanceDOI 10.1145/3366423.3380139 | Comparing the Effects of DNS, DoT, and DoH on Web Performance | Proceedings |
2020-04 | Bansal & Sethumadhavan | Survey on Domain Name System Security Problems - DNS and Blockchain SolutionsDOI 10.1007/978-981-15-4451-4_50 | Survey on Domain Name System Security Problems - DNS and Blockchain Solutions | Proceedings |
2020-03 | Toorn & Sperotto | Looking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsDOI 10.1145/3373639 | Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats | Journal Article |
2020-03 | Carney et al. | RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8748 | RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2020-03 | Ahmed et al. | Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsDOI 10.1109/TNSM.2019.2940735 | Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal Hosts | Journal Article |
2020-01 | Troia, V. | Hunting Cyber Criminals: WHOISDOI 10.1002/9781119541004.ch9 | Hunting Cyber Criminals: WHOIS | Book Section |
2020-01 | Schwemmer, S. | The regulation of abusive activity and content: a study of registries’ terms of serviceDOI 10.14763/2020.1.1448 | The regulation of abusive activity and content: a study of registries’ terms of service | Journal Article |
2020-01 | He et al. | TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainDOI 10.1016/j.future.2019.09 | TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain | Journal Article |
2020-01 | Al-Mashhadi & Manickam | A brief review of blockchain-based DNS systemsDOI 10.1504/ijitst.2020.108134 | A brief review of blockchain-based DNS systems | Journal Article |
2020-01 | Al-Dalky, R. | Issues in Security and Performance of the DNS Ecosystem | Issues in Security and Performance of the DNS Ecosystem | Doctoral Thesis |
2020-01 | Abdelmajid et al. | Location Based Model For Prevention DNS SpoofingDOI 10.1145/3424311.3424329 | Location Based Model For Prevention DNS Spoofing | Proceedings |
2019-12 | Spooren et al. | Premadoma: an operational solution for DNS registries to prevent malicious domain registrationsDOI 10.1145/3359789.3359836 | Premadoma: an operational solution for DNS registries to prevent malicious domain registrations | Proceedings |
2019-12 | Park et al. | Investigating DNS Manipulation by Open DNS ResolversDOI 10.1145/3360468.3368172 | Investigating DNS Manipulation by Open DNS Resolvers | Proceedings |
2019-12 | Nakatsuka et al. | PDoT: private DNS-over-TLS with TEE supportDOI 10.1145/3359789.3359793 | PDoT: private DNS-over-TLS with TEE support | Proceedings |
2019-12 | Liu et al. | A Comparative Study of Blockchain-Based DNS DesignDOI 10.1145/3376044.3376057 | A Comparative Study of Blockchain-Based DNS Design | Proceedings |
2019-12 | Houser et al. | An investigation on information leakage of DNS over TLSDOI 10.1145/3359989.3365429 | An investigation on information leakage of DNS over TLS | Proceedings |
2019-12 | Deccio & Davis | DNS privacy in practice and preparationDOI 10.1145/3359989.3365435 | DNS privacy in practice and preparation | Proceedings |
2019-11 | Peña, T. | A Deep Learning Approach to Detecting Covert Channels in the Domain Name System | A Deep Learning Approach to Detecting Covert Channels in the Domain Name System | Doctoral Thesis |
2019-11 | Allman, M. | On Eliminating Root Nameservers from the DNSDOI 10.1145/3365609.3365863 | On Eliminating Root Nameservers from the DNS | Proceedings |
2019-10 | Müller et al. | Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverDOI 10.1145/3355369.3355570 | Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover | Proceedings |
2019-10 | Moura et al. | Cache Me If You Can: Effects of DNS Time-to-LiveDOI 10.1145/3355369.3355568 | Cache Me If You Can: Effects of DNS Time-to-Live | Proceedings |
2019-10 | Lu et al. | An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?DOI 10.1145/3355369.3355580 | An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? | Proceedings |
2019-10 | Foremski et al. | DNS Observatory: The Big Picture of the DNSDOI 10.1145/3355369.3355566 | DNS Observatory: The Big Picture of the DNS | Proceedings |
2019-10 | Böttger et al. | An Empirical Study of the Cost of DNS-over-HTTPSDOI 10.1145/3355369.3355575 | An Empirical Study of the Cost of DNS-over-HTTPS | Proceedings |
2019-10 | Al-Dalky et al. | A Look at the ECS Behavior of DNS ResolversDOI 10.1145/3355369.3355586 | A Look at the ECS Behavior of DNS Resolvers | Proceedings |
2019-09 | Tehrani et al. | NDNSSEC: Namespace Management in NDN with DNSSECDOI 10.1145/3357150.3357417 | NDNSSEC: Namespace Management in NDN with DNSSEC | Proceedings |
2019-09 | Tehrani et al. | The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpDOI 10.1145/3357150.3357401 | The Missing Piece: On Namespace Management in NDN and How DNSSEC Might Help | Proceedings |
2019-09 | Lee et al. | DGA-based malware detection using DNS traffic analysisDOI 10.1145/3338840.3355672 | DGA-based malware detection using DNS traffic analysis | Proceedings |
2019-08 | Vyas & Batra | Bot detection by monitoring and grouping domain name server record response queries in DNS trafficDOI 10.1080/02522667.2019.1639945 | Bot detection by monitoring and grouping domain name server record response queries in DNS traffic | Journal Article |
2019-08 | Shafir et al. | DNS Negative Caching in the WildDOI 10.1145/3342280.3342338 | DNS Negative Caching in the Wild | Proceedings |
2019-08 | Curtin et al. | Detecting DGA domains with recurrent neural networks and side informationDOI 10.1145/3339252.3339258 | Detecting DGA domains with recurrent neural networks and side information | Proceedings |
2019-07 | Schmitt et al. | Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019DOI 10.1145/3340301.3341128 | Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019 | Proceedings |
2019-07 | Liu et al. | Who is answering my queries: understanding and characterizing interception of the DNS resolution pathDOI 10.1145/3340301.3341122 | Who is answering my queries: understanding and characterizing interception of the DNS resolution path | Proceedings |
2019-07 | Hounsel et al. | Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webDOI 10.1145/3340301.3341129 | Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web | Proceedings |
2019-07 | Ferrara, E. | The history of digital spamDOI 10.1145/3299768 | The history of digital spam | Journal Article |
2019-06 | Hudobnik, M. | The Future of WHOIS : an analysis of the Policy Development Process under the GDPR with a focus on the litigation ICANN v. EPAG | The Future of WHOIS : an analysis of the Policy Development Process under the GDPR with a focus on the litigation ICANN v. EPAG | Master's Thesis |
2019-05 | Lipton, J. | Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America? | Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America? | Journal Article |
2019-05 | Gould & Feher | RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8590 | RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2019-05 | Clemson, A. | A Practical Guide to the Law of Domain Names and CybersquattingISBN 978-1912687121 | A Practical Guide to the Law of Domain Names and Cybersquatting | Book |
2019-04 | Zhou et al. | RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8544 | RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2019-03 | Zhou et al. | RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingDOI 10.17487/RFC8543 | RFC 8543: Extensible Provisioning Protocol (EPP) Organization Mapping | Internet Specification |
2019-03 | Li et al. | MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningDOI 10.1145/3322645.3322675 | MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep Learning | Proceedings |
2019-01 | Hoffman et al. | RFC 8499: DNS TerminologyDOI 10.17487/RFC8499 | RFC 8499: DNS Terminology | Internet Specification |
2018-12 | Luo et al. | A Large Scale Analysis of DNS Water Torture AttackDOI 10.1145/3297156.3297272 | A Large Scale Analysis of DNS Water Torture Attack | Proceedings |
2018-12 | Liu et al. | A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsDOI 10.1145/3284028.3284034 | A High Performance, Scalable DNS Service for Very Large Scale Container Cloud Platforms | Proceedings |
2018-11 | Hollenbeck & Newton | RFC 8521: Registration Data Access Protocol (RDAP) Object TaggingDOI 10.17487/RFC8521 | RFC 8521: Registration Data Access Protocol (RDAP) Object Tagging | Internet Specification |
2018-11 | Gould & Feher | RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8495 | RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2018-10 | Zhu & Heidemann | LDplayer: DNS Experimentation at ScaleDOI 10.1145/3278532.3278544 | LDplayer: DNS Experimentation at Scale | Proceedings |
2018-10 | Moura et al. | When the Dike Breaks: Dissecting DNS Defenses During DDoSDOI 10.1145/3278532.3278534 | When the Dike Breaks: Dissecting DNS Defenses During DDoS | Proceedings |
2018-10 | Lauinger et al. | From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropDOI 10.1145/3278532.3278560 | From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop | Proceedings |
2018-10 | Hoffman & McManus | RFC 8484: DNS Queries over HTTPS (DoH)DOI 10.17487/RFC8484 | RFC 8484: DNS Queries over HTTPS (DoH) | Internet Specification |
2018-10 | Brandt et al. | Domain Validation++ For MitM-Resilient PKIDOI 10.1145/3243734.3243790 | Domain Validation++ For MitM-Resilient PKI | Proceedings |
2018-09 | Karaarslan & Adiguzel | Blockchain Based DNS and PKI SolutionsDOI 10.1109/MCOMSTD.2018.1800023 | Blockchain Based DNS and PKI Solutions | Journal Article |
2018-08 | Hohlfeld, O. | Operating a DNS-based Active Internet ObservatoryDOI 10.1145/3234200.3234239 | Operating a DNS-based Active Internet Observatory | Proceedings |
2018-08 | Abhishta et al. | Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersDOI 10.1145/3229598.3229599 | Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers | Proceedings |
2018-07 | Zhauniarovich et al. | A Survey on Malicious Domains Detection through DNS Data AnalysisDOI 10.1145/3191329 | A Survey on Malicious Domains Detection through DNS Data Analysis | Journal Article |
2018-07 | Allman, M. | Comments On DNS RobustnessDOI 10.1145/3232755.3232773 | Comments On DNS Robustness | Proceedings |
2018-07 | Al-Dalky et al. | Practical Challenge-Response for DNSDOI 10.1145/3232755.3232765 | Practical Challenge-Response for DNS | Proceedings |
2018-06 | Szurdi & Christin | Domain Registration Policy Strategies and the Fight against Online Crime | Domain Registration Policy Strategies and the Fight against Online Crime | Proceedings |
2018-06 | Sehnoutka, M. | Automatic verification of software packages with help of DNS | Automatic verification of software packages with help of DNS | Master's Thesis |
2018-06 | Perrin, S. | The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World's Data Protection Authorities | The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World's Data Protection Authorities | Doctoral Thesis |
2018-06 | Messabi et al. | Malware detection using DNS records and domain name featuresDOI 10.1145/3231053.3231082 | Malware detection using DNS records and domain name features | Proceedings |
2018-05 | Weber et al. | Unsupervised Clustering for Identification of Malicious Domain CampaignsDOI 10.1145/3203422.3203423 | Unsupervised Clustering for Identification of Malicious Domain Campaigns | Proceedings |
2018-05 | Korczyński et al. | Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsDOI 10.1145/3196494.3196548 | Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs | Proceedings |
2018-04 | Moosavi, S. | Rethinking Certificate Authorities: Understanding and decentralizing domain validation | Rethinking Certificate Authorities: Understanding and decentralizing domain validation | Master's Thesis |
2018-04 | Miramirkhani et al. | Panning for gold.com: Understanding the Dynamics of Domain DropcatchingDOI 10.1145/3178876.3186092 | Panning for gold.com: Understanding the Dynamics of Domain Dropcatching | Proceedings |
2018-03 | Khalil et al. | A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceDOI 10.1145/3176258.3176329 | A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference | Proceedings |
2018-03 | Hananto et al. | Detecting Network Security Threats Using Domain Name System and NetFlow TrafficDOI 10.1145/3199478.3199505 | Detecting Network Security Threats Using Domain Name System and NetFlow Traffic | Proceedings |
2018-03 | Gould et al. | RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8334 | RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2018-03 | Dickinson et al. | RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSDOI 10.17487/RFC8310 | RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLS | Internet Specification |
2018-01 | Hao, S. | On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications DOI 10.21220/s2-d0nn-d249 | On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications | Doctoral Thesis |
2018-01 | Ferrante, A. | The impact of GDPR on WHOIS: Implications for businesses facing cybercrime | The impact of GDPR on WHOIS: Implications for businesses facing cybercrime | Journal Article |
2018-01 | Ding, C. | A new institutional economics analysis of the history of the regulation of the .cn (China) country-code top-level domain from 1990 to 2004DOI 10.25949/19439372.v1 | A new institutional economics analysis of the history of the regulation of the .cn (China) country-code top-level domain from 1990 to 2004 | Doctoral Thesis |
2017-12 | Xu et al. | An Adaptive Malicious Domain Detection Mechanism with DNS TrafficDOI 10.1145/3171592.3171595 | An Adaptive Malicious Domain Detection Mechanism with DNS Traffic | Proceedings |
2017-12 | Elliott, K. | The Who, What, Where, When, and Why of WHOIS: Privacy and Accuracy Concerns of the WHOIS Database | The Who, What, Where, When, and Why of WHOIS: Privacy and Accuracy Concerns of the WHOIS Database | Journal Article |
2017-11 | Szurdi & Christin | Email typosquattingDOI 10.1145/3131365.3131399 | Email typosquatting | Proceedings |
2017-11 | Sun et al. | Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelDOI 10.1145/3127540.3127567 | Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model | Proceedings |
2017-11 | Müller et al. | Recursives in the wild: engineering authoritative DNS serversDOI 10.1145/3131365.3131366 | Recursives in the wild: engineering authoritative DNS servers | Proceedings |
2017-11 | Lee & Spring | Identifying and Analyzing Broadband Internet Reverse DNS NamesDOI 10.1145/3143361.3143392 | Identifying and Analyzing Broadband Internet Reverse DNS Names | Proceedings |
2017-11 | Chung et al. | Understanding the role of registrars in DNSSEC deploymentDOI 10.1145/3131365.3131373 | Understanding the role of registrars in DNSSEC deployment | Proceedings |
2017-11 | Almeida et al. | Dissecting DNS Stakeholders in Mobile NetworksDOI 10.1145/3143361.3143375 | Dissecting DNS Stakeholders in Mobile Networks | Proceedings |
2017-10 | Vissers et al. | The Wolf of Name Street: Hijacking Domains Through Their NameserversDOI 10.1145/3133956.3133988 | The Wolf of Name Street: Hijacking Domains Through Their Nameservers | Proceedings |
2017-10 | Spaulding et al. | Understanding the effectiveness of typosquatting techniquesDOI 10.1145/3132465.3132467 | Understanding the effectiveness of typosquatting techniques | Proceedings |
2017-10 | Shanmugasundaram, S. | A DNS Based Architecture for Publication and Discovery of Virtual Network Functions in Content Delivery Networks | A DNS Based Architecture for Publication and Discovery of Virtual Network Functions in Content Delivery Networks | Master's Thesis |
2017-10 | Scaife et al. | OnionDNS: a seizure-resistant top-level domainDOI 10.1007/s10207-017-0391-z | OnionDNS: a seizure-resistant top-level domain | Journal Article |
2017-10 | Mohaisen et al. | Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresDOI 10.1109/TNET.2017.2717965 | Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures | Journal Article |
2017-10 | Klein et al. | X-Ray Your DNSDOI 10.1145/3133956.3138821 | X-Ray Your DNS | Proceedings |
2017-10 | Fukuda et al. | Detecting Malicious Activity With DNS Backscatter Over TimeDOI 10.1109/TNET.2017.2724506 | Detecting Malicious Activity With DNS Backscatter Over Time | Journal Article |
2017-10 | Feibish et al. | Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesDOI 10.1145/3132465.3132474 | Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches | Proceedings |
2017-10 | Chen et al. | Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyDOI 10.1145/3133956.3134084 | Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study | Proceedings |
2017-08 | Sperotto et al. | TIDE: Threat Identification Using Active DNS MeasurementsDOI 10.1145/3123878.3131988 | TIDE: Threat Identification Using Active DNS Measurements | Proceedings |
2017-08 | Rijswijk-Deij et al. | The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverDOI 10.1145/3123878.3131987 | The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover | Proceedings |
2017-08 | Booth & Andersson | DNS DDoS Mitigation, via DNS Timer Design ChangesDOI 10.1007/978-3-319-65548-2_4 | DNS DDoS Mitigation, via DNS Timer Design Changes | Proceedings |
2017-07 | Radwan, M. | The Domain Name System Advisor, A Model-Based Quality Assurance Framework | The Domain Name System Advisor, A Model-Based Quality Assurance Framework | Doctoral Thesis |
2017-06 | Zhang et al. | Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesDOI 10.1016/j.procs.2017.05.204 | Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual Features | Proceedings |
2017-06 | Wassermann, S. | Anycast-based DNS in Mobile Networks | Anycast-based DNS in Mobile Networks | Master's Thesis |
2017-06 | Ali, M. | Trust-to-trust design of a new Internet | Trust-to-trust design of a new Internet | Doctoral Thesis |
2017-04 | Simeonovski et al. | Who Controls the Internet?: Analyzing Global Threats using Property Graph TraversalsDOI 10.1145/3038912.3052587 | Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals | Proceedings |
2017-04 | Silvestro et al. | Is today's DNS the right solution for middleboxes selection?DOI 10.1145/3069383.3069389 | Is today's DNS the right solution for middleboxes selection? | Proceedings |
2017-04 | Radwan & Heckel | Prediction of the domain name system (DNS) quality attributesDOI 10.1145/3019612.3019728 | Prediction of the domain name system (DNS) quality attributes | Proceedings |
2017-03 | Koch et al. | RFC 8109: Initializing a DNS Resolver with Priming QueriesDOI 10.17487/RFC8109 | RFC 8109: Initializing a DNS Resolver with Priming Queries | Internet Specification |
2017-02 | Ribbers et al. | RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolDOI 10.17487/RFC8063 | RFC 8063: Key Relay Mapping for the Extensible Provisioning Protocol | Internet Specification |
2017-02 | Reddy et al. | RFC 8094: DNS over Datagram Transport Layer Security (DTLS)DOI 10.17487/RFC8094 | RFC 8094: DNS over Datagram Transport Layer Security (DTLS) | Internet Specification |
2017-02 | Jayarathna, W. | Security techniques for virtual machine based systemsDOI 10.25949/19431446.v1 | Security techniques for virtual machine based systems | Doctoral Thesis |
2017-01 | Hao & Wang | Exploring Domain Name Based Features on the Effectiveness of DNS CachingDOI 10.1145/3041027.3041032 | Exploring Domain Name Based Features on the Effectiveness of DNS Caching | Journal Article |
2017-01 | Gould, J. | RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingDOI 10.17487/RFC8056 | RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status Mapping | Internet Specification |
2017-01 | Aizuddin et al. | DNS amplification attack detection and mitigation via sFlow with security-centric SDNDOI 10.1145/3022227.3022230 | DNS amplification attack detection and mitigation via sFlow with security-centric SDN | Proceedings |
2016-11 | Ruohonen et al. | Correlating file-based malware graphs against the empirical ground truth of DNS graphsDOI 10.1145/2993412.2993414 | Correlating file-based malware graphs against the empirical ground truth of DNS graphs | Proceedings |
2016-11 | Moura et al. | Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventDOI 10.1145/2987443.2987446 | Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event | Proceedings |
2016-11 | Lauinger et al. | WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationDOI 10.1145/2987443.2987463 | WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration | Proceedings |
2016-11 | Korczyński et al. | Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesDOI 10.1145/2987443.2987477 | Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates | Proceedings |
2016-10 | Wright et al. | Hands-on exercises about DNS attacks: details, setup and lessons learned | Hands-on exercises about DNS attacks: details, setup and lessons learned | Journal Article |
2016-10 | van Rijswijk-Deij et al. | On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC | On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC | Proceedings |
2016-10 | Liu et al. | All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsDOI 10.1145/2976749.2978387 | All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records | Proceedings |
2016-10 | Katzlinger, H. | Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher Perspektive | Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher Perspektive | Master's Thesis |
2016-10 | Hao et al. | PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationDOI 10.1145/2976749.2978317 | PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration | Proceedings |
2016-10 | Farnan et al. | Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesDOI 10.1145/2994620.2994636 | Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses | Proceedings |
2016-10 | Cifuentes et al. | Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECDOI 10.1145/2998373.2998452 | Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSEC | Proceedings |
2016-08 | Wijekoon & Nishi | Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3 | Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3 | Proceedings |
2016-08 | Meitei et al. | Detection of DDoS DNS Amplification Attack Using Classification AlgorithmDOI 10.1145/2980258.2980431 | Detection of DDoS DNS Amplification Attack Using Classification Algorithm | Proceedings |
2016-08 | Jeong et al. | A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureDOI 10.1145/2934872.2960423 | A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure | Proceedings |
2016-08 | Gautam, R. | Analysis and implementation of WHOIS domain lookupISSN 2454-2024 | Analysis and implementation of WHOIS domain lookup | Journal Article |
2016-07 | Hands, N. | Detection of communication over DNSSEC covert channels | Detection of communication over DNSSEC covert channels | Master's Thesis |
2016-06 | Sahri & Okamura | Protecting DNS services from IP spoofing: SDN collaborative authentication approachDOI 10.1145/2935663.2935666 | Protecting DNS services from IP spoofing: SDN collaborative authentication approach | Proceedings |
2016-06 | Ruohonen & Leppänen | On the Design of a Simple Network Resolver for DNS MiningDOI 10.1145/2983468.2983513 | On the Design of a Simple Network Resolver for DNS Mining | Proceedings |
2016-06 | Holzmann et al. | The Dawn of Today's Popular Domains: A Study of the Archived German Web over 18 YearsDOI 10.1145/2910896.2910901 | The Dawn of Today's Popular Domains: A Study of the Archived German Web over 18 Years | Proceedings |
2016-05 | Khalil et al. | Discovering Malicious Domains through Passive DNS Data Graph AnalysisDOI 10.1145/2897845.2897877 | Discovering Malicious Domains through Passive DNS Data Graph Analysis | Proceedings |
2016-05 | Hu et al. | RFC 7858: Specification for DNS over Transport Layer Security (TLS)DOI 10.17487/RFC7858 | RFC 7858: Specification for DNS over Transport Layer Security (TLS) | Internet Specification |
2016-03 | Hermann, D. | Beobachtungsmöglichkeiten im Domain Name SystemDOI 10.1007/978-3-658-13263-7 | Beobachtungsmöglichkeiten im Domain Name System | Book |
2016-03 | Cormack, A. | Do generic gTLDs require their own ex ante regulation?DOI 10.1080/13600869.2016.1145869 | Do generic gTLDs require their own ex ante regulation? | Journal Article |
2016-02 | Gao et al. | Reexamining DNS from a global recursive resolver perspectiveDOI 10.1109/TNET.2014.2358637 | Reexamining DNS from a global recursive resolver perspective | Proceedings |
2016-01 | Haneef, A. | On the Scalable Generation of Cyber Threat Intelligence from Passive DNS Streams | On the Scalable Generation of Cyber Threat Intelligence from Passive DNS Streams | Master's Thesis |
2016-01 | Benchaita et al. | Stability and optimization of DNS-based request redirection in CDNsDOI 10.1145/2833312.2833455 | Stability and optimization of DNS-based request redirection in CDNs | Proceedings |
2015-12 | van Zyl, I. | A longitudinal study of DNS traffic: Understanding current DNS practice and abuse | A longitudinal study of DNS traffic: Understanding current DNS practice and abuse | Master's Thesis |
2015-10 | Liu et al. | Who is .com?: Learning to Parse WHOIS RecordsDOI 10.1145/2815675.2815693 | Who is .com?: Learning to Parse WHOIS Records | Proceedings |
2015-10 | Kührer et al. | Going Wild: Large-Scale Classification of Open DNS ResolversDOI 10.1145/2815675.2815683 | Going Wild: Large-Scale Classification of Open DNS Resolvers | Proceedings |
2015-10 | Halvorson et al. | From .academy to .zone: An Analysis of the New TLD Land RushDOI 10.1145/2815675.2815696 | From .academy to .zone: An Analysis of the New TLD Land Rush | Proceedings |
2015-10 | Fukuda & Heidemann | Detecting Malicious Activity with DNS BackscatterDOI 10.1145/2815675.2815706 | Detecting Malicious Activity with DNS Backscatter | Proceedings |
2015-10 | Bruen, G. | WHOIS Running the Internet: Protocol, Policy, and PrivacyDOI 10.1002/9781118985786 | WHOIS Running the Internet: Protocol, Policy, and Privacy | Book |
2015-09 | Rijswijk-Deij et al. | Making the Case for Elliptic Curves in DNSSECDOI 10.1145/2831347.2831350 | Making the Case for Elliptic Curves in DNSSEC | Journal Article |
2015-09 | Hands et al. | A Study on Botnets Utilizing DNSDOI 10.1145/2808062.2808070 | A Study on Botnets Utilizing DNS | Proceedings |
2015-08 | Rijswijk-Deij et al. | The Internet of Names: A DNS Big DatasetDOI 10.1145/2785956.2789996 | The Internet of Names: A DNS Big Dataset | Proceedings |
2015-08 | Nadji, Y. | Understanding DNS-based criminal infrastructure for informing takedowns | Understanding DNS-based criminal infrastructure for informing takedowns | Doctoral Thesis |
2015-06 | Marchal, S. | DNS and Semantic Analysis for Phishing Detection | DNS and Semantic Analysis for Phishing Detection | Doctoral Thesis |
2015-06 | Davis, R.C. | Teaching the Network: A Brief Demonstration of the Internet's Structure for Information Literacy InstructionDOI 10.1080/01639269.2015.1042820 | Teaching the Network: A Brief Demonstration of the Internet's Structure for Information Literacy Instruction | Journal Article |
2015-06 | Bašti, M. | Synchronization of DNS Records between LDAP Database and DNS Server | Synchronization of DNS Records between LDAP Database and DNS Server | Master's Thesis |
2015-05 | Lafta & Mihaylov | Securing DNSSEC Last Mile with DTLS | Securing DNSSEC Last Mile with DTLS | Master's Thesis |
2015-04 | Cold, S. | DETERMINING THE INFLUENCE OF THE NETWORK TIME PROTOCOL (NTP) ON THE DOMAIN NAME SERVICE SECURITY EXTENSION (DNSSEC) PROTOCOL | DETERMINING THE INFLUENCE OF THE NETWORK TIME PROTOCOL (NTP) ON THE DOMAIN NAME SERVICE SECURITY EXTENSION (DNSSEC) PROTOCOL | Doctoral Thesis |
2015-03 | Zhou et al. | RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsDOI 10.17487/RFC7485 | RFC 7485: Inventory and Analysis of WHOIS Registration Objects | Internet Specification |
2015-03 | Newton et al. | RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7480 | RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Newton & Hollenbeck | RFC 7482: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC7482 | RFC 7482: Registration Data Access Protocol (RDAP) Query Format | Internet Specification |
2015-03 | Newton & Hollenbeck | RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7483 | RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Horne, W. | Collecting, Analyzing and Responding to Enterprise Scale DNS EventsDOI 10.1145/2699026.2699027 | Collecting, Analyzing and Responding to Enterprise Scale DNS Events | Proceedings |
2015-03 | Hollenbeck & Kong | RFC 7481: Security Services for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7481 | RFC 7481: Security Services for the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Blanchet, M. | RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceDOI 10.17487/RFC7484 | RFC 7484: Finding the Authoritative Registration Data (RDAP) Service | Internet Specification |
2015-02 | Hollenbeck, S. | RFC 7451: Extension Registry for the Extensible Provisioning ProtocolDOI 10.17487/RFC7451 | RFC 7451: Extension Registry for the Extensible Provisioning Protocol | Internet Specification |
2015-02 | Agten et al. | Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseDOI 10.14722/ndss.2015.23058 | Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse | Proceedings |
2014-12 | Zhang et al. | Research on Privacy Protection of WHOIS Information in DNSDOI 10.1007/978-3-662-45402-2_11 | Research on Privacy Protection of WHOIS Information in DNS | Book Section |
2014-12 | Herzberg & Shulman | DNS authentication as a service: preventing amplification attacksDOI 10.1145/2664243.2664281 | DNS authentication as a service: preventing amplification attacks | Proceedings |
2014-11 | Zaki et al. | Dissecting Web Latency in GhanaDOI 10.1145/2663716.2663748 | Dissecting Web Latency in Ghana | Proceedings |
2014-11 | Wang, Z. | On the Capability of DNS Cache Poisoning AttacksDOI 10.1145/2660267.2662363 | On the Capability of DNS Cache Poisoning Attacks | Proceedings |
2014-11 | Thomas & Mohaisen | Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemDOI 10.1145/2665943.2665951 | Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system | Proceedings |
2014-11 | Shulman, H. | Pretty Bad Privacy: Pitfalls of DNS EncryptionDOI 10.1145/2665943.2665959 | Pretty Bad Privacy: Pitfalls of DNS Encryption | Proceedings |
2014-11 | Shulman & Ezra | On the Resilience of DNS InfrastructureDOI 10.1145/2660267.2662376 | On the Resilience of DNS Infrastructure | Proceedings |
2014-11 | Rula & Bustamante | Behind the Curtain: Cellular DNS and Content Replica SelectionDOI 10.1145/2663716.2663734 | Behind the Curtain: Cellular DNS and Content Replica Selection | Proceedings |
2014-11 | Rijswijk-Deij et al. | DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyDOI 10.1145/2663716.2663731 | DNSSEC and its potential for DDoS attacks: a comprehensive measurement study | Proceedings |
2014-11 | Al Ramahi, M. | AN INVESTIGATION INTO THE LEGAL STATUS OF INTERNET DOMAIN NAMES | AN INVESTIGATION INTO THE LEGAL STATUS OF INTERNET DOMAIN NAMES | Doctoral Thesis |
2014-10 | Schomp et al. | DNS Resolvers Considered HarmfulDOI 10.1145/2670518.2673881 | DNS Resolvers Considered Harmful | Proceedings |
2014-09 | Kumari et al. | RFC 7344: Automating DNSSEC Delegation Trust MaintenanceDOI 10.17487/RFC7344 | RFC 7344: Automating DNSSEC Delegation Trust Maintenance | Internet Specification |
2014-09 | Fernandez & Vanhilst | The secure and trustable distributed name system pattern | The secure and trustable distributed name system pattern | Proceedings |
2014-09 | Bianzino et al. | Who is whois? An analysis of results consistenceDOI 10.1109/SOFTCOM.2014.7039137 | Who is whois? An analysis of results consistence | Proceedings |
2014-08 | Zhu et al. | T-DNS: connection-oriented DNS to improve privacy and securityDOI 10.1145/2619239.2631442 | T-DNS: connection-oriented DNS to improve privacy and security | Proceedings |
2014-07 | Huffaker et al. | DRoP: DNS-based router positioningDOI 10.1145/2656877.2656879 | DRoP: DNS-based router positioning | Proceedings |
2014-07 | Binsalleeh, H. | Analysis of Malware and Domain Name System Traffic | Analysis of Malware and Domain Name System Traffic | Doctoral Thesis |
2014-06 | Lehmberg et al. | Graph structure in the web: aggregated by pay-level domainDOI 10.1145/2615569.2615674 | Graph structure in the web: aggregated by pay-level domain | Proceedings |
2014-06 | Clayton & Mansfield | A Study of Whois Privacy and Proxy Service Abuse | A Study of Whois Privacy and Proxy Service Abuse | Proceedings |
2014-05 | Včelák, J. | Library and Tools for Server-Side DNSSEC Implementation | Library and Tools for Server-Side DNSSEC Implementation | Master's Thesis |
2014-05 | Parunak et al. | An agent-based framework for dynamical understanding of DNS events (DUDE)DOI 10.1145/2602945.2602951 | An agent-based framework for dynamical understanding of DNS events (DUDE) | Proceedings |
2014-04 | Thomas & Mohaisen | Kindred domains: detecting and clustering botnet domains using DNS trafficDOI 10.1145/2567948.2579359 | Kindred domains: detecting and clustering botnet domains using DNS traffic | Proceedings |
2014-04 | Himbeault, M. | A novel approach to detecting covert DNS tunnels using throughput estimation | A novel approach to detecting covert DNS tunnels using throughput estimation | Master's Thesis |
2014-04 | Halvorson et al. | XXXtortion?: inferring registration intent in the .XXX TLDDOI 10.1145/2566486.2567995 | XXXtortion?: inferring registration intent in the .XXX TLD | Proceedings |
2014-04 | Bilge et al. | Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsDOI 10.1145/2584679 | Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | Journal Article |
2014-03 | Leontiadis & Christin | Empirically Measuring WHOIS MisuseDOI 10.1007/978-3-319-11203-9_2 | Empirically Measuring WHOIS Misuse | Book Section |
2014-01 | Jayarathna et al. | Hypervisor-based security architecture for validating DNS services | Hypervisor-based security architecture for validating DNS services | Proceedings |
2013-12 | Fofack & Alouf | Modeling modern DNS cachesDOI 10.4108/icst.valuetools.2013.254416 | Modeling modern DNS caches | Proceedings |
2013-11 | Watters et al. | ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?DOI 10.1109/CTC.2013.13 | ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? | Proceedings |
2013-11 | Kazato et al. | Towards classification of DNS erroneous queriesDOI 10.1145/2534142.2534146 | Towards classification of DNS erroneous queries | Proceedings |
2013-11 | Chitpranee & Fukuda | Towards passive DNS software fingerprintingDOI 10.1145/2534142.2534144 | Towards passive DNS software fingerprinting | Proceedings |
2013-11 | Anagnostopoulos et al. | DNS amplification attack revisitedDOI 10.1016/j.cose.2013.10.001 | DNS amplification attack revisited | Journal Article |
2013-10 | Streibelt et al. | Exploring EDNS-client-subnet adopters in your free timeDOI 10.1145/2504730.2504767 | Exploring EDNS-client-subnet adopters in your free time | Proceedings |
2013-10 | Schomp et al. | On measuring the client-side DNS infrastructureDOI 10.1145/2504730.2504734 | On measuring the client-side DNS infrastructure | Proceedings |
2013-10 | Hao et al. | Understanding the domain registration behavior of spammersDOI 10.1145/2504730.2504753 | Understanding the domain registration behavior of spammers | Proceedings |
2013-10 | Garcia, F. | DNS: (do not suspect)DOI 10.1145/2512209.2512222 | DNS: (do not suspect) | Proceedings |
2013-10 | Berger et al. | Internet nameserver IPv4 and IPv6 address relationshipsDOI 10.1145/2504730.2504745 | Internet nameserver IPv4 and IPv6 address relationships | Proceedings |
2013-08 | Gao et al. | An empirical reexamination of global DNS behaviorDOI 10.1145/2486001.2486018 | An empirical reexamination of global DNS behavior | Proceedings |
2013-07 | Shue & Kalafut | Resolvers Revealed: Characterizing DNS Resolvers and their ClientsDOI 10.1145/2499926.2499928 | Resolvers Revealed: Characterizing DNS Resolvers and their Clients | Journal Article |
2013-07 | Callahan et al. | On modern DNS behavior and propertiesDOI 10.1145/2500098.2500100 | On modern DNS behavior and properties | Journal Article |
2013-05 | Yuan et al. | A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesDOI 10.1145/2461321.2461324 | A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies | Journal Article |
2013-04 | Damas et al. | RFC 6891: Extension Mechanisms for DNS (EDNS(0))DOI 10.17487/RFC6891 | RFC 6891: Extension Mechanisms for DNS (EDNS(0)) | Internet Specification |
2013-03 | Selby, J. | A new institutional economics analysis of the history of the regulation of the .au country-code top-level domain from 1986 to 2002DOI 10.26190/unsworks/2473 | A new institutional economics analysis of the history of the regulation of the .au country-code top-level domain from 1986 to 2002 | Doctoral Thesis |
2013-02 | Cheshire & Krochmal | RFC 6762: Multicast DNSDOI 10.17487/RFC6762 | RFC 6762: Multicast DNS | Internet Specification |
2013-02 | Weiler & Blacka | RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)DOI 10.17487/RFC6840 | RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC) | Internet Specification |
2013-01 | Ljunggren et al. | RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsDOI 10.17487/RFC6841 | RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice Statements | Internet Specification |
2012-12 | Severance, C. | Vint Cerf: A Brief History of PacketsDOI 10.1109/MC.2012.422 | Vint Cerf: A Brief History of Packets | Journal Article |
2012-12 | Rose, S. | Progress of DNS security deployment in the federal government | Progress of DNS security deployment in the federal government | Proceedings |
2012-12 | Kolkman et al. | RFC 6781: DNSSEC Operational Practices, Version 2DOI 10.17487/RFC6781 | RFC 6781: DNSSEC Operational Practices, Version 2 | Internet Specification |
2012-11 | Otto et al. | Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsDOI 10.1145/2398776.2398831 | Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutions | Proceedings |
2012-11 | Bermudez et al. | DNS to the rescue: discerning content and services in a tangled webDOI 10.1145/2398776.2398819 | DNS to the rescue: discerning content and services in a tangled web | Proceedings |
2012-10 | Kaliski, B. | Revisiting DNS and WHOIS in the cloud eraDOI 10.1145/2381913.2381929 | Revisiting DNS and WHOIS in the cloud era | Proceedings |
2012-10 | Dagon, D. | Large-scale DNS data analysisDOI 10.1145/2382196.2382325 | Large-scale DNS data analysis | Proceedings |
2012-09 | Stallings et al. | “WHOIS” Selling All The PillsDOI 10.5769/J201202004 | “WHOIS” Selling All The Pills | Journal Article |
2012-08 | Otto et al. | namehelp: intelligent client-side DNS resolutionDOI 10.1145/2342356.2342413 | namehelp: intelligent client-side DNS resolution | Proceedings |
2012-08 | Chaudhry et al. | Signposts: end-to-end networking in a world of middleboxesDOI 10.1145/2342356.2342371 | Signposts: end-to-end networking in a world of middleboxes | Proceedings |
2012-07 | Anonymous | The collateral damage of internet censorship by DNS injectionDOI 10.1145/2317307.2317311 | The collateral damage of internet censorship by DNS injection | Journal Article |
2012-06 | Rose & Wijngaards | RFC 6672: DNAME Redirection in the DNSDOI 10.17487/RFC6672 | RFC 6672: DNAME Redirection in the DNS | Internet Specification |
2012-05 | Zhou, F. | New cloud architectures for the next generation internet | New cloud architectures for the next generation internet | Doctoral Thesis |
2012-04 | Yu et al. | Authority server selection in DNS caching resolversDOI 10.1145/2185376.2185387 | Authority server selection in DNS caching resolvers | Journal Article |
2012-04 | Sullivan & Kucherawy | Revisiting Whois: Coming to REST10.1109/MIC.2012.55 | Revisiting Whois: Coming to REST | Journal Article |
2012-03 | Kagwe & Masinde | Survey on DNS configurations, interdependencies, resilience and security for *.ke domainsDOI 10.1145/2160601.2160632 | Survey on DNS configurations, interdependencies, resilience and security for *.ke domains | Proceedings |
2012-03 | Halvorson et al. | The BIZ Top-Level Domain: Ten Years LaterDOI 10.1007/978-3-642-28537-0_22 | The BIZ Top-Level Domain: Ten Years Later | Proceedings |
2012-03 | Deri et al. | Towards a passive DNS monitoring systemDOI 10.1145/2245276.2245396 | Towards a passive DNS monitoring system | Proceedings |
2012-03 | Crowcroft, J. | The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...DOI 10.1145/2185376.2185392 | The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is... | Journal Article |
2012-01 | Ballmann, C. | WHOIS DNS?DOI 10.1007/978-3-642-24305-9_6 | WHOIS DNS? | Book Section |
2011-12 | Khurshid et al. | Improving robustness of DNS to software vulnerabilitiesDOI 10.1145/2076732.2076758 | Improving robustness of DNS to software vulnerabilities | Proceedings |
2011-12 | Kalafut et al. | Touring DNS open houses for trends and configurationsDOI 10.1109/TNET.2011.2130537 | Touring DNS open houses for trends and configurations | Proceedings |
2011-11 | Hao et al. | Monitoring the initial DNS behavior of malicious domainsDOI 10.1145/2068816.2068842 | Monitoring the initial DNS behavior of malicious domains | Proceedings |
2011-09 | Claffy, Kc C. | Underneath the hood: ownership vs. stewardship of the internetDOI 10.1145/2043165.2043173 | Underneath the hood: ownership vs. stewardship of the internet | Journal Article |
2011-09 | Bai et al. | Defense against DNS Man-In-The-Middle SpoofingDOI 10.1007/978-3-642-23971-7_39 | Defense against DNS Man-In-The-Middle Spoofing | Book Section |
2011-08 | Hurter, E. | Aspects of the nature and online resolution of domain-name disputes | Aspects of the nature and online resolution of domain-name disputes | Doctoral Thesis |
2011-05 | Xu et al. | K-means and adaptive k-means algorithms for clustering DNS trafficDOI 10.5555/2151688.2151720 | K-means and adaptive k-means algorithms for clustering DNS traffic | Proceedings |
2011-04 | Leita & Cova | HARMUR: storing and analyzing historic data on malicious domainsDOI 10.1145/1978672.1978678 | HARMUR: storing and analyzing historic data on malicious domains | Proceedings |
2011-02 | Borkar et al. | Implementation of round robin policy in DNS for thresholding of distributed web server systemDOI 10.1145/1980022.1980067 | Implementation of round robin policy in DNS for thresholding of distributed web server system | Proceedings |
2011-02 | Bilge et al. | EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis | EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis | Proceedings |
2010-12 | Yasmin et al. | Security issues related with DNS dynamic updates for mobile nodes: a surveyDOI 10.1145/1943628.1943645 | Security issues related with DNS dynamic updates for mobile nodes: a survey | Proceedings |
2010-11 | Yadav et al. | Detecting algorithmically generated malicious domain namesDOI 10.1145/1879141.1879148 | Detecting algorithmically generated malicious domain names | Proceedings |
2010-11 | Kalafut et al. | An empirical study of orphan DNS servers in the internetDOI 10.1145/1879141.1879182 | An empirical study of orphan DNS servers in the internet | Proceedings |
2010-11 | Chatzis, N. | Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDOI 10.14279/depositonce-2647 | Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and Mitigation | Doctoral Thesis |
2010-11 | Ager et al. | Comparing DNS resolvers in the wildDOI 10.1145/1879141.1879144 | Comparing DNS resolvers in the wild | Proceedings |
2010-08 | Klensin, J. | RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolDOI 10.17487/RFC5891 | RFC 5891: Internationalized Domain Names in Applications (IDNA): Protocol | Internet Specification |
2010-06 | Schiavetta & Komaitis | ICANN's role in controlling information on the internetDOI 10.1080/1360086032000174379 | ICANN's role in controlling information on the internet | Journal Article |
2010-06 | Lewis & Hoenes | RFC 5936: DNS Zone Transfer Protocol (AXFR)DOI 10.17487/RFC5936 | RFC 5936: DNS Zone Transfer Protocol (AXFR) | Internet Specification |
2010-05 | Gould & Hollenbeck | RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5910 | RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2010-05 | Abley & Manderson | RFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesDOI 10.17487/RFC5855 | RFC 5855: Nameservers for IPv4 and IPv6 Reverse Zones | Internet Specification |
2010-04 | Born & Gustafson | NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisDOI 10.1145/1852666.1852718 | NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis | Proceedings |
2010-01 | Carpenter & Partridge | Internet requests for comments (RFCs) as scholarly publicationsDOI 10.1145/1672308.1672315 | Internet requests for comments (RFCs) as scholarly publications | Journal Article |
2009-12 | Vixie, P. | What DNS is notDOI 10.1145/1610252.1610269 | What DNS is not | Journal Article |
2009-09 | Pfeifer, G. | A New Internet Naming System | A New Internet Naming System | Doctoral Thesis |
2009-08 | Hollenbeck, S. | RFC 5730: Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5730 | RFC 5730: Extensible Provisioning Protocol (EPP) | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingDOI 10.17487/RFC5731 | RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingDOI 10.17487/RFC5732 | RFC 5732: Extensible Provisioning Protocol (EPP) Host Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingDOI 10.17487/RFC5733 | RFC 5733: Extensible Provisioning Protocol (EPP) Contact Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPDOI 10.17487/RFC5734 | RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCP | Internet Specification |
2009-03 | Villamarín-Salomón & Brustoloni | Bayesian bot detection based on DNS traffic similarityDOI 10.1145/1529282.1529734 | Bayesian bot detection based on DNS traffic similarity | Proceedings |
2008-10 | Plonka & Barford | Context-aware clustering of DNS query trafficDOI 10.1145/1452520.1452547 | Context-aware clustering of DNS query traffic | Proceedings |
2008-10 | Kalafut et al. | Understanding implications of DNS zone provisioningDOI 10.1145/1452520.1452546 | Understanding implications of DNS zone provisioning | Proceedings |
2008-10 | Damas & Neves | RFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksDOI 10.17487/RFC5358 | RFC 5358: Preventing Use of Recursive Nameservers in Reflector Attacks | Internet Specification |
2008-10 | Dagon et al. | Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesDOI 10.1145/1455770.1455798 | Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries | Proceedings |
2008-10 | Ballani & Francis | Mitigating DNS DoS attacksDOI 10.1145/1455770.1455796 | Mitigating DNS DoS attacks | Proceedings |
2008-09 | Goth, G. | ICANN's TLD Plans Are Defined, Not Yet RefinedDOI 10.1109/MIC.2008.102 | ICANN's TLD Plans Are Defined, Not Yet Refined | Journal Article |
2008-08 | Atkinson et al. | Mobility through naming: impact on DNSDOI 10.1145/1403007.1403010 | Mobility through naming: impact on DNS | Proceedings |
2008-04 | Akcan et al. | Geographic web usage estimation by monitoring DNS cachesDOI 10.1145/1367798.1367813 | Geographic web usage estimation by monitoring DNS caches | Proceedings |
2008-03 | Laurie et al. | RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceDOI 10.17487/RFC5155 | RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence | Internet Specification |
2007-12 | Lindsay, D. | International Domain Name Law: ICANN and the UDRPISBN 978-1841135847 | International Domain Name Law: ICANN and the UDRP | Book |
2007-10 | Jackson et al. | Protecting browsers from DNS rebinding attacksDOI 10.1145/1315245.1315298 | Protecting browsers from DNS rebinding attacks | Proceedings |
2007-10 | Cano et al. | Solving the user-to-host binding problem in ad hoc networks through photo-idsDOI 10.1145/1298197.1298212 | Solving the user-to-host binding problem in ad hoc networks through photo-ids | Proceedings |
2007-07 | Zhang et al. | Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingDOI 10.1145/1326304.1326314 | Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding | Proceedings |
2007-05 | Alzoubi et al. | MyXDNS: a resquest routing dns server with decoupled server selectionDOI 10.1145/1242572.1242620 | MyXDNS: a resquest routing dns server with decoupled server selection | Proceedings |
2007-04 | Vixie, P. | DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.DOI 10.1145/1242489.1242499 | DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system. | Journal Article |
2007-04 | Ariyapperuma & Mitchell | Security vulnerabilities in DNS and DNSSECDOI 10.1109/ARES.2007.139 | Security vulnerabilities in DNS and DNSSEC | Proceedings |
2007-01 | Efroni, Z. | Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsISBN 978-0275988821 | Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark Rights | Book Section |
2006-12 | Padmanabhan et al. | A study of end-to-end web access failuresDOI 10.1145/1368436.1368457 | A study of end-to-end web access failures | Proceedings |
2006-11 | Ren et al. | Visualizing DNS trafficDOI 10.1145/1179576.1179582 | Visualizing DNS traffic | Proceedings |
2006-10 | Sarat et al. | On the Use of Anycast in DNSDOI 10.1109/ICCCN.2006.286248 | On the Use of Anycast in DNS | Proceedings |
2006-10 | Hedley, S. | A brief history of spamDOI 10.1080/13600830600960758 | A brief history of spam | Journal Article |
2006-09 | Newton, A. | Replacing the Whois Protocol: IRIS and the IETF's CRISP Working GroupDOI 10.1109/MIC.2006.86 | Replacing the Whois Protocol: IRIS and the IETF's CRISP Working Group | Journal Article |
2006-09 | Alexander, T. | Domain name registrars: are they part of the domain name fraud problem?DOI 10.1145/1231047.1231071 | Domain name registrars: are they part of the domain name fraud problem? | Proceedings |
2006-07 | Lewis, E. | RFC 4592: The Role of Wildcards in the Domain Name SystemDOI 10.17487/RFC4592 | RFC 4592: The Role of Wildcards in the Domain Name System | Internet Specification |
2006-07 | Kim et al. | Resolving islands of security problem for DNSSECDOI 10.1145/1143549.1143804 | Resolving islands of security problem for DNSSEC | Proceedings |
2006-07 | Broido et al. | The windows of pivate DNS updatesDOI 10.1145/1140086.1140098 | The windows of pivate DNS updates | Proceedings |
2005-10 | Ramasubramanian & Sirer | Perils of transitive trust in the domain name system | Perils of transitive trust in the domain name system | Proceedings |
2005-10 | Deegan et al. | The main name system: an exercise in centralized computingDOI 10.1145/1096536.1096538 | The main name system: an exercise in centralized computing | Proceedings |
2005-10 | Antonova, S. | Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002) | Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002) | Doctoral Thesis |
2005-08 | Ishibashi et al. | Detecting mass-mailing worm infected hosts by mining DNS traffic dataDOI 10.1145/1080173.1080175 | Detecting mass-mailing worm infected hosts by mining DNS traffic data | Proceedings |
2005-03 | Arends et al. | RFC 4033: DNS Security Introduction and RequirementsDOI 10.17487/RFC4033 | RFC 4033: DNS Security Introduction and Requirements | Internet Specification |
2005-03 | Arends et al. | RFC 4034: Resource Records for the DNS Security ExtensionsDOI 10.17487/RFC4034 | RFC 4034: Resource Records for the DNS Security Extensions | Internet Specification |
2005-03 | Arends et al. | RFC 4035: Protocol Modifications for the DNS Security ExtensionsDOI 10.17487/RFC4035 | RFC 4035: Protocol Modifications for the DNS Security Extensions | Internet Specification |
2005-02 | Fetzer et al. | Enhancing DNS security using the SSL trust infrastructureDOI 10.1109/WORDS.2005.33 | Enhancing DNS security using the SSL trust infrastructure | Proceedings |
2005-01 | Burshtein, S. | Whazup with the WHOIS?ISSN 1702-9228 | Whazup with the WHOIS? | Journal Article |
2004-10 | Pang et al. | Availability, usage, and deployment characteristics of the domain name systemDOI 10.1145/1028788.1028790 | Availability, usage, and deployment characteristics of the domain name system | Proceedings |
2004-10 | Pang et al. | On the responsiveness of DNS-based network controlDOI 10.1145/1028788.1028792 | On the responsiveness of DNS-based network control | Proceedings |
2004-10 | Jung & Sit | An empirical study of spam traffic and the use of DNS black listsDOI 10.1145/1028788.1028838 | An empirical study of spam traffic and the use of DNS black lists | Proceedings |
2004-09 | Pappas et al. | Distributed DNS troubleshootingDOI 10.1145/1016687.1016694 | Distributed DNS troubleshooting | Proceedings |
2004-09 | Hollenbeck, S. | RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3915 | RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2004-09 | Daigle, L. | RFC 3912: WHOIS Protocol SpecificationDOI 10.17487/RFC3912 | RFC 3912: WHOIS Protocol Specification | Internet Specification |
2004-08 | Seshan, S. | Session details: DNS and namingDOI 10.1145/3244279 | Session details: DNS and naming | Proceedings |
2004-08 | Ramasubramanian & Sirer | The design and implementation of a next generation name service for the internetDOI 10.1145/1015467.1015504 | The design and implementation of a next generation name service for the internet | Proceedings |
2004-08 | Pappas et al. | Impact of configuration errors on DNS robustnessDOI 10.1145/1015467.1015503 | Impact of configuration errors on DNS robustness | Proceedings |
2004-03 | Hollenbeck, S. | RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3735 | RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP) | Internet Specification |
2003-10 | Wills et al. | Inferring relative popularity of internet applications by actively querying DNS cachesDOI 10.1145/948205.948216 | Inferring relative popularity of internet applications by actively querying DNS caches | Proceedings |
2003-07 | Broido et al. | Spectroscopy of DNS update trafficDOI 10.1145/781027.781077 | Spectroscopy of DNS update traffic | Proceedings |
2003-05 | Krishnamurthy et al. | DEW: DNS-enhanced web for faster content deliveryDOI 10.1145/775152.775196 | DEW: DNS-enhanced web for faster content delivery | Proceedings |
2002-11 | Liston et al. | Diversity in DNS performance measuresDOI 10.1145/637201.637204 | Diversity in DNS performance measures | Proceedings |
2002-05 | Schumacher et al. | Domain-Namen im InternetDOI 10.1007/978-3-642-55963-1 | Domain-Namen im Internet | Book |
2001-11 | Jung et al. | DNS performance and the effectiveness of cachingDOI 10.1145/505202.505223 | DNS performance and the effectiveness of caching | Proceedings |
2001-11 | Cranor et al. | Characterizing large DNS traces using graphsDOI 10.1145/505202.505210 | Characterizing large DNS traces using graphs | Proceedings |
2001-11 | Ateniese & Mangard | A new approach to DNS security (DNSSEC)DOI 10.1145/501983.501996 | A new approach to DNS security (DNSSEC) | Journal Article |
2000-04 | Froomkin et al. | Domain Names under ICANN: Technical Management or Policy ChokepointDOI 10.1145/332186.545149 | Domain Names under ICANN: Technical Management or Policy Chokepoint | Proceedings |
1998-03 | Mueller, M. | The battle over Internet domain names: Global or national TLDs?DOI 10.1016/S0308-5961(97)00062-1 | The battle over Internet domain names: Global or national TLDs? | Journal Article |
1998-03 | Andrews, M. | RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)DOI 10.17487/RFC2308 | RFC 2308: Negative Caching of DNS Queries (DNS NCACHE) | Internet Specification |
1997-07 | Elz et al. | RFC 2182: Selection and Operation of Secondary DNS ServersDOI 10.17487/RFC2182 | RFC 2182: Selection and Operation of Secondary DNS Servers | Internet Specification |
1997-07 | Elz & Bush | RFC 2181: Clarifications to the DNS SpecificationDOI 10.17487/RFC2181 | RFC 2181: Clarifications to the DNS Specification | Internet Specification |
1997-06 | Williamson, S. | RFC 2167: Referral Whois (RWhois) Protocol V1.5DOI 10.17487/RFC2167 | RFC 2167: Referral Whois (RWhois) Protocol V1.5 | Internet Specification |
1997-04 | Vixie et al. | RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)DOI 10.17487/RFC2136 | RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE) | Internet Specification |
1996-08 | Vixie, P. | RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)DOI 10.17487/RFC1996 | RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY) | Internet Specification |
1996-02 | Barr, D. | RFC 1912: Common DNS Operational and Configuration ErrorsDOI 10.17487/RFC1912 | RFC 1912: Common DNS Operational and Configuration Errors | Internet Specification |
1995-08 | Gargano & Weiss | RFC 1834: Whois and Network Information Lookup Service, Whois++DOI 10.17487/RFC1834 | RFC 1834: Whois and Network Information Lookup Service, Whois++ | Internet Specification |
1994-11 | Williamson & Kosters | RFC 1714: Referral Whois Protocol (RWhois)DOI 10.17487/RFC1714 | RFC 1714: Referral Whois Protocol (RWhois) | Internet Specification |
1994-03 | Postel, J. | RFC 1591: Domain Name System Structure and DelegationDOI 10.17487/RFC1591 | RFC 1591: Domain Name System Structure and Delegation | Internet Specification |
1994-01 | Scheller et al. | Internet Werkzeuge und Dienste: WhoisDOI 10.1007/978-3-642-85137-7_8 | Internet Werkzeuge und Dienste: Whois | Book Section |
1993-11 | Calcari et al. | Network information centers (NICs): is there one on your horizon?DOI 10.1145/263814.263830 | Network information centers (NICs): is there one on your horizon? | Proceedings |
1988-08 | Mockapetris & Dunlap | Development of the domain name systemDOI 10.1145/52324.52338 | Development of the domain name system | Journal Article |
1987-11 | Mockapetris, P. | RFC 1035: Domain names - implementation and specificationDOI 10.17487/RFC1035 | RFC 1035: Domain names - implementation and specification | Internet Specification |
1985-10 | Harrenstien et al. | RFC 954: NICNAME/WHOISDOI 10.17487/RFC0954 | RFC 954: NICNAME/WHOIS | Internet Specification |
1985-09 | Comer & Peterson | Issues in using DARPA domain names for computer mailDOI 10.1145/318951.319036 | Issues in using DARPA domain names for computer mail | Journal Article |
1983-11 | Mockapetris, P. | RFC 882: Domain names: Concepts and facilitiesDOI 10.17487/RFC0882 | RFC 882: Domain names: Concepts and facilities | Internet Specification |
1983-11 | Mockapetris, P. | RFC 883: Domain names: Implementation specificationDOI 10.17487/RFC0883 | RFC 883: Domain names: Implementation specification | Internet Specification |
1982-03 | Harrenstien & White | RFC 812: NICNAME/WHOISDOI 10.1080/19331680802425503 | RFC 812: NICNAME/WHOIS | Internet Specification |