The basis of scientific work is literature research, which can vary in length depending on the topic, time, and skills. This website offers a first overview to find scientific articles, doctoral and master's theses, books, and other works that revolve around the subject of DNS in a broader sense. Sure, there are services like ResearchGate and Google Scholar, but sometimes a curated list is more accessible. Of course, this site is free of charge (please note some works need access through your institution) and does not claim to be complete. Right now, this site covers about 680 works. This list will be updated irregularly. If you have suggestions for new entries, please get in touch by email: works@dnsscience.org.

DateAuthor(s)TitleTitleType
2024-01Li et al.TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed PacketsDOI: 10.1109/SP54263.2024.00046TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed PacketsProceedings
2023-12Yoon et al.Delegation of TLS Authentication to CDNs using Revocable Delegated CredentialsDOI: 10.1145/3627106.3627144Delegation of TLS Authentication to CDNs using Revocable Delegated CredentialsProceedings
2023-12Sharif & BeitollahiDetection of application-layer DDoS attacks using machine learning and genetic algorithmsDOI: 10.1016/j.cose.2023.103511Detection of application-layer DDoS attacks using machine learning and genetic algorithmsJournal Article
2023-12Sebastián et al.Domain and Website Attribution beyond WHOISDOI: 10.1145/3627106.3627190Domain and Website Attribution beyond WHOISProceedings
2023-12Kurihara et al.ODNS: A distributed approach to DNS anonymization with collusion resistance☆DOI: 10.1016/j.comnet.2023.110078ODNS: A distributed approach to DNS anonymization with collusion resistance☆Journal Article
2023-12Koide et al.PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain NamesDOI: 10.1145/3627106.3627111PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain NamesProceedings
2023-12Bovenzi et al.Blockchain Performance in Industry 4.0: Drivers, use cases, and future directionsDOI: 10.1016/j.jii.2023.100513Blockchain Performance in Industry 4.0: Drivers, use cases, and future directionsJournal Article
2023-12Abdelhafez et al.TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environmentDOI: 10.1016/j.jksuci.2023.101797TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environmentJournal Article
2023-11Zhu & QiUnravelling DNS Performance: A Historical Examination of F-ROOT in Southeast AsiaDOI: 10.48550/arXiv.2311.16545Unravelling DNS Performance: A Historical Examination of F-ROOT in Southeast AsiaJournal Article
2023-11Zhang et al.Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersDOI: 10.1145/3576915.3616647Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersProceedings
2023-11Zhang et al.TrustedDomain Compromise Attack in App-in-app EcosystemsDOI: 10.1145/3605762.3624430TrustedDomain Compromise Attack in App-in-app EcosystemsProceedings
2023-11Xu et al.TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS AmplifiersDOI: 10.1145/3576915.3616668TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS AmplifiersProceedings
2023-11Wei et al.CDN-DF: A Learning-based CDN Domain Name Detection Method with DNS Deep Feature ExtractionDOI: 10.1145/3625156.3625174CDN-DF: A Learning-based CDN Domain Name Detection Method with DNS Deep Feature ExtractionProceedings
2023-11Torrealba Aravena et al.Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic AnalysisDOI: 10.23919/CNSM59352.2023.10327913Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic AnalysisProceedings
2023-11Theoder et al.Securing Domain Name Systems with BlockchainDOI: 10.1109/IDSTA58916.2023.10317833Securing Domain Name Systems with BlockchainProceedings
2023-11Singh Samra & BarcellosDDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at ScaleDNS: 10.1145/3629135DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at ScaleProceedings
2023-11Schwartz, B.RFC 9461: Service Binding Mapping for DNS ServersDOI: 10.17487/RFC9461RFC 9461: Service Binding Mapping for DNS ServersInternet Specification
2023-11Schwartz et al.RFC 9460: Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)DOI: 10.17487/RFC9460RFC 9460: Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)Internet Specification
2023-11Pauly et al.RFC 9462: Discovery of Designated ResolversDOI: 10.17487/RFC9462RFC 9462: Discovery of Designated ResolversInternet Specification
2023-11Ma et al.HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learningDOI: 10.1016/j.ipm.2023.103518HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learningJournal Article
2023-11Kaiser et al.Poster: Longitudinal Analysis of DoS AttacksDOI: 10.1145/3576915.3624382Poster: Longitudinal Analysis of DoS AttacksProceedings
2023-11He et al.TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on EthereumDOI: 10.1145/3576915.3623210TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on EthereumProceedings
2023-11Hanna et al.Performance Evaluation of Secure and Privacy-preserving DNS at the 5G EdgeDOI: 10.1109/MASS58611.2023.00019Performance Evaluation of Secure and Privacy-preserving DNS at the 5G EdgeProceedings
2023-11Gibb et al.Where on Earth is the Spatial Name System?DOI: 10.1145/3626111.3628210Where on Earth is the Spatial Name System?Proceedings
2023-11De Coninck et al.URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoTDOI: 10.1145/3628356.3630115URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoTProceedings
2023-11Chaudhary & MishraDDoS attacks in Industrial IoT: A surveyDOI: 10.1016/j.comnet.2023.110015DDoS attacks in Industrial IoT: A surveyJournal Article
2023-11Boucadair et al.RFC 9463: DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)DOI: 10.17487/RFC9463RFC 9463: DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)Internet Specification
2023-11Boucadair et al.RFC 9464: Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNSDOI: 10.17487/RFC9464RFC 9464: Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNSInternet Specification
2023-10Zheng et al.Automated Verification of an In-Production DNS Authoritative EngineDOI: 10.1145/3600006.3613153Automated Verification of an In-Production DNS Authoritative EngineProceedings
2023-10Zhang et al.ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingDOI: 10.48550/arXiv.2310.03202ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingResearch Paper
2023-10Zhang et al.Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesDOI: 10.1145/3618257.3624839Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesProceedings
2023-10Suman, O.P.A Novel Approach for Malicious Domain Classification Based on Dns Traffic Analysis and Machine LearningDOI: 10.2139/ssrn.4592811A Novel Approach for Malicious Domain Classification Based on Dns Traffic Analysis and Machine LearningResearch Paper
2023-10Song, H.Enable Cross-domain QoS for Internet-Scale MetaverseDOI: 10.1109/MetaCom57706.2023.00062Enable Cross-domain QoS for Internet-Scale MetaverseProceedings
2023-10Sommese & JonkerPoster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain NamesDOI: 10.1145/3618257.3624994Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain NamesProceedings
2023-10Singh, H.P.Domain Name Disputes and Their Resolution under UDRP Route: A ReviewDOI: 10.14738/abr.612.5786Domain Name Disputes and Their Resolution under UDRP Route: A ReviewJournal Article
2023-10Pan et al.PACLASS: A Lightweight Classification Framework on DNS-Over-HTTPSDOI: 10.1109/ICC45041.2023.10279398PACLASS: A Lightweight Classification Framework on DNS-Over-HTTPSProceedings
2023-10Nosyk et al.Extended DNS Errors: Unlocking the Full Potential of DNS TroubleshootingDOI: 10.1145/3618257.3624835Extended DNS Errors: Unlocking the Full Potential of DNS TroubleshootingProceedings
2023-10Moure-Garrido et al.Real time detection of malicious DoH traffic using statistical analysisDOI 10.1016/j.comnet.2023.109910Real time detection of malicious DoH traffic using statistical analysisJournal Article
2023-10McQuistin et al.A First Look at the Privacy Harms of the Public Suffix List10.1145/3618257.3624836A First Look at the Privacy Harms of the Public Suffix ListProceedings
2023-10Liu et al.Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent DomainsDOI: 10.1145/3618257.3624805Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent DomainsProceedings
2023-10Liu et al.DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain AnalysisDOI: 10.1109/ICC45041.2023.10279472DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain AnalysisProceedings
2023-10Lemogue et al.Towards Flexible and Compact encoded DNS Messages using CBOR Structures.DOI: 10.1109/IPCCC59175.2023.10253849Towards Flexible and Compact encoded DNS Messages using CBOR Structures.Proceedings
2023-10Jimenez-Berenguel et al.Characterizing Mobile Applications Through Analysis of DNS TrafficDOI: 10.1145/3616394.3618268Characterizing Mobile Applications Through Analysis of DNS TrafficProceedings
2023-10Frankston, B.Forever URLsDOI: 10.1109/MCE.2023.3297925Forever URLsJournal Article
2023-10Du et al.IRRegularities in the Internet Routing RegistryDOI: 10.1145/3618257.3624843IRRegularities in the Internet Routing RegistryProceedings
2023-10Davis & CalvertSoK: On Named Content and Inter-domain RoutingDOI: 10.1145/3623565.3623716SoK: On Named Content and Inter-domain RoutingProceedings
2023-10Czybik et al.Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the WildDOI: 10.1145/3618257.3624827Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the WildProceedings
2023-09Zhu & QiA Comparative Study of DNS Root Query Performance Between ContinentsDOI: 10.1109/CCCAI59026.2023.00010A Comparative Study of DNS Root Query Performance Between ContinentsProceedings
2023-09Zhou et al.Regional IP Anycast: Deployments, Performance, and PotentialsDOI: 10.1145/3603269.3604846Regional IP Anycast: Deployments, Performance, and PotentialsProceedings
2023-09Zhang et al.Detection of Data Leakage Based on DNS TrafficDOI: 10.1109/ICPICS58376.2023.10235404Detection of Data Leakage Based on DNS TrafficProceedings
2023-09Yamamoto et al.Iterative Resolution with IPv6 Packets FailingDOI: 10.1109/ICCCN58024.2023.10230170Iterative Resolution with IPv6 Packets FailingProceedings
2023-09Yamamoto et al.Poster: Evaluation of IPv6-only-Capable Iterative ResolversDOI: 10.1145/3603269.3610850Poster: Evaluation of IPv6-only-Capable Iterative ResolversProceedings
2023-09Xiao et al.Demo: PDNS: A Fully Privacy-Preserving DNSDOI: 10.1145/3603269.3610860Demo: PDNS: A Fully Privacy-Preserving DNSProceedings
2023-09Wan et al.Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoderDOI: 10.1109/LCN58197.2023.10223356Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoderProceedings
2023-09Tusa et al.DNS++: Dynamic Name Resolution with Homomorphic Encryption Based PrivacyDOI: 10.1109/ICCCN58024.2023.10230137DNS++: Dynamic Name Resolution with Homomorphic Encryption Based PrivacyProceedings
2023-09Tu et al.DNS tunnelling detection by fusing encoding feature and behavioral featureDOI 10.1016/j.cose.2023.103357DNS tunnelling detection by fusing encoding feature and behavioral featureJournal Article
2023-09Thiagarajan et al.Poster: A Peek Backstage: Organizations in DNS Resolver HierarchiesDOI: 10.1145/3603269.3610870Poster: A Peek Backstage: Organizations in DNS Resolver HierarchiesProceedings
2023-09Rader et al.Detecting DoH-Based Data Exfiltration: FluBot Malware Case StudyDOI: 10.1109/LCN58197.2023.10223341Detecting DoH-Based Data Exfiltration: FluBot Malware Case StudyProceedings
2023-09Ma et al.Exploring False Hard Negative Sample in Cross-Domain RecommendationDOI: 10.1145/3604915.3608791Exploring False Hard Negative Sample in Cross-Domain RecommendationProceedings
2023-09Liu et al.A Formal Framework for End-to-End DNS ResolutionDOI: 10.1145/3603269.3604870A Formal Framework for End-to-End DNS ResolutionProceedings
2023-09Li et al.Evaluating the Quality of Service of the DNS Root Server From the Service ScopeDOI: 10.1109/MICCIS58901.2023.00033Evaluating the Quality of Service of the DNS Root Server From the Service ScopeProceedings
2023-09Kumari & HoffmanRFC 9476: The .alt Special-Use Top-Level DomainDOI: 10.17487/RFC9476RFC 9476: The .alt Special-Use Top-Level DomainInternet Specification
2023-09Heftrig et al.Poster: Off-Path DNSSEC Downgrade AttacksDOI: 10.1145/3603269.3610840Poster: Off-Path DNSSEC Downgrade AttacksProceedings
2023-09Andrews et al.RFC 9471: DNS Glue Requirements in Referral ResponsesDOI: 10.17487/RFC9471RFC 9471: DNS Glue Requirements in Referral ResponsesInternet Specification
2023-09Aggarwal & KumarAn ensemble framework for detection of DNS-Over-HTTPS (DOH) trafficDOI: 10.1007/s11042-023-16956-9An ensemble framework for detection of DNS-Over-HTTPS (DOH) trafficJournal Article
2023-08Chen et al.Multi-View Graph Convolutional Networks with Differentiable Node SelectionDOI 10.1145/3608954Multi-View Graph Convolutional Networks with Differentiable Node SelectionJournal Article
2023-08Yazdani et al.Hazardous Echoes: The DNS Resolvers that Should Be Put on MuteDOI: 10.23919/TMA58422.2023.10198955Hazardous Echoes: The DNS Resolvers that Should Be Put on MuteProceedings
2023-08Torrealba Aravena et al.Not all DGAs are Born the Same – Improving Lexicographic based Detection of DGA Domains through AI/MLDOI: 10.23919/TMA58422.2023.10198918Not all DGAs are Born the Same – Improving Lexicographic based Detection of DGA Domains through AI/MLProceedings
2023-08Rizvi et al.Defending root DNS servers against DDoS using layered defenses (Extended)DOI 10.1016/j.adhoc.2023.103259Defending root DNS servers against DDoS using layered defenses (Extended)Journal Article
2023-08Ren et al.Owner name entity recognition in websites based on multiscale features and multimodal co-attention☆DOI 10.1016/j.eswa.2023.120014Owner name entity recognition in websites based on multiscale features and multimodal co-attention☆Journal Article
2023-08Qiu et al.Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment RiskDOI: 10.1109/ISCC58397.2023.10217976Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment RiskProceedings
2023-08Principi et al.Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network TrafficDOI: 10.1109/CSR57506.2023.10224973Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network TrafficProceedings
2023-08Peng et al.A Study on a Full-node Problem of the Domain Name System based on EthereumDOI: 10.1109/ICCE-Taiwan58799.2023.10227070A Study on a Full-node Problem of the Domain Name System based on EthereumProceedings
2023-08Ohmori, M.Let’s Block Encrypted Malicious SitesDOI: 10.1109/COMPSAC57700.2023.00293Let’s Block Encrypted Malicious SitesProceedings
2023-08More, S.Trust Scheme Interoperability: Connecting Heterogeneous Trust SchemesDOI 10.1145/3600160.3605046Trust Scheme Interoperability: Connecting Heterogeneous Trust SchemesProceedings
2023-08Mirian et al.In the Line of Fire: Risks of DPI-triggered Data CollectionDOI 10.1145/3607505.3607526In the Line of Fire: Risks of DPI-triggered Data CollectionProceedings
2023-08Li et al.Configuration anormaly detection and resolution risk assessment of authoritative domain name serverDOI 10.1016/j.cose.2023.103426Configuration anormaly detection and resolution risk assessment of authoritative domain name serverJournal Article
2023-08Li et al.Research on Optimal Selection Measurement of DNS Root InstanceDOI 10.1109/ACCESS.2023.3307139Research on Optimal Selection Measurement of DNS Root InstanceJournal Article
2023-08Li et al.The Maginot Line: Attacking the Boundary of DNS Caching ProtectionISBN 978-1-939133-37-3The Maginot Line: Attacking the Boundary of DNS Caching ProtectionProceedings
2023-08Le Louet et al.Effects of secured DNS transport on resolver performanceDOI: 10.1109/ISCC58397.2023.10217887Effects of secured DNS transport on resolver performanceProceedings
2023-08Jin & TomoishiA Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT SystemsDOI: 10.1109/COMPSAC57700.2023.00139A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT SystemsProceedings
2023-08Jiao et al.CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6DOI: 10.1109/ISCC58397.2023.10218057CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6Proceedings
2023-08Goertzen & StebilaPost-Quantum Signatures in DNSSEC via Request-Based FragmentationDOI 10.1007/978-3-031-40003-2_20Post-Quantum Signatures in DNSSEC via Request-Based FragmentationProceedings
2023-08Gioacchini et al.i-DarkVec: Incremental Embeddings for Darknet Traffic AnalysisDOI 10.1145/3595378i-DarkVec: Incremental Embeddings for Darknet Traffic AnalysisJournal Article
2023-08Ginesin & MirkovicUnderstanding DNS Query Composition at B-RootDOI 10.48550/arXiv.2308.07966Understanding DNS Query Composition at B-RootProceedings
2023-08Drury et al.Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name NotationDOI 10.1145/3600160.3604989Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name NotationProceedings
2023-08Brown et al.Augmenting Rule-based DNS Censorship Detection at Scale with Machine LearningDOI 10.1145/3580305.3599775Augmenting Rule-based DNS Censorship Detection at Scale with Machine LearningProceedings
2023-08Allen et al.Why airdrop cryptocurrency tokens?DOI 10.1016/j.jbusres.2023.113945Why airdrop cryptocurrency tokens?Journal Article
2023-08AbdulGhaffar et al.An Analysis of DHCP Vulnerabilities, Attacks, and CountermeasuresDOI: 10.1109/BSC57238.2023.10201458An Analysis of DHCP Vulnerabilities, Attacks, and CountermeasuresProceedings
2023-07Žiža et al.DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviourDOI 10.1007/s10207-023-00723-wDNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviourJournal Article
2023-07Zirngibl et al.A First Look at SVCB and HTTPS DNS Resource Records in the WildDOI 10.1109/EuroSPW59978.2023.00058A First Look at SVCB and HTTPS DNS Resource Records in the WildProceedings
2023-07van Dijk et al.RFC 9432: DNS Catalog ZonesDOI 10.17487/RFC9432RFC 9432: DNS Catalog ZonesInternet Specification
2023-07Singh & KavitaSSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throughput Domain Name SystemDOI: 10.1109/ICACITE57410.2023.10182552SSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throughput Domain Name SystemProceedings
2023-07Sheth et al.Call for Collaboration: DNS IntegrationsDOI 10.1145/3606464.3606471Call for Collaboration: DNS IntegrationsProceedings
2023-07Ozery et al.Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and PreventionDOI 10.48550/arXiv.2307.02614Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and PreventionJournal Article
2023-07Osborn & AlanWeb3 Disruption and the Domain Name System: Understanding the Trends of Blockchain Domain Names and the Policy ImplicationsDOI 10.2139/ssrn.4498160Web3 Disruption and the Domain Name System: Understanding the Trends of Blockchain Domain Names and the Policy ImplicationsResearch Paper
2023-07Olson et al.Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO RoutersDOI 10.1145/3586007Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO RoutersJournal Article
2023-07Nur, A.Y.Accuracy and Coverage Analysis of IP Geolocation DatabasesDOI: 10.1109/BalkanCom58402.2023.10167899Accuracy and Coverage Analysis of IP Geolocation DatabasesProceedings
2023-07Nosyk et al.Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying DefensesDOI 10.1109/EuroSPW59978.2023.00067Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying DefensesProceedings
2023-07Naab et al.Gotta Query 'Em All, Again!: Repeatable Name Resolution with Full Dependency ProvenanceDOI 10.1145/3606464.3606478Gotta Query 'Em All, Again!: Repeatable Name Resolution with Full Dependency ProvenanceProceedings
2023-07Munteanu et al.Enabling Multi-hop ISP-Hypergiant CollaborationDOI 10.1145/3606464.3606487Enabling Multi-hop ISP-Hypergiant CollaborationProceedings
2023-07Lloyd et al.Towards more rigorous domain-based metrics: quantifying the prevalence and implications of “Active” DomainsDOI: 10.1109/EuroSPW59978.2023.00066Towards more rigorous domain-based metrics: quantifying the prevalence and implications of “Active” DomainsProceedings
2023-07Huraj et al.Performance of DNS Over HTTPS Implementation on Low-Power DevicesDOI 10.1007/978-3-031-35317-8_38Performance of DNS Over HTTPS Implementation on Low-Power DevicesProceedings
2023-07Hilbig et al.security.txt revisited: Analysis of Prevalence and Conformity in 2022DOI 10.1145/3609234security.txt revisited: Analysis of Prevalence and Conformity in 2022Journal Article
2023-07Han et al.Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the WildDOI: 10.23919/IFIPNetworking57963.2023.10186440Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the WildProceedings
2023-07Dikshit et al.Evaluating DNS Resiliency and Responsiveness with Truncation, Fragmentation & DoTCP FallbackDOI 10.48550/arXiv.2307.06131Evaluating DNS Resiliency and Responsiveness with Truncation, Fragmentation & DoTCP FallbackJournal Article
2023-07Chen et al.QoS Assessment of Root DNS Servers Based on Fuzzy Comprehensive EvaluationDOI 10.1109/ICEIEC58029.2023.10200218QoS Assessment of Root DNS Servers Based on Fuzzy Comprehensive EvaluationProceedings
2023-07Bushart & RossowAnomaly-based Filtering of Application-Layer DDoS Against DNS AuthoritativesDOI 10.1109/EuroSP57164.2023.00040Anomaly-based Filtering of Application-Layer DDoS Against DNS AuthoritativesProceedings
2023-07Bremler-Barr et al.It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUDDOI 10.1145/3606464.3606472It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUDProceedings
2023-07Bouraga, S.Assessing the impact of network factors and Twitter data on Ethereum's popularityDOI 10.1016/j.bcra.2023.100150Assessing the impact of network factors and Twitter data on Ethereum's popularityJournal Article
2023-07Boeira et al.Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS ServersDOI 10.48550/arXiv.2307.01300Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS ServersJournal Article
2023-07Bannat Wala et al.Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted NetworkDOI 10.1145/3589012.3594895Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted NetworkProceedings
2023-07Arouna et al.Lowering the Barriers to Working with Public RIR-Level DataDOI 10.1145/3606464.3606473Lowering the Barriers to Working with Public RIR-Level DataProceedings
2023-07Adarsh Geoffrey Daniel & AlbertAnalyzing the likeness of a person based on DNS logs using machine learningDOI: 10.1109/IConSCEPT57958.2023.10170228Analyzing the likeness of a person based on DNS logs using machine learningProceedings
2023-07Abbas et al.Security Assessment and Evaluation of VPNs: A Comprehensive SurveyDOI 10.1145/3579162Security Assessment and Evaluation of VPNs: A Comprehensive SurveyJournal Article
2023-06Zhang et al.Detecting and Measuring Security Risks of Hosting-Based Dangling DomainsDOI 10.1145/3578338.3593534Detecting and Measuring Security Risks of Hosting-Based Dangling DomainsProceedings
2023-06Yamai et al.Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative ServersDOI 10.1109/COMPSAC57700.2023.00146Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative ServersProceedings
2023-06Wang et al.Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning MethodDOI: 10.1109/CSCWD57460.2023.10152678Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning MethodProceedings
2023-06Singh et al.TI-16 DNS Labeled Dataset for Detecting BotnetsDOI 10.1109/ACCESS.2023.3287141TI-16 DNS Labeled Dataset for Detecting BotnetsJournal Article
2023-06Sengupta et al.On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and DatasetDOI 10.48550/arXiv.2306.11643On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and DatasetJournal Article
2023-06Sengupta et al.Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3DOI 10.23919/IFIPNetworking57963.2023.10186362Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3Proceedings
2023-06Samreen & AlalfiAn empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps)DOI 10.1016/j.bcra.2022.100120An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps)Journal Article
2023-06Saha et al.YODA: Covert Communication Channel over Public DNS ResolversDOI 10.1109/DSN58367.2023.00034YODA: Covert Communication Channel over Public DNS ResolversProceedings
2023-06Sagatov et al.Countering DNS Amplification Attacks Based on Analysis of Outgoing TrafficDOI 10.23919/JCIN.2023.10173727Countering DNS Amplification Attacks Based on Analysis of Outgoing TrafficJournal Article
2023-06Quezada et al.Real-time bot infection detection system using DNS fingerprinting and machine-learningDOI 10.1016/j.comnet.2023.109725Real-time bot infection detection system using DNS fingerprinting and machine-learningJournal Article
2023-06Paul et al.Implementing Dead Letter Exchanges in MQTT and Proposing a Broker Failure Algorithm Utilizing Blockchain DNSDOI: 10.1109/ViTECoN58111.2023.10157491Implementing Dead Letter Exchanges in MQTT and Proposing a Broker Failure Algorithm Utilizing Blockchain DNSProceedings
2023-06Okuthe & TerzoliAssessing the Impact of DNS Configuration on Low Bandwidth NetworksDOI 10.1007/978-3-031-34896-9_6Assessing the Impact of DNS Configuration on Low Bandwidth NetworksProceedings
2023-06Ohwo et al.Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM)DOI 10.18280/isi.280329Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM)Journal Article
2023-06Murakami et al.Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS ServersDOI 10.1109/COMPSAC57700.2023.00169Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS ServersProceedings
2023-06Mitsuhashi et al.Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic AnalysisDOI 10.1109/TNSM.2022.3215681Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic AnalysisJournal Article
2023-06Li et al.FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory NetworksDOI: 10.1109/ICCECE58074.2023.10135366FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory NetworksProceedings
2023-06Li et al.Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile ApplicationsDOI 10.23919/IFIPNetworking57963.2023.10186431Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile ApplicationsProceedings
2023-06Kumar et al.Each at its Own Pace: Third-Party Dependency and Centralization Around the WorldDOI 10.1145/3578338.3593539Each at its Own Pace: Third-Party Dependency and Centralization Around the WorldProceedings
2023-06Kostopoulos et al.SHAP Interpretations of Tree and Neural Network DNS Classifiers for Analyzing DGA Family CharacteristicsDOI 10.1109/ACCESS.2023.3286313SHAP Interpretations of Tree and Neural Network DNS Classifiers for Analyzing DGA Family CharacteristicsJournal Article
2023-06Kashif et al.Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud ComputingDOI: 10.1109/REEDCON57544.2023.10150684Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud ComputingProceedings
2023-06Hsu et al.Fiat Lux: Illuminating IPv6 Apportionment with Different DatasetsDOI 10.1145/3578338.3593542Fiat Lux: Illuminating IPv6 Apportionment with Different DatasetsProceedings
2023-06Heijligenberg et al.BigMac: Performance Overhead of User Plane Integrity Protection in 5G NetworksDOI 10.1145/3558482.3581777BigMac: Performance Overhead of User Plane Integrity Protection in 5G NetworksProceedings
2023-06Gao et al.Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learningDOI: 10.1109/CSCWD57460.2023.10152708Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learningProceedings
2023-06Fujiwara et al.Latency analysis of JP and Root DNS servers from packet capture dataDOI 10.1109/COMPSAC57700.2023.00076Latency analysis of JP and Root DNS servers from packet capture dataProceedings
2023-06Dikshit et al.Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP FallbackDOI 10.23919/IFIPNetworking57963.2023.10186392Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP FallbackProceedings
2023-06Alayoff & EinzigerOptimizing DNS Resolvers for High LoadsDOI 10.23919/IFIPNetworking57963.2023.10186425Optimizing DNS Resolvers for High LoadsProceedings
2023-06Al Badri & AlounehDetection of Malicious Requests to Protect Web Applications and DNS Servers Against SQL Injection Using Machine LearningDOI 10.1109/ICCNS58795.2023.10193085Detection of Malicious Requests to Protect Web Applications and DNS Servers Against SQL Injection Using Machine LearningProceedings
2023-06Ahn et al.IoT Edge-Cloud: An Internet-of-Things Edge-Empowered Cloud System for Device Management in Smart SpacesDOI: 10.1109/MNET.137.2200565IoT Edge-Cloud: An Internet-of-Things Edge-Empowered Cloud System for Device Management in Smart SpacesJournal Article
2023-05Weqar et al.DNS Traffic Monitoring to Access Vulnerability in the Internet of Healthcare Things Networks: A SurveyDOI 10.1109/REEDCON57544.2023.10150996DNS Traffic Monitoring to Access Vulnerability in the Internet of Healthcare Things Networks: A SurveyProceedings
2023-05Tsai et al.CERTainty: Detecting DNS Manipulation at Scale using TLS CertificatesDOI 10.48550/arXiv.2305.08189CERTainty: Detecting DNS Manipulation at Scale using TLS CertificatesJournal Article
2023-05Shao et al.Lightweight and Effective Website Fingerprinting Over Encrypted DNSDOI 10.1109/SVCC56964.2023.10165086Lightweight and Effective Website Fingerprinting Over Encrypted DNSProceedings
2023-05Luo et al.Who Are Querying For Me? Egress Measurement For Open DNS ResolversDOI 10.1109/CSCWD57460.2023.10152616Who Are Querying For Me? Egress Measurement For Open DNS ResolversProceedings
2023-05Liang et al.FECC: DNS tunnel detection model based on CNN and clusteringDOI 10.1016/j.cose.2023.103132FECC: DNS tunnel detection model based on CNN and clusteringJournal Article
2023-05Jerabek et al.DNS Over HTTPS Detection Using Standard Flow TelemetryDOI 10.1109/ACCESS.2023.3275744DNS Over HTTPS Detection Using Standard Flow TelemetryJournal Article
2023-05Hasegawa et al.Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture AttackDOI: 10.1109/TNSM.2023.3277880Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture AttackJournal Article
2023-04Wang et al.MIS: A Multi-Identifier Management and Resolution System in the MetaverseDOI 10.1145/3597641MIS: A Multi-Identifier Management and Resolution System in the MetaverseJournal Article
2023-04Singh Gurjar & SomaniAmplification/Reflection Attack Suppression Using Victim SeparationDOI: 10.1109/LNET.2023.3264827Amplification/Reflection Attack Suppression Using Victim SeparationJournal Article
2023-04Qian et al.Research on DNS Attack Detection Based on HMMDOI 10.1109/ICCECT57938.2023.10141170Research on DNS Attack Detection Based on HMMProceedings
2023-04Nourin et al.Measuring and Evading Turkmenistan’s Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration CountryDOI 10.1145/3543507.3583189Measuring and Evading Turkmenistan’s Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration CountryProceedings
2023-04Moura & HeidemannVulnerability Disclosure Considered StressfulDOI 10.1145/3610381.3610383Vulnerability Disclosure Considered StressfulJournal Article
2023-04Lu et al.GAT-DNS: DNS Multivariate Time Series Prediction Model Based on Graph Attention NetworkDOI 10.1145/3543873.3587329GAT-DNS: DNS Multivariate Time Series Prediction Model Based on Graph Attention NetworkProceedings
2023-04Lim et al.ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshakeDOI 10.1145/3543507.3583516ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshakeProceedings
2023-04Li et al.A Longitudinal and Comprehensive Measurement of DNS Strict PrivacyDOI: 10.1109/TNET.2023.3262651A Longitudinal and Comprehensive Measurement of DNS Strict PrivacyJournal Article
2023-04Kumar Sachan et al.Identifying malicious accounts in blockchains using domain names and associated temporal propertiesDOI 10.1016/j.bcra.2023.100136Identifying malicious accounts in blockchains using domain names and associated temporal propertiesJournal Article
2023-04Jiarong et al.Unsupervised Anomaly Detection Method Based on DNS Log DataDOI 10.1007/978-981-99-1256-8_5Unsupervised Anomaly Detection Method Based on DNS Log DataProceedings
2023-04Harrilal-Parchment et al.Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC ApplicationsDOI 10.1109/ICIT58465.2023.10143155Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC ApplicationsProceedings
2023-04Dikshit et al.Recent Trends on Privacy-Preserving Technologies under Standardization at the IETFDOI 10.1145/3610381.3610385Recent Trends on Privacy-Preserving Technologies under Standardization at the IETFJournal Article
2023-04Davies & BaberRFC 9121: Deprecating Infrastructure "int" DomainsDOI 10.17487/RFC9121RFC 9121: Deprecating Infrastructure "int" DomainsInternet Specification
2023-04Ahad et al.DPIDNS:A Deep Packet Inspection Based IPS for Security Of P4 Network Data PlaneDOI: 10.1109/ICSCA57840.2023.10087377DPIDNS:A Deep Packet Inspection Based IPS for Security Of P4 Network Data PlaneProceedings
2023-03Xu et al.Simulation Research on Fast Matching of Big Data Based on SparkDOI: 10.1109/ACCESS.2023.3262989Simulation Research on Fast Matching of Big Data Based on SparkJournal Article
2023-03Qu et al.Who is DNS serving for? A human-software perspective of modeling DNS services☆DOI 10.1016/j.knosys.2023.110279Who is DNS serving for? A human-software perspective of modeling DNS services☆Journal Article
2023-03Nosyk et al.Intercept and Inject: DNS Response Manipulation in the WildDOI 10.1007/978-3-031-28486-1_19Intercept and Inject: DNS Response Manipulation in the WildProceedings
2023-03Nosyk et al.The Closed Resolver Project: Measuring the Deployment of Inbound Source Address ValidationDOI: 10.1109/TNET.2023.3257413The Closed Resolver Project: Measuring the Deployment of Inbound Source Address ValidationJournal Article
2023-03Nguyen et al.Domain Name System Resolution System with Hyperledger Fabric BlockchainDOI 10.1007/978-981-19-7402-1_5Domain Name System Resolution System with Hyperledger Fabric BlockchainProceedings
2023-03Mitsuhashi et al.Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning AnalysisDOI: 10.1109/CCNC51644.2023.10059835Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning AnalysisProceedings
2023-03Magnusson et al.A Second Look at DNS QNAME MinimizationDOI 10.1007/978-3-031-28486-1_21A Second Look at DNS QNAME MinimizationProceedings
2023-03Lozano, G.RFC 9361: ICANN Trademark Clearinghouse (TMCH) Functional SpecificationsDOI 10.17487/RFC9361RFC 9361: ICANN Trademark Clearinghouse (TMCH) Functional SpecificationsInternet Specification
2023-03Jin et al.Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User AlertDOI: 10.1109/ICEIC57457.2023.10049906Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User AlertProceedings
2023-03Jerabek et al.Analysis of Well-Known DNS over HTTPS ResolversDOI 10.1109/CCWC57344.2023.10099347Analysis of Well-Known DNS over HTTPS ResolversProceedings
2023-03Blancaflor et al.Exploitation Simulation of DNS Spoofing and Ransomware In a Virtualized Android DeviceDOI 10.1145/3592307.3592341Exploitation Simulation of DNS Spoofing and Ransomware In a Virtualized Android DeviceProceedings
2023-03Bhowmick et al.TTL Violation of DNS Resolvers in the WildDOI 10.1007/978-3-031-28486-1_23TTL Violation of DNS Resolvers in the WildProceedings
2023-03Adiwal et al.DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacksDOI 10.1016/j.fraope.2023.100010DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacksJournal Article
2023-02Streibelt et al.How Ready Is DNS for an IPv6-Only World?DOI 10.48550/arXiv.2302.11393How Ready Is DNS for an IPv6-Only World?Journal Article
2023-02Kumar & BustamanteReclaiming Privacy and Performance over Centralized DNSDOI 10.48550/arXiv.2302.13274Reclaiming Privacy and Performance over Centralized DNSJournal Article
2023-02Jafarian et al.Detecting Network Scanning Through Monitoring and Manipulation of DNS TrafficDOI 10.1109/ACCESS.2023.3250106Detecting Network Scanning Through Monitoring and Manipulation of DNS TrafficJournal Article
2023-02Ishida et al.Analysis of DNS Graph of Phishing Websites Using Digital CertificatesDOI 10.23919/ICACT56868.2023.10079566Analysis of DNS Graph of Phishing Websites Using Digital CertificatesProceedings
2023-02Hoffman, P.RFC 9364: DNS Security Extensions (DNSSEC)DOI 10.17487/RFC9364RFC 9364: DNS Security Extensions (DNSSEC)Internet Specification
2023-02Dogra et al.Detection of Communication Tunnels in Network Using DNS LogsDOI 10.1109/ICECCT56650.2023.10179803Detection of Communication Tunnels in Network Using DNS LogsProceedings
2023-01Xue et al.APT Attack Detection Scheme Based on CK Sketch and DNS TrafficDOI 10.3390/s23042217APT Attack Detection Scheme Based on CK Sketch and DNS TrafficJournal Article
2023-01Xu et al.Measuring the Centrality of DNS Infrastructure in the WildDOI 10.3390/app13095739Measuring the Centrality of DNS Infrastructure in the WildJournal Article
2023-01Singh et al.Identifying bot infection using neural networks on DNS trafficDOI 10.1007/s11416-023-00462-5Identifying bot infection using neural networks on DNS trafficJournal Article
2023-01Salat et al.DNS Tunnelling, Exfiltration and Detection over Cloud EnvironmentsDOI 10.3390/s23052760DNS Tunnelling, Exfiltration and Detection over Cloud EnvironmentsJournal Article
2023-01Rizvi et al.Defending Root DNS Servers Against DDoS Using Layered DefensesDOI 10.1109/COMSNETS56262.2023.10041415Defending Root DNS Servers Against DDoS Using Layered DefensesProceedings
2023-01Qasem Abu Al-HaijaA Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning ApproachDOI 10.3390/s23073489A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning ApproachJournal Article
2023-01Niakanlahiji et al.Toward practical defense against traffic analysis attacks on encrypted DNS trafficDOI 10.1016/j.cose.2022.103001Toward practical defense against traffic analysis attacks on encrypted DNS trafficJournal Article
2023-01Melcher et al.Tunneling through DNS over TLS ProvidersTunneling through DNS over TLS ProvidersProceedings
2023-01Irénée et al.XTS: A Hybrid Framework to Detect DNS-Over-HTTPS Tunnels Based on XGBoost and Cooperative Game TheoryDOI 10.3390/math11102372XTS: A Hybrid Framework to Detect DNS-Over-HTTPS Tunnels Based on XGBoost and Cooperative Game TheoryJournal Article
2023-01Hatanaka et al.Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor FactorizationDOI: 10.1109/TNSM.2023.3238858Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor FactorizationJournal Article
2023-01Gao & DongDNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium BlockchainDOI 10.3390/s23146366DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium BlockchainJournal Article
2023-01Ayoub et al.DNS for IoT: A SurveyDOI 10.3390/s23094473DNS for IoT: A SurveyJournal Article
2023-01Albalawi et al.The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based VulnerabilitiesDOI 10.3390/electronics12122664The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based VulnerabilitiesJournal Article
2023-01Adiwal et al.Health Assessment of 1485 Top Level Domain's Name ServersDOI 10.1109/COMSNETS56262.2023.10041391Health Assessment of 1485 Top Level Domain's Name ServersProceedings
2023-01Abualghanam et al.Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine LearningDOI 10.3390/electronics12061467Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine LearningJournal Article
2022-12Wu & FeiAn Abnormal Domain Name Generation Method Based on a Character-Level ModelDOI 10.1145/3584376.3584519An Abnormal Domain Name Generation Method Based on a Character-Level ModelProceedings
2022-12Goertzen, J.Enabling Post-Quantum Signatures in DNSSEC: One ARRF at a timeEnabling Post-Quantum Signatures in DNSSEC: One ARRF at a timeMaster's Thesis
2022-12Faulkenberry et al.View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyDOI 10.1145/3564625.3564646View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyProceedings
2022-12Fainchtein et al.User Perceptions of the Privacy and Usability of Smart DNSDOI 10.1145/3564625.3567978User Perceptions of the Privacy and Usability of Smart DNSProceedings
2022-12Csikor et al.ZeroDNS: Towards Better Zero Trust Security using DNSDOI 10.1145/3564625.3567968ZeroDNS: Towards Better Zero Trust Security using DNSProceedings
2022-12Chiscop et al.AI-based detection of DNS misuse for network securityDOI 10.1145/3565009.3569523AI-based detection of DNS misuse for network securityProceedings
2022-11Zang et al.Encrypted DNS Traffic Analysis for Service Intention InferringDOI 10.1109/TNSM.2022.3223902Encrypted DNS Traffic Analysis for Service Intention InferringJournal Article
2022-11Streibelt et al.Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic DatasetsDOI 10.48550/arXiv.2211.06537Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic DatasetsJournal Article
2022-11Shulman & WaidnerDNS in Routers Considered HarmfulDOI 10.1145/3548606.3563509DNS in Routers Considered HarmfulProceedings
2022-11Schwenk, J.DNS SecurityDOI 10.1007/978-3-031-19439-9_15DNS SecurityBook Section
2022-11Maghsoudlou et al.FlowDNS: correlating netflow and DNS streams at scaleDOI 10.1145/3555050.3569135FlowDNS: correlating netflow and DNS streams at scaleProceedings
2022-11Lyu et al.Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic AnalysisDOI: 10.1109/TNSM.2022.3221981Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic AnalysisJournal Article
2022-11Hlavacek et al.Behind the Scenes of RPKIDOI 10.1145/3548606.3560645Behind the Scenes of RPKIProceedings
2022-11Couto et al.Characterizing Low Credibility Websites in Brazil through Computer Networking AttributesDOI 10.1109/ASONAM55673.2022.10068660Characterizing Low Credibility Websites in Brazil through Computer Networking AttributesJournal Article
2022-10Yazdani et al.Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksDOI 10.1145/3545948.3545959Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksProceedings
2022-10Xia et al.Challenges in decentralized name management: the case of ENSDOI 10.1145/3517745.3561469Challenges in decentralized name management: the case of ENSProceedings
2022-10Voelker et al.Where .ru?: assessing the impact of conflict on russian domain infrastructureDOI 10.1145/3517745.3561423Where .ru?: assessing the impact of conflict on russian domain infrastructureProceedings
2022-10Toorn et al.Saving Brian's privacy: the perils of privacy exposure through reverse DNSDOI 10.1145/3517745.3561424Saving Brian's privacy: the perils of privacy exposure through reverse DNSProceedings
2022-10Sommese et al.Assessing e-Government DNS ResilienceAssessing e-Government DNS ResilienceProceedings
2022-10Sommese et al.Investigating the impact of DDoS attacks on DNS infrastructureDOI 10.1145/3517745.3561458Investigating the impact of DDoS attacks on DNS infrastructureProceedings
2022-10Sommese et al.Observable KINDNS: validating DNS hygieneDOI 10.1145/3517745.3563016Observable KINDNS: validating DNS hygieneProceedings
2022-10Nie et al.Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS ResolversTowards a Behavioral and Privacy Analysis of ECS for IPv6 DNS ResolversProceedings
2022-10Kosek et al.DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceDOI 10.1145/3517745.3561445DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceProceedings
2022-10Kaplan & FeibishPractical handling of DNS in the data planeDOI 10.1145/3563647.3563654Practical handling of DNS in the data planeProceedings
2022-10Joback et al.A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolDOI 10.1145/3477997.3478007A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolProceedings
2022-10Jin et al.An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersDOI 10.1145/3556223.3556263An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersProceedings
2022-10Izhikevich et al.ZDNS: a fast DNS toolkit for internet measurementDOI 10.1145/3517745.3561434ZDNS: a fast DNS toolkit for internet measurementProceedings
2022-10Arouna et al.On unifying diverse DNS data sourcesDOI 10.1145/3517745.3563022On unifying diverse DNS data sourcesProceedings
2022-10AlSabah et al.Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSDOI 10.1145/3545948.3545958Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSProceedings
2022-10Allman, M.Putting DNS in ContextDOI 10.1145/3419394.3423659Putting DNS in ContextProceedings
2022-10Akiwate et al.Retroactive identification of targeted DNS infrastructure hijackingDOI 10.1145/3517745.3561425Retroactive identification of targeted DNS infrastructure hijackingProceedings
2022-09Yang et al.A deep dive into DNS behavior and query failuresDOI 10.1016/j.comnet.2022.109131A deep dive into DNS behavior and query failuresJournal Article
2022-09Wala & Cotton"Off-Label" Use of DNSDOI 10.1145/3491261"Off-Label" Use of DNSJournal Article
2022-09Sattler, T.Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat.Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat.Master's Thesis
2022-09Luo et al.A global name mapping system for ICN-IP coexistenceDOI 10.1145/3517212.3559492A global name mapping system for ICN-IP coexistenceProceedings
2022-09Cheng et al.Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesDOI 10.1093/comjnl/bxab062Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesJournal Article
2022-08Rajendran et al.A Universal Domain Name Resolution Service – Need and Challenges - Study on Blockchain Based Naming ServicesDOI 10.1109/TENSYMP54529.2022.9864361A Universal Domain Name Resolution Service – Need and Challenges - Study on Blockchain Based Naming ServicesProceedings
2022-08Nisenoff et al.Understanding User Awareness and Behaviors Concerning Encrypted DNS SettingsDOI 10.48550/arXiv.2208.04991Understanding User Awareness and Behaviors Concerning Encrypted DNS SettingsJournal Article
2022-07McGhee et al.NetInfra - A Framework for Expressing Network Infrastructure as CodeDOI 10.1145/3491418.3530762NetInfra - A Framework for Expressing Network Infrastructure as CodeProceedings
2022-07Mathews et al.A Deep Learning Approach to Create DNS Amplification AttacksDOI 10.1145/3535782.3535838A Deep Learning Approach to Create DNS Amplification AttacksProceedings
2022-07Lyu et al.A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesDOI 10.1145/3547331A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesJournal Article
2022-07Jia, W.-K.PFQDN: SDN- and DNS-Assisted Transparent Communications Among Behind-NAT NetworksDOI: 10.1109/JSYST.2022.3177645PFQDN: SDN- and DNS-Assisted Transparent Communications Among Behind-NAT NetworksJournal Article
2022-07Bauer, P.Ethereum Name ServiceDOI 10.1007/978-1-4842-8045-4_9Ethereum Name ServiceBook Section
2022-06Jayaprakash & Kalariyil VenugopalA Novel Framework For Detecting Subdomain State Against Takeover AttacksA Novel Framework For Detecting Subdomain State Against Takeover AttacksMaster's Thesis
2022-06Hounsel, A.Measuring the Feasibility of DNS Privacy and SecurityMeasuring the Feasibility of DNS Privacy and SecurityDoctoral Thesis
2022-05Roure et al.Investigating link service infrastructuresDOI 10.1145/336296.336325Investigating link service infrastructuresProceedings
2022-04Laprade & HuangDomain name service trust delegation in cloud computing: exploitation, risks, and defenseDOI 10.1145/3477314.3507016Domain name service trust delegation in cloud computing: exploitation, risks, and defenseProceedings
2022-04Kosek et al.Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeDOI 10.1145/3544912.3544918Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeJournal Article
2022-03Mahdavifar et al.Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningDOI 10.1145/3507509.3507520Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningProceedings
2022-03Blanchet, M.RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceDOI 10.17487/RFC9224RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceInternet Specification
2022-02Park et al.A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetDOI 10.1109/TNET.2021.3105599A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetJournal Article
2022-02Dan et al.IP Geolocation through Reverse DNSDOI 10.1145/3457611IP Geolocation through Reverse DNSJournal Article
2022-02Cheng, Y.Disclosing Features and Characteristics of. COM Registrars' WHOIS ServersDOI 10.1109/ACCTCS53867.2022.00018Disclosing Features and Characteristics of. COM Registrars' WHOIS ServersProceedings
2021-12Sattler et al.RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC9167RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)Internet Specification
2021-12Nawrocki et al.Transparent forwarders: an unnoticed component of the open DNS infrastructureDOI 10.1145/3485983.3494872Transparent forwarders: an unnoticed component of the open DNS infrastructureProceedings
2021-12Lenders et al.Securing name resolution in the IoT: DNS over CoAPDOI 10.1145/3488658.3493790Securing name resolution in the IoT: DNS over CoAPProceedings
2021-12He et al.DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation SystemsDOI: 10.1109/TITS.2021.3135197DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation SystemsJournal Article
2021-12Gould & WilhelmRFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferDOI 10.17487/RFC9154RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferInternet Specification
2021-11Zhang et al.Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisDOI 10.1016/j.cose.2021.102445Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisJournal Article
2021-11Randall et al.Home is where the hijacking is: understanding DNS interception by residential routersDOI 10.1145/3487552.3487817Home is where the hijacking is: understanding DNS interception by residential routersProceedings
2021-11Nawrocki et al.The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreDOI 10.1145/3487552.3487835The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreProceedings
2021-11Moura et al.TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSDOI 10.1145/3487552.3487824TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSProceedings
2021-11Man et al.DNS Cache Poisoning Attack: Resurrections with Side ChannelsDOI 10.1145/3460120.3486219DNS Cache Poisoning Attack: Resurrections with Side ChannelsProceedings
2021-11Kakarla et al.How Complex is DNS?DOI 10.1145/3484266.3487369How Complex is DNS?Proceedings
2021-11Hounsel et al.Designing for Tussle in Encrypted DNSDOI 10.1145/3484266.3487383Designing for Tussle in Encrypted DNSProceedings
2021-11Chhabra et al.Measuring DNS-over-HTTPS performance around the worldDOI 10.1145/3487552.3487849Measuring DNS-over-HTTPS performance around the worldProceedings
2021-11Bernard, A.Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutionsSolving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutionsDoctoral Thesis
2021-11Akiwate et al.Risky BIZness: risks derived from registrar name managementDOI 10.1145/3487552.3487816Risky BIZness: risks derived from registrar name managementProceedings
2021-10Tatang et al.The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsDOI 10.1145/3471621.3471842The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsProceedings
2021-10Jin et al.Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationDOI 10.1145/3478472.3478481Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationProceedings
2021-09Khan et al.Development and Optimisation of a DNS Solver Using Open-source Library for High-performance ComputingDOI 10.1080/10618562.2021.1971656Development and Optimisation of a DNS Solver Using Open-source Library for High-performance ComputingResearch Paper
2021-08Kwan et al.Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsDOI 10.1145/3473604.3474563Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsProceedings
2021-08Khodjaeva & Zincir-HeywoodNetwork Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsDOI 10.1145/3465481.3470089Network Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsProceedings
2021-08Kaplan & FeibishDNS water torture detection in the data planeDOI 10.1145/3472716.3472854DNS water torture detection in the data planeProceedings
2021-08Crocker, S.A Framework for Expressing Registration Data Directory Services (née WHOIS) RulesDOI 10.2139/ssrn.3897125A Framework for Expressing Registration Data Directory Services (née WHOIS) RulesProceedings
2021-07Imana et al.Institutional privacy risks in sharing DNS dataDOI 10.1145/3472305.3472324Institutional privacy risks in sharing DNS dataProceedings
2021-07Hounsel et al.Encryption without centralization: distributing DNS queries across recursive resolversDOI 10.1145/3472305.3472318Encryption without centralization: distributing DNS queries across recursive resolversProceedings
2021-07García et al.Large Scale Measurement on the Adoption of Encrypted DNSDOI 10.48550/arXiv.2107.04436Large Scale Measurement on the Adoption of Encrypted DNSResearch Paper
2021-07Dai et al.DNS-over-TCP considered vulnerableDOI 10.1145/3472305.3472884DNS-over-TCP considered vulnerableProceedings
2021-07Al-Drees et al.Building a DNS Tunneling DatasetDOI 10.2174/2210327910999201124205758Building a DNS Tunneling DatasetResearch Paper
2021-06Tehrani et al.Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIDOI 10.1145/3442381.3450033Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIProceedings
2021-06Jawad, A.Monitoring security of enterprise hosts via DNS data analysisDOI 10.26190/unsworks/22739Monitoring security of enterprise hosts via DNS data analysisDoctoral Thesis
2021-06Inoue et al.Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowDOI 10.1145/3468081.3471123Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowProceedings
2021-06Hollenbeck & NewtonRFC 9082: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC9082RFC 9082: Registration Data Access Protocol (RDAP) Query FormatInternet Specification
2021-06Hollenbeck & NewtonRFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC9083RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)Internet Specification
2021-05Ibarra et al.RFC 9022: Domain Name Registration Data (DNRD) Objects MappingDOI 10.17487/RFC9022RFC 9022: Domain Name Registration Data (DNRD) Objects MappingInternet Specification
2021-05Gould & CasanovaRFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesDOI 10.17487/RFC9038RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesInternet Specification
2021-05Gañán, C.A Primer in Registration Data Access Protocol (RDAP) PerformanceA Primer in Registration Data Access Protocol (RDAP) PerformanceResearch Paper
2021-04Xia et al.Ethereum Name Service: the Good, the Bad, and the UglyDOI 10.48550/arXiv.2104.05185Ethereum Name Service: the Good, the Bad, and the UglyResearch Paper
2021-04Pengcheng et al.Identifying and Characterizing COVID-19 Themed Malicious Domain CampaignsDOI 10.1145/3422337.3447840Identifying and Characterizing COVID-19 Themed Malicious Domain CampaignsProceedings
2021-04Jin et al.Understanding the Impact of Encrypted DNS on Internet CensorshipDOI 10.1145/3442381.3450084Understanding the Impact of Encrypted DNS on Internet CensorshipProceedings
2021-04Davis, J.The DNS Bake Sale: Advertising DNS Cookie Support for DDoS ProtectionThe DNS Bake Sale: Advertising DNS Cookie Support for DDoS ProtectionMaster's Thesis
2021-04Alieyan et al.DNS rule-based schema to botnet detectionDOI 10.1080/17517575.2019.1644673DNS rule-based schema to botnet detectionResearch Paper
2021-03Ravi et al.Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep LearningDOI: 10.1109/TEM.2021.3059664Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep LearningJournal Article
2021-03Michner, K.Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher SichtZum Schutz von Domains aus wettbewerbs- und markenrechtlicher SichtMaster's Thesis
2021-03Lyu et al.Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksDOI 10.1109/TNSM.2021.3050091Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksJournal Article
2021-03Hounsel et al.Can Encrypted DNS Be Fast?DOI 10.1007/978-3-030-72582-2_26Can Encrypted DNS Be Fast?Proceedings
2021-03Doan et al.Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesDOI 10.1007/978-3-030-72582-2_12Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesProceedings
2021-03Alageel & MaffeisHawk-Eye: holistic detection of APT command and control domainsDOI 10.1145/3412841.3442040Hawk-Eye: holistic detection of APT command and control domainsProceedings
2021-02Orduña-Malea, E.Dot-science top level domain: Academic websites or dumpsites?DOI 10.1007/s11192-020-03832-8Dot-science top level domain: Academic websites or dumpsites?Journal Article
2021-02Lu et al.From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRDOI 10.14722/ndss.2021.23134From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRProceedings
2021-02Loffredo & MartinelliRFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseDOI 10.17487/RFC8982RFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseInternet Specification
2021-01Loffredo et al.RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingDOI 10.17487/RFC8977RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingInternet Specification
2021-01Desmet et al.Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLDDOI 10.1145/3419476Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLDJournal Article
2020-12Yin et al.Decentralization of DNS: Old Problems and New ChallengesDOI 10.1145/3444370.3444594Decentralization of DNS: Old Problems and New ChallengesProceedings
2020-12Kumar & LiuDecentralization, Privacy and Performance for DNSDOI 10.1145/3426746.3434060Decentralization, Privacy and Performance for DNSProceedings
2020-12Agostinho et al.An Approach Adopting Ethereum as a Wallet Domain Name System within the Economy of Things ContextDOI 10.1109/UCC48980.2020.00036An Approach Adopting Ethereum as a Wallet Domain Name System within the Economy of Things ContextProceedings
2020-11Yang et al.Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersDOI 10.1145/3425329.3425335Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersProceedings
2020-11Yang et al.Naruto: DNS Covert Channels Detection Based on Stacking ModelDOI 10.1145/3425329.3425336Naruto: DNS Covert Channels Detection Based on Stacking ModelProceedings
2020-11Udiyono et al.Botnet Detection Using DNS and HTTP Traffic AnalysisDOI 10.1145/3429789.3429818Botnet Detection Using DNS and HTTP Traffic AnalysisProceedings
2020-11Lozano, G.RFC 8909: Registry Data Escrow SpecificationDOI 10.17487/RFC8909RFC 8909: Registry Data Escrow SpecificationInternet Specification
2020-11Klein et al.Black-box caches fingerprintingDOI 10.1145/3386367.3432148Black-box caches fingerprintingProceedings
2020-11Hsu et al.DNS Does Not Suffice for MEC-CDNDOI 10.1145/3422604.3425931DNS Does Not Suffice for MEC-CDNProceedings
2020-11Bautista et al.Numeric domains meet algebraic data typesDOI 10.1145/3427762.3430178Numeric domains meet algebraic data typesProceedings
2020-11Alowaisheq et al.Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralDOI 10.1145/3372297.3417864Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralProceedings
2020-10ten Oever, N.Wired norms: Inscription, resistance, and subversion in the governance of the Internet infrastructureWired norms: Inscription, resistance, and subversion in the governance of the Internet infrastructureDoctoral Thesis
2020-10Sengupta et al.A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSDOI 10.1145/3418073A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSJournal Article
2020-10Randall et al.Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversDOI 10.1145/3419394.3423640Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversProceedings
2020-10Quinkert et al.Be the Phisher -- Understanding Users' Perception of Malicious DomainsDOI 10.1145/3320269.3384765Be the Phisher -- Understanding Users' Perception of Malicious DomainsProceedings
2020-10Müller et al.Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECDOI 10.1145/3431832.3431838Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECJournal Article
2020-10Moura et al.Clouding up the Internet: how centralized is DNS traffic becoming?DOI 10.1145/3419394.3423625Clouding up the Internet: how centralized is DNS traffic becoming?Proceedings
2020-10Man et al.DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsDOI 10.1145/3372297.3417280DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsProceedings
2020-10Kashaf et al.Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?DOI 10.1145/3419394.3423664Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?Proceedings
2020-10Deccio et al.Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityDOI 10.1145/3419394.3423649Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityProceedings
2020-09Sommese et al.The Forgotten Side of DNS: Orphan and Abandoned RecordsDOI 10.1109/EuroSPW51379.2020.00079The Forgotten Side of DNS: Orphan and Abandoned RecordsProceedings
2020-09Hermita et al.Designing IT Service Management at Indonesia Internet Domain Names Registry Association's Helpdesk FunctionDOI 10.1145/3418981.3418987Designing IT Service Management at Indonesia Internet Domain Names Registry Association's Helpdesk FunctionProceedings
2020-09Hercog, D.DNS: Distributed Directory and ProtocolDOI 10.1007/978-3-030-50405-2_20DNS: Distributed Directory and ProtocolBook Section
2020-09Albalawi & Garcia-Luna-AcevesNamed-Data Transport: An End-to-End Approach for an Information-Centric IP InternetDOI 10.1145/3405656.3418714Named-Data Transport: An End-to-End Approach for an Information-Centric IP InternetProceedings
2020-08Yu & ShengKnowledge diffusion paths of blockchain domain: the main path analysisDOI 10.1007/s11192-020-03650-yKnowledge diffusion paths of blockchain domain: the main path analysisJournal Article
2020-08Vekshin et al.DoH Insight: detecting DNS over HTTPS by machine learningDOI 10.1145/3407023.3409192DoH Insight: detecting DNS over HTTPS by machine learningProceedings
2020-08Rodriguez, P.Perceptions of IT Decision-Makers on the Use of Domain Name System Security Extension (DNSSEC): Qualitative Exploratory Case StudyPerceptions of IT Decision-Makers on the Use of Domain Name System Security Extension (DNSSEC): Qualitative Exploratory Case StudyDoctoral Thesis
2020-08Rivera et al.Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesDOI 10.1145/3407023.3407041Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesProceedings
2020-08Postolka, M.Performance Measurement Tool for DNS ServersPerformance Measurement Tool for DNS ServersMaster's Thesis
2020-08Gould & PozunRFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8807RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2020-08Burton, R.Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksDOI 10.1145/3377869Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksJournal Article
2020-07Szurdi, J.Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain RegistrationsMeasuring and Analyzing Typosquatting Toward Fighting Abusive Domain RegistrationsDoctoral Thesis
2020-07Schomp et al.Akamai DNS: Providing Authoritative Answers to the World's QueriesDOI 10.1145/3387514.3405881Akamai DNS: Providing Authoritative Answers to the World's QueriesProceedings
2020-07Nabeel et al.Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceDOI 10.1145/3401897Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceJournal Article
2020-07Kostopoulos et al.Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersDOI 10.1145/3404868.3406665Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersProceedings
2020-07Korczyński et al.Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversDOI 10.1145/3404868.3406668Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversProceedings
2020-07Ke & SudhirPrivacy Rights and Data Security: GDPR and Personal Data MarketsDOI 10.2139/ssrn.3643979Privacy Rights and Data Security: GDPR and Personal Data MarketsResearch Paper
2020-07Kakarla et al.GRooT: Proactive Verification of DNS ConfigurationsDOI 10.1145/3387514.3405871GRooT: Proactive Verification of DNS ConfigurationsProceedings
2020-05Bao et al.Using Passive DNS to Detect Malicious Domain NameDOI 10.1145/3387168.3387236Using Passive DNS to Detect Malicious Domain NameProceedings
2020-04Zembruzki, L.Dnstracker : measuring centralization of DNS infrastructure in the wildDnstracker : measuring centralization of DNS infrastructure in the wildMaster's Thesis
2020-04Li et al.CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsDOI 10.1145/3388176.3388206CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsProceedings
2020-04Li et al.Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesDOI 10.1145/3388176.3388205Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesProceedings
2020-04Hounsel et al.Comparing the Effects of DNS, DoT, and DoH on Web PerformanceDOI 10.1145/3366423.3380139Comparing the Effects of DNS, DoT, and DoH on Web PerformanceProceedings
2020-04Bansal & SethumadhavanSurvey on Domain Name System Security Problems - DNS and Blockchain SolutionsDOI 10.1007/978-981-15-4451-4_50Survey on Domain Name System Security Problems - DNS and Blockchain SolutionsProceedings
2020-03Toorn & SperottoLooking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsDOI 10.1145/3373639Looking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsJournal Article
2020-03Carney et al.RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8748RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2020-03Ahmed et al.Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsDOI 10.1109/TNSM.2019.2940735Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsJournal Article
2020-01Troia, V.Hunting Cyber Criminals: WHOISDOI 10.1002/9781119541004.ch9Hunting Cyber Criminals: WHOISBook Section
2020-01Schwemmer, S.The regulation of abusive activity and content: a study of registries’ terms of serviceDOI 10.14763/2020.1.1448The regulation of abusive activity and content: a study of registries’ terms of serviceJournal Article
2020-01He et al.TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainDOI 10.1016/j.future.2019.09TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainJournal Article
2020-01Al-Mashhadi & ManickamA brief review of blockchain-based DNS systemsDOI 10.1504/ijitst.2020.108134A brief review of blockchain-based DNS systemsJournal Article
2020-01Al-Dalky, R.Issues in Security and Performance of the DNS EcosystemIssues in Security and Performance of the DNS EcosystemDoctoral Thesis
2020-01Abdelmajid et al.Location Based Model For Prevention DNS SpoofingDOI 10.1145/3424311.3424329Location Based Model For Prevention DNS SpoofingProceedings
2019-12Spooren et al.Premadoma: an operational solution for DNS registries to prevent malicious domain registrationsDOI 10.1145/3359789.3359836Premadoma: an operational solution for DNS registries to prevent malicious domain registrationsProceedings
2019-12Park et al.Investigating DNS Manipulation by Open DNS ResolversDOI 10.1145/3360468.3368172Investigating DNS Manipulation by Open DNS ResolversProceedings
2019-12Nakatsuka et al.PDoT: private DNS-over-TLS with TEE supportDOI 10.1145/3359789.3359793PDoT: private DNS-over-TLS with TEE supportProceedings
2019-12Liu et al.A Comparative Study of Blockchain-Based DNS DesignDOI 10.1145/3376044.3376057A Comparative Study of Blockchain-Based DNS DesignProceedings
2019-12Houser et al.An investigation on information leakage of DNS over TLSDOI 10.1145/3359989.3365429An investigation on information leakage of DNS over TLSProceedings
2019-12Deccio & DavisDNS privacy in practice and preparationDOI 10.1145/3359989.3365435DNS privacy in practice and preparationProceedings
2019-11Peña, T.A Deep Learning Approach to Detecting Covert Channels in the Domain Name SystemA Deep Learning Approach to Detecting Covert Channels in the Domain Name SystemDoctoral Thesis
2019-11Allman, M.On Eliminating Root Nameservers from the DNSDOI 10.1145/3365609.3365863On Eliminating Root Nameservers from the DNSProceedings
2019-10Müller et al.Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverDOI 10.1145/3355369.3355570Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverProceedings
2019-10Moura et al.Cache Me If You Can: Effects of DNS Time-to-LiveDOI 10.1145/3355369.3355568Cache Me If You Can: Effects of DNS Time-to-LiveProceedings
2019-10Lu et al.An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?DOI 10.1145/3355369.3355580An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?Proceedings
2019-10Foremski et al.DNS Observatory: The Big Picture of the DNSDOI 10.1145/3355369.3355566DNS Observatory: The Big Picture of the DNSProceedings
2019-10Böttger et al.An Empirical Study of the Cost of DNS-over-HTTPSDOI 10.1145/3355369.3355575An Empirical Study of the Cost of DNS-over-HTTPSProceedings
2019-10Al-Dalky et al.A Look at the ECS Behavior of DNS ResolversDOI 10.1145/3355369.3355586A Look at the ECS Behavior of DNS ResolversProceedings
2019-09Tehrani et al.NDNSSEC: Namespace Management in NDN with DNSSECDOI 10.1145/3357150.3357417NDNSSEC: Namespace Management in NDN with DNSSECProceedings
2019-09Tehrani et al.The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpDOI 10.1145/3357150.3357401The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpProceedings
2019-09Lee et al.DGA-based malware detection using DNS traffic analysisDOI 10.1145/3338840.3355672DGA-based malware detection using DNS traffic analysisProceedings
2019-08Vyas & BatraBot detection by monitoring and grouping domain name server record response queries in DNS trafficDOI 10.1080/02522667.2019.1639945Bot detection by monitoring and grouping domain name server record response queries in DNS trafficJournal Article
2019-08Shafir et al.DNS Negative Caching in the WildDOI 10.1145/3342280.3342338DNS Negative Caching in the WildProceedings
2019-08Curtin et al.Detecting DGA domains with recurrent neural networks and side informationDOI 10.1145/3339252.3339258Detecting DGA domains with recurrent neural networks and side informationProceedings
2019-07Schmitt et al.Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019DOI 10.1145/3340301.3341128Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019Proceedings
2019-07Liu et al.Who is answering my queries: understanding and characterizing interception of the DNS resolution pathDOI 10.1145/3340301.3341122Who is answering my queries: understanding and characterizing interception of the DNS resolution pathProceedings
2019-07Hounsel et al.Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webDOI 10.1145/3340301.3341129Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webProceedings
2019-07Ferrara, E.The history of digital spamDOI 10.1145/3299768The history of digital spamJournal Article
2019-06Hudobnik, M.The Future of WHOIS : an analysis of the Policy Development Process under the GDPR with a focus on the litigation ICANN v. EPAGThe Future of WHOIS : an analysis of the Policy Development Process under the GDPR with a focus on the litigation ICANN v. EPAGMaster's Thesis
2019-05Lipton, J.Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America?Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America?Journal Article
2019-05Gould & FeherRFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8590RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2019-05Clemson, A.A Practical Guide to the Law of Domain Names and CybersquattingISBN 978-1912687121A Practical Guide to the Law of Domain Names and CybersquattingBook
2019-04Zhou et al.RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8544RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2019-03Zhou et al.RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingDOI 10.17487/RFC8543RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingInternet Specification
2019-03Li et al.MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningDOI 10.1145/3322645.3322675MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningProceedings
2019-01Hoffman et al.RFC 8499: DNS TerminologyDOI 10.17487/RFC8499RFC 8499: DNS TerminologyInternet Specification
2018-12Luo et al.A Large Scale Analysis of DNS Water Torture AttackDOI 10.1145/3297156.3297272A Large Scale Analysis of DNS Water Torture AttackProceedings
2018-12Liu et al.A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsDOI 10.1145/3284028.3284034A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsProceedings
2018-11Hollenbeck & NewtonRFC 8521: Registration Data Access Protocol (RDAP) Object TaggingDOI 10.17487/RFC8521RFC 8521: Registration Data Access Protocol (RDAP) Object TaggingInternet Specification
2018-11Gould & FeherRFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8495RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2018-10Zhu & HeidemannLDplayer: DNS Experimentation at ScaleDOI 10.1145/3278532.3278544LDplayer: DNS Experimentation at ScaleProceedings
2018-10Moura et al.When the Dike Breaks: Dissecting DNS Defenses During DDoSDOI 10.1145/3278532.3278534When the Dike Breaks: Dissecting DNS Defenses During DDoSProceedings
2018-10Lauinger et al.From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropDOI 10.1145/3278532.3278560From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropProceedings
2018-10Hoffman & McManusRFC 8484: DNS Queries over HTTPS (DoH)DOI 10.17487/RFC8484RFC 8484: DNS Queries over HTTPS (DoH)Internet Specification
2018-10Brandt et al.Domain Validation++ For MitM-Resilient PKIDOI 10.1145/3243734.3243790Domain Validation++ For MitM-Resilient PKIProceedings
2018-09Karaarslan & AdiguzelBlockchain Based DNS and PKI SolutionsDOI 10.1109/MCOMSTD.2018.1800023Blockchain Based DNS and PKI SolutionsJournal Article
2018-08Hohlfeld, O.Operating a DNS-based Active Internet ObservatoryDOI 10.1145/3234200.3234239Operating a DNS-based Active Internet ObservatoryProceedings
2018-08Abhishta et al.Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersDOI 10.1145/3229598.3229599Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersProceedings
2018-07Zhauniarovich et al.A Survey on Malicious Domains Detection through DNS Data AnalysisDOI 10.1145/3191329A Survey on Malicious Domains Detection through DNS Data AnalysisJournal Article
2018-07Allman, M.Comments On DNS RobustnessDOI 10.1145/3232755.3232773Comments On DNS RobustnessProceedings
2018-07Al-Dalky et al.Practical Challenge-Response for DNSDOI 10.1145/3232755.3232765Practical Challenge-Response for DNSProceedings
2018-06Szurdi & ChristinDomain Registration Policy Strategies and the Fight against Online CrimeDomain Registration Policy Strategies and the Fight against Online CrimeProceedings
2018-06Sehnoutka, M.Automatic verification of software packages with help of DNSAutomatic verification of software packages with help of DNSMaster's Thesis
2018-06Perrin, S.The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World's Data Protection AuthoritiesThe Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World's Data Protection AuthoritiesDoctoral Thesis
2018-06Messabi et al.Malware detection using DNS records and domain name featuresDOI 10.1145/3231053.3231082Malware detection using DNS records and domain name featuresProceedings
2018-05Weber et al.Unsupervised Clustering for Identification of Malicious Domain CampaignsDOI 10.1145/3203422.3203423Unsupervised Clustering for Identification of Malicious Domain CampaignsProceedings
2018-05Korczyński et al.Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsDOI 10.1145/3196494.3196548Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsProceedings
2018-04Moosavi, S.Rethinking Certificate Authorities: Understanding and decentralizing domain validationRethinking Certificate Authorities: Understanding and decentralizing domain validationMaster's Thesis
2018-04Miramirkhani et al.Panning for gold.com: Understanding the Dynamics of Domain DropcatchingDOI 10.1145/3178876.3186092Panning for gold.com: Understanding the Dynamics of Domain DropcatchingProceedings
2018-03Khalil et al.A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceDOI 10.1145/3176258.3176329A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceProceedings
2018-03Hananto et al.Detecting Network Security Threats Using Domain Name System and NetFlow TrafficDOI 10.1145/3199478.3199505Detecting Network Security Threats Using Domain Name System and NetFlow TrafficProceedings
2018-03Gould et al.RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8334RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2018-03Dickinson et al.RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSDOI 10.17487/RFC8310RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSInternet Specification
2018-01Hao, S.On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications DOI 10.21220/s2-d0nn-d249On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications Doctoral Thesis
2018-01Ferrante, A.The impact of GDPR on WHOIS: Implications for businesses facing cybercrimeThe impact of GDPR on WHOIS: Implications for businesses facing cybercrimeJournal Article
2018-01Ding, C.A new institutional economics analysis of the history of the regulation of the .cn (China) country-code top-level domain from 1990 to 2004DOI 10.25949/19439372.v1A new institutional economics analysis of the history of the regulation of the .cn (China) country-code top-level domain from 1990 to 2004Doctoral Thesis
2017-12Xu et al.An Adaptive Malicious Domain Detection Mechanism with DNS TrafficDOI 10.1145/3171592.3171595An Adaptive Malicious Domain Detection Mechanism with DNS TrafficProceedings
2017-12Elliott, K.The Who, What, Where, When, and Why of WHOIS: Privacy and Accuracy Concerns of the WHOIS DatabaseThe Who, What, Where, When, and Why of WHOIS: Privacy and Accuracy Concerns of the WHOIS DatabaseJournal Article
2017-11Szurdi & ChristinEmail typosquattingDOI 10.1145/3131365.3131399Email typosquattingProceedings
2017-11Sun et al.Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelDOI 10.1145/3127540.3127567Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelProceedings
2017-11Müller et al.Recursives in the wild: engineering authoritative DNS serversDOI 10.1145/3131365.3131366Recursives in the wild: engineering authoritative DNS serversProceedings
2017-11Lee & SpringIdentifying and Analyzing Broadband Internet Reverse DNS NamesDOI 10.1145/3143361.3143392Identifying and Analyzing Broadband Internet Reverse DNS NamesProceedings
2017-11Chung et al.Understanding the role of registrars in DNSSEC deploymentDOI 10.1145/3131365.3131373Understanding the role of registrars in DNSSEC deploymentProceedings
2017-11Almeida et al.Dissecting DNS Stakeholders in Mobile NetworksDOI 10.1145/3143361.3143375Dissecting DNS Stakeholders in Mobile NetworksProceedings
2017-10Vissers et al.The Wolf of Name Street: Hijacking Domains Through Their NameserversDOI 10.1145/3133956.3133988The Wolf of Name Street: Hijacking Domains Through Their NameserversProceedings
2017-10Spaulding et al.Understanding the effectiveness of typosquatting techniquesDOI 10.1145/3132465.3132467Understanding the effectiveness of typosquatting techniquesProceedings
2017-10Shanmugasundaram, S.A DNS Based Architecture for Publication and Discovery of Virtual Network Functions in Content Delivery NetworksA DNS Based Architecture for Publication and Discovery of Virtual Network Functions in Content Delivery NetworksMaster's Thesis
2017-10Scaife et al.OnionDNS: a seizure-resistant top-level domainDOI 10.1007/s10207-017-0391-zOnionDNS: a seizure-resistant top-level domainJournal Article
2017-10Mohaisen et al.Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresDOI 10.1109/TNET.2017.2717965Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresJournal Article
2017-10Klein et al.X-Ray Your DNSDOI 10.1145/3133956.3138821X-Ray Your DNSProceedings
2017-10Fukuda et al.Detecting Malicious Activity With DNS Backscatter Over TimeDOI 10.1109/TNET.2017.2724506Detecting Malicious Activity With DNS Backscatter Over TimeJournal Article
2017-10Feibish et al.Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesDOI 10.1145/3132465.3132474Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesProceedings
2017-10Chen et al.Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyDOI 10.1145/3133956.3134084Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyProceedings
2017-08Sperotto et al.TIDE: Threat Identification Using Active DNS MeasurementsDOI 10.1145/3123878.3131988TIDE: Threat Identification Using Active DNS MeasurementsProceedings
2017-08Rijswijk-Deij et al.The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverDOI 10.1145/3123878.3131987The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverProceedings
2017-08Booth & AnderssonDNS DDoS Mitigation, via DNS Timer Design ChangesDOI 10.1007/978-3-319-65548-2_4DNS DDoS Mitigation, via DNS Timer Design ChangesProceedings
2017-07Radwan, M.The Domain Name System Advisor, A Model-Based Quality Assurance FrameworkThe Domain Name System Advisor, A Model-Based Quality Assurance FrameworkDoctoral Thesis
2017-06Zhang et al.Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesDOI 10.1016/j.procs.2017.05.204Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesProceedings
2017-06Wassermann, S.Anycast-based DNS in Mobile NetworksAnycast-based DNS in Mobile NetworksMaster's Thesis
2017-06Ali, M.Trust-to-trust design of a new InternetTrust-to-trust design of a new InternetDoctoral Thesis
2017-04Simeonovski et al.Who Controls the Internet?: Analyzing Global Threats using Property Graph TraversalsDOI 10.1145/3038912.3052587Who Controls the Internet?: Analyzing Global Threats using Property Graph TraversalsProceedings
2017-04Silvestro et al.Is today's DNS the right solution for middleboxes selection?DOI 10.1145/3069383.3069389Is today's DNS the right solution for middleboxes selection?Proceedings
2017-04Radwan & HeckelPrediction of the domain name system (DNS) quality attributesDOI 10.1145/3019612.3019728Prediction of the domain name system (DNS) quality attributesProceedings
2017-03Koch et al.RFC 8109: Initializing a DNS Resolver with Priming QueriesDOI 10.17487/RFC8109RFC 8109: Initializing a DNS Resolver with Priming QueriesInternet Specification
2017-02Ribbers et al.RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolDOI 10.17487/RFC8063RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolInternet Specification
2017-02Reddy et al.RFC 8094: DNS over Datagram Transport Layer Security (DTLS)DOI 10.17487/RFC8094RFC 8094: DNS over Datagram Transport Layer Security (DTLS)Internet Specification
2017-02Jayarathna, W.Security techniques for virtual machine based systemsDOI 10.25949/19431446.v1Security techniques for virtual machine based systemsDoctoral Thesis
2017-01Hao & WangExploring Domain Name Based Features on the Effectiveness of DNS CachingDOI 10.1145/3041027.3041032Exploring Domain Name Based Features on the Effectiveness of DNS CachingJournal Article
2017-01Gould, J.RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingDOI 10.17487/RFC8056RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingInternet Specification
2017-01Aizuddin et al.DNS amplification attack detection and mitigation via sFlow with security-centric SDNDOI 10.1145/3022227.3022230DNS amplification attack detection and mitigation via sFlow with security-centric SDNProceedings
2016-11Ruohonen et al.Correlating file-based malware graphs against the empirical ground truth of DNS graphsDOI 10.1145/2993412.2993414Correlating file-based malware graphs against the empirical ground truth of DNS graphsProceedings
2016-11Moura et al.Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventDOI 10.1145/2987443.2987446Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventProceedings
2016-11Lauinger et al.WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationDOI 10.1145/2987443.2987463WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationProceedings
2016-11Korczyński et al.Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesDOI 10.1145/2987443.2987477Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesProceedings
2016-10Wright et al.Hands-on exercises about DNS attacks: details, setup and lessons learnedHands-on exercises about DNS attacks: details, setup and lessons learnedJournal Article
2016-10van Rijswijk-Deij et al.On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSECOn the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSECProceedings
2016-10Liu et al.All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsDOI 10.1145/2976749.2978387All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsProceedings
2016-10Katzlinger, H.Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher PerspektiveDas „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher PerspektiveMaster's Thesis
2016-10Hao et al.PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationDOI 10.1145/2976749.2978317PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationProceedings
2016-10Farnan et al.Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesDOI 10.1145/2994620.2994636Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesProceedings
2016-10Cifuentes et al.Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECDOI 10.1145/2998373.2998452Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECProceedings
2016-08Wijekoon & NishiImplement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3Proceedings
2016-08Meitei et al.Detection of DDoS DNS Amplification Attack Using Classification AlgorithmDOI 10.1145/2980258.2980431Detection of DDoS DNS Amplification Attack Using Classification AlgorithmProceedings
2016-08Jeong et al.A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureDOI 10.1145/2934872.2960423A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureProceedings
2016-08Gautam, R.Analysis and implementation of WHOIS domain lookupISSN 2454-2024Analysis and implementation of WHOIS domain lookupJournal Article
2016-07Hands, N.Detection of communication over DNSSEC covert channelsDetection of communication over DNSSEC covert channelsMaster's Thesis
2016-06Sahri & OkamuraProtecting DNS services from IP spoofing: SDN collaborative authentication approachDOI 10.1145/2935663.2935666Protecting DNS services from IP spoofing: SDN collaborative authentication approachProceedings
2016-06Ruohonen & LeppänenOn the Design of a Simple Network Resolver for DNS MiningDOI 10.1145/2983468.2983513On the Design of a Simple Network Resolver for DNS MiningProceedings
2016-06Holzmann et al.The Dawn of Today's Popular Domains: A Study of the Archived German Web over 18 YearsDOI 10.1145/2910896.2910901The Dawn of Today's Popular Domains: A Study of the Archived German Web over 18 YearsProceedings
2016-05Khalil et al.Discovering Malicious Domains through Passive DNS Data Graph AnalysisDOI 10.1145/2897845.2897877Discovering Malicious Domains through Passive DNS Data Graph AnalysisProceedings
2016-05Hu et al.RFC 7858: Specification for DNS over Transport Layer Security (TLS)DOI 10.17487/RFC7858RFC 7858: Specification for DNS over Transport Layer Security (TLS)Internet Specification
2016-03Hermann, D.Beobachtungsmöglichkeiten im Domain Name SystemDOI 10.1007/978-3-658-13263-7Beobachtungsmöglichkeiten im Domain Name SystemBook
2016-03Cormack, A.Do generic gTLDs require their own ex ante regulation?DOI 10.1080/13600869.2016.1145869Do generic gTLDs require their own ex ante regulation?Journal Article
2016-02Gao et al.Reexamining DNS from a global recursive resolver perspectiveDOI 10.1109/TNET.2014.2358637Reexamining DNS from a global recursive resolver perspectiveProceedings
2016-01Haneef, A.On the Scalable Generation of Cyber Threat Intelligence from Passive DNS StreamsOn the Scalable Generation of Cyber Threat Intelligence from Passive DNS StreamsMaster's Thesis
2016-01Benchaita et al.Stability and optimization of DNS-based request redirection in CDNsDOI 10.1145/2833312.2833455Stability and optimization of DNS-based request redirection in CDNsProceedings
2015-12van Zyl, I.A longitudinal study of DNS traffic: Understanding current DNS practice and abuseA longitudinal study of DNS traffic: Understanding current DNS practice and abuseMaster's Thesis
2015-10Liu et al.Who is .com?: Learning to Parse WHOIS RecordsDOI 10.1145/2815675.2815693Who is .com?: Learning to Parse WHOIS RecordsProceedings
2015-10Kührer et al.Going Wild: Large-Scale Classification of Open DNS ResolversDOI 10.1145/2815675.2815683Going Wild: Large-Scale Classification of Open DNS ResolversProceedings
2015-10Halvorson et al.From .academy to .zone: An Analysis of the New TLD Land RushDOI 10.1145/2815675.2815696From .academy to .zone: An Analysis of the New TLD Land RushProceedings
2015-10Fukuda & HeidemannDetecting Malicious Activity with DNS BackscatterDOI 10.1145/2815675.2815706Detecting Malicious Activity with DNS BackscatterProceedings
2015-10Bruen, G.WHOIS Running the Internet: Protocol, Policy, and PrivacyDOI 10.1002/9781118985786WHOIS Running the Internet: Protocol, Policy, and PrivacyBook
2015-09Rijswijk-Deij et al.Making the Case for Elliptic Curves in DNSSECDOI 10.1145/2831347.2831350Making the Case for Elliptic Curves in DNSSECJournal Article
2015-09Hands et al.A Study on Botnets Utilizing DNSDOI 10.1145/2808062.2808070A Study on Botnets Utilizing DNSProceedings
2015-08Rijswijk-Deij et al.The Internet of Names: A DNS Big DatasetDOI 10.1145/2785956.2789996The Internet of Names: A DNS Big DatasetProceedings
2015-08Nadji, Y.Understanding DNS-based criminal infrastructure for informing takedownsUnderstanding DNS-based criminal infrastructure for informing takedownsDoctoral Thesis
2015-06Marchal, S.DNS and Semantic Analysis for Phishing DetectionDNS and Semantic Analysis for Phishing DetectionDoctoral Thesis
2015-06Davis, R.C.Teaching the Network: A Brief Demonstration of the Internet's Structure for Information Literacy InstructionDOI 10.1080/01639269.2015.1042820Teaching the Network: A Brief Demonstration of the Internet's Structure for Information Literacy InstructionJournal Article
2015-06Bašti, M.Synchronization of DNS Records between LDAP Database and DNS ServerSynchronization of DNS Records between LDAP Database and DNS ServerMaster's Thesis
2015-05Lafta & MihaylovSecuring DNSSEC Last Mile with DTLSSecuring DNSSEC Last Mile with DTLSMaster's Thesis
2015-04Cold, S.DETERMINING THE INFLUENCE OF THE NETWORK TIME PROTOCOL (NTP) ON THE DOMAIN NAME SERVICE SECURITY EXTENSION (DNSSEC) PROTOCOLDETERMINING THE INFLUENCE OF THE NETWORK TIME PROTOCOL (NTP) ON THE DOMAIN NAME SERVICE SECURITY EXTENSION (DNSSEC) PROTOCOLDoctoral Thesis
2015-03Zhou et al.RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsDOI 10.17487/RFC7485RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsInternet Specification
2015-03Newton et al.RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7480RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Newton & HollenbeckRFC 7482: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC7482RFC 7482: Registration Data Access Protocol (RDAP) Query FormatInternet Specification
2015-03Newton & HollenbeckRFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7483RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Horne, W.Collecting, Analyzing and Responding to Enterprise Scale DNS EventsDOI 10.1145/2699026.2699027Collecting, Analyzing and Responding to Enterprise Scale DNS EventsProceedings
2015-03Hollenbeck & KongRFC 7481: Security Services for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7481RFC 7481: Security Services for the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Blanchet, M.RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceDOI 10.17487/RFC7484RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceInternet Specification
2015-02Hollenbeck, S.RFC 7451: Extension Registry for the Extensible Provisioning ProtocolDOI 10.17487/RFC7451RFC 7451: Extension Registry for the Extensible Provisioning ProtocolInternet Specification
2015-02Agten et al.Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseDOI 10.14722/ndss.2015.23058Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseProceedings
2014-12Zhang et al.Research on Privacy Protection of WHOIS Information in DNSDOI 10.1007/978-3-662-45402-2_11Research on Privacy Protection of WHOIS Information in DNSBook Section
2014-12Herzberg & ShulmanDNS authentication as a service: preventing amplification attacksDOI 10.1145/2664243.2664281DNS authentication as a service: preventing amplification attacksProceedings
2014-11Zaki et al.Dissecting Web Latency in GhanaDOI 10.1145/2663716.2663748Dissecting Web Latency in GhanaProceedings
2014-11Wang, Z.On the Capability of DNS Cache Poisoning AttacksDOI 10.1145/2660267.2662363On the Capability of DNS Cache Poisoning AttacksProceedings
2014-11Thomas & MohaisenMeasuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemDOI 10.1145/2665943.2665951Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemProceedings
2014-11Shulman, H.Pretty Bad Privacy: Pitfalls of DNS EncryptionDOI 10.1145/2665943.2665959Pretty Bad Privacy: Pitfalls of DNS EncryptionProceedings
2014-11Shulman & EzraOn the Resilience of DNS InfrastructureDOI 10.1145/2660267.2662376On the Resilience of DNS InfrastructureProceedings
2014-11Rula & BustamanteBehind the Curtain: Cellular DNS and Content Replica SelectionDOI 10.1145/2663716.2663734Behind the Curtain: Cellular DNS and Content Replica SelectionProceedings
2014-11Rijswijk-Deij et al.DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyDOI 10.1145/2663716.2663731DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyProceedings
2014-11Al Ramahi, M.AN INVESTIGATION INTO THE LEGAL STATUS OF INTERNET DOMAIN NAMESAN INVESTIGATION INTO THE LEGAL STATUS OF INTERNET DOMAIN NAMESDoctoral Thesis
2014-10Schomp et al.DNS Resolvers Considered HarmfulDOI 10.1145/2670518.2673881DNS Resolvers Considered HarmfulProceedings
2014-09Kumari et al.RFC 7344: Automating DNSSEC Delegation Trust MaintenanceDOI 10.17487/RFC7344RFC 7344: Automating DNSSEC Delegation Trust MaintenanceInternet Specification
2014-09Fernandez & VanhilstThe secure and trustable distributed name system patternThe secure and trustable distributed name system patternProceedings
2014-09Bianzino et al.Who is whois? An analysis of results consistenceDOI 10.1109/SOFTCOM.2014.7039137Who is whois? An analysis of results consistenceProceedings
2014-08Zhu et al.T-DNS: connection-oriented DNS to improve privacy and securityDOI 10.1145/2619239.2631442T-DNS: connection-oriented DNS to improve privacy and securityProceedings
2014-07Huffaker et al.DRoP: DNS-based router positioningDOI 10.1145/2656877.2656879DRoP: DNS-based router positioningProceedings
2014-07Binsalleeh, H.Analysis of Malware and Domain Name System TrafficAnalysis of Malware and Domain Name System TrafficDoctoral Thesis
2014-06Lehmberg et al.Graph structure in the web: aggregated by pay-level domainDOI 10.1145/2615569.2615674Graph structure in the web: aggregated by pay-level domainProceedings
2014-06Clayton & MansfieldA Study of Whois Privacy and Proxy Service AbuseA Study of Whois Privacy and Proxy Service AbuseProceedings
2014-05Včelák, J.Library and Tools for Server-Side DNSSEC ImplementationLibrary and Tools for Server-Side DNSSEC ImplementationMaster's Thesis
2014-05Parunak et al.An agent-based framework for dynamical understanding of DNS events (DUDE)DOI 10.1145/2602945.2602951An agent-based framework for dynamical understanding of DNS events (DUDE)Proceedings
2014-04Thomas & MohaisenKindred domains: detecting and clustering botnet domains using DNS trafficDOI 10.1145/2567948.2579359Kindred domains: detecting and clustering botnet domains using DNS trafficProceedings
2014-04Himbeault, M.A novel approach to detecting covert DNS tunnels using throughput estimationA novel approach to detecting covert DNS tunnels using throughput estimationMaster's Thesis
2014-04Halvorson et al.XXXtortion?: inferring registration intent in the .XXX TLDDOI 10.1145/2566486.2567995XXXtortion?: inferring registration intent in the .XXX TLDProceedings
2014-04Bilge et al.Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsDOI 10.1145/2584679Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsJournal Article
2014-03Leontiadis & ChristinEmpirically Measuring WHOIS MisuseDOI 10.1007/978-3-319-11203-9_2Empirically Measuring WHOIS MisuseBook Section
2014-01Jayarathna et al.Hypervisor-based security architecture for validating DNS servicesHypervisor-based security architecture for validating DNS servicesProceedings
2013-12Fofack & AloufModeling modern DNS cachesDOI 10.4108/icst.valuetools.2013.254416Modeling modern DNS cachesProceedings
2013-11Watters et al.ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?DOI 10.1109/CTC.2013.13ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?Proceedings
2013-11Kazato et al.Towards classification of DNS erroneous queriesDOI 10.1145/2534142.2534146Towards classification of DNS erroneous queriesProceedings
2013-11Chitpranee & FukudaTowards passive DNS software fingerprintingDOI 10.1145/2534142.2534144Towards passive DNS software fingerprintingProceedings
2013-11Anagnostopoulos et al.DNS amplification attack revisitedDOI 10.1016/j.cose.2013.10.001DNS amplification attack revisitedJournal Article
2013-10Streibelt et al.Exploring EDNS-client-subnet adopters in your free timeDOI 10.1145/2504730.2504767Exploring EDNS-client-subnet adopters in your free timeProceedings
2013-10Schomp et al.On measuring the client-side DNS infrastructureDOI 10.1145/2504730.2504734On measuring the client-side DNS infrastructureProceedings
2013-10Hao et al.Understanding the domain registration behavior of spammersDOI 10.1145/2504730.2504753Understanding the domain registration behavior of spammersProceedings
2013-10Garcia, F.DNS: (do not suspect)DOI 10.1145/2512209.2512222DNS: (do not suspect)Proceedings
2013-10Berger et al.Internet nameserver IPv4 and IPv6 address relationshipsDOI 10.1145/2504730.2504745Internet nameserver IPv4 and IPv6 address relationshipsProceedings
2013-08Gao et al.An empirical reexamination of global DNS behaviorDOI 10.1145/2486001.2486018An empirical reexamination of global DNS behaviorProceedings
2013-07Shue & KalafutResolvers Revealed: Characterizing DNS Resolvers and their ClientsDOI 10.1145/2499926.2499928Resolvers Revealed: Characterizing DNS Resolvers and their ClientsJournal Article
2013-07Callahan et al.On modern DNS behavior and propertiesDOI 10.1145/2500098.2500100On modern DNS behavior and propertiesJournal Article
2013-05Yuan et al.A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesDOI 10.1145/2461321.2461324A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesJournal Article
2013-04Damas et al.RFC 6891: Extension Mechanisms for DNS (EDNS(0))DOI 10.17487/RFC6891RFC 6891: Extension Mechanisms for DNS (EDNS(0))Internet Specification
2013-03Selby, J.A new institutional economics analysis of the history of the regulation of the .au country-code top-level domain from 1986 to 2002DOI 10.26190/unsworks/2473A new institutional economics analysis of the history of the regulation of the .au country-code top-level domain from 1986 to 2002Doctoral Thesis
2013-02Cheshire & KrochmalRFC 6762: Multicast DNSDOI 10.17487/RFC6762RFC 6762: Multicast DNSInternet Specification
2013-02Weiler & BlackaRFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)DOI 10.17487/RFC6840RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)Internet Specification
2013-01Ljunggren et al.RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsDOI 10.17487/RFC6841RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsInternet Specification
2012-12Severance, C.Vint Cerf: A Brief History of PacketsDOI 10.1109/MC.2012.422Vint Cerf: A Brief History of PacketsJournal Article
2012-12Rose, S.Progress of DNS security deployment in the federal governmentProgress of DNS security deployment in the federal governmentProceedings
2012-12Kolkman et al.RFC 6781: DNSSEC Operational Practices, Version 2DOI 10.17487/RFC6781RFC 6781: DNSSEC Operational Practices, Version 2Internet Specification
2012-11Otto et al.Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsDOI 10.1145/2398776.2398831Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsProceedings
2012-11Bermudez et al.DNS to the rescue: discerning content and services in a tangled webDOI 10.1145/2398776.2398819DNS to the rescue: discerning content and services in a tangled webProceedings
2012-10Kaliski, B.Revisiting DNS and WHOIS in the cloud eraDOI 10.1145/2381913.2381929Revisiting DNS and WHOIS in the cloud eraProceedings
2012-10Dagon, D.Large-scale DNS data analysisDOI 10.1145/2382196.2382325Large-scale DNS data analysisProceedings
2012-09Stallings et al.“WHOIS” Selling All The PillsDOI 10.5769/J201202004“WHOIS” Selling All The PillsJournal Article
2012-08Otto et al.namehelp: intelligent client-side DNS resolutionDOI 10.1145/2342356.2342413namehelp: intelligent client-side DNS resolutionProceedings
2012-08Chaudhry et al.Signposts: end-to-end networking in a world of middleboxesDOI 10.1145/2342356.2342371Signposts: end-to-end networking in a world of middleboxesProceedings
2012-07AnonymousThe collateral damage of internet censorship by DNS injectionDOI 10.1145/2317307.2317311The collateral damage of internet censorship by DNS injectionJournal Article
2012-06Rose & WijngaardsRFC 6672: DNAME Redirection in the DNSDOI 10.17487/RFC6672RFC 6672: DNAME Redirection in the DNSInternet Specification
2012-05Zhou, F.New cloud architectures for the next generation internetNew cloud architectures for the next generation internetDoctoral Thesis
2012-04Yu et al.Authority server selection in DNS caching resolversDOI 10.1145/2185376.2185387Authority server selection in DNS caching resolversJournal Article
2012-04Sullivan & KucherawyRevisiting Whois: Coming to REST10.1109/MIC.2012.55Revisiting Whois: Coming to RESTJournal Article
2012-03Kagwe & MasindeSurvey on DNS configurations, interdependencies, resilience and security for *.ke domainsDOI 10.1145/2160601.2160632Survey on DNS configurations, interdependencies, resilience and security for *.ke domainsProceedings
2012-03Halvorson et al.The BIZ Top-Level Domain: Ten Years LaterDOI 10.1007/978-3-642-28537-0_22The BIZ Top-Level Domain: Ten Years LaterProceedings
2012-03Deri et al.Towards a passive DNS monitoring systemDOI 10.1145/2245276.2245396Towards a passive DNS monitoring systemProceedings
2012-03Crowcroft, J.The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...DOI 10.1145/2185376.2185392The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...Journal Article
2012-01Ballmann, C.WHOIS DNS?DOI 10.1007/978-3-642-24305-9_6WHOIS DNS?Book Section
2011-12Khurshid et al.Improving robustness of DNS to software vulnerabilitiesDOI 10.1145/2076732.2076758Improving robustness of DNS to software vulnerabilitiesProceedings
2011-12Kalafut et al.Touring DNS open houses for trends and configurationsDOI 10.1109/TNET.2011.2130537Touring DNS open houses for trends and configurationsProceedings
2011-11Hao et al.Monitoring the initial DNS behavior of malicious domainsDOI 10.1145/2068816.2068842Monitoring the initial DNS behavior of malicious domainsProceedings
2011-09Claffy, Kc C.Underneath the hood: ownership vs. stewardship of the internetDOI 10.1145/2043165.2043173Underneath the hood: ownership vs. stewardship of the internetJournal Article
2011-09Bai et al.Defense against DNS Man-In-The-Middle SpoofingDOI 10.1007/978-3-642-23971-7_39Defense against DNS Man-In-The-Middle SpoofingBook Section
2011-08Hurter, E.Aspects of the nature and online resolution of domain-name disputesAspects of the nature and online resolution of domain-name disputesDoctoral Thesis
2011-05Xu et al.K-means and adaptive k-means algorithms for clustering DNS trafficDOI 10.5555/2151688.2151720K-means and adaptive k-means algorithms for clustering DNS trafficProceedings
2011-04Leita & CovaHARMUR: storing and analyzing historic data on malicious domainsDOI 10.1145/1978672.1978678HARMUR: storing and analyzing historic data on malicious domainsProceedings
2011-02Borkar et al.Implementation of round robin policy in DNS for thresholding of distributed web server systemDOI 10.1145/1980022.1980067Implementation of round robin policy in DNS for thresholding of distributed web server systemProceedings
2011-02Bilge et al.EXPOSURE: Finding Malicious Domains Using Passive DNS AnalysisEXPOSURE: Finding Malicious Domains Using Passive DNS AnalysisProceedings
2010-12Yasmin et al.Security issues related with DNS dynamic updates for mobile nodes: a surveyDOI 10.1145/1943628.1943645Security issues related with DNS dynamic updates for mobile nodes: a surveyProceedings
2010-11Yadav et al.Detecting algorithmically generated malicious domain namesDOI 10.1145/1879141.1879148Detecting algorithmically generated malicious domain namesProceedings
2010-11Kalafut et al.An empirical study of orphan DNS servers in the internetDOI 10.1145/1879141.1879182An empirical study of orphan DNS servers in the internetProceedings
2010-11Chatzis, N.Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDOI 10.14279/depositonce-2647Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDoctoral Thesis
2010-11Ager et al.Comparing DNS resolvers in the wildDOI 10.1145/1879141.1879144Comparing DNS resolvers in the wildProceedings
2010-08Klensin, J.RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolDOI 10.17487/RFC5891RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolInternet Specification
2010-06Schiavetta & KomaitisICANN's role in controlling information on the internetDOI 10.1080/1360086032000174379ICANN's role in controlling information on the internetJournal Article
2010-06Lewis & HoenesRFC 5936: DNS Zone Transfer Protocol (AXFR)DOI 10.17487/RFC5936RFC 5936: DNS Zone Transfer Protocol (AXFR)Internet Specification
2010-05Gould & HollenbeckRFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5910RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2010-05Abley & MandersonRFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesDOI 10.17487/RFC5855RFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesInternet Specification
2010-04Born & GustafsonNgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisDOI 10.1145/1852666.1852718NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisProceedings
2010-01Carpenter & PartridgeInternet requests for comments (RFCs) as scholarly publicationsDOI 10.1145/1672308.1672315Internet requests for comments (RFCs) as scholarly publicationsJournal Article
2009-12Vixie, P.What DNS is notDOI 10.1145/1610252.1610269What DNS is notJournal Article
2009-09Pfeifer, G.A New Internet Naming SystemA New Internet Naming SystemDoctoral Thesis
2009-08Hollenbeck, S.RFC 5730: Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5730RFC 5730: Extensible Provisioning Protocol (EPP)Internet Specification
2009-08Hollenbeck, S.RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingDOI 10.17487/RFC5731RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingInternet Specification
2009-08Hollenbeck, S.RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingDOI 10.17487/RFC5732RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingInternet Specification
2009-08Hollenbeck, S.RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingDOI 10.17487/RFC5733RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingInternet Specification
2009-08Hollenbeck, S.RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPDOI 10.17487/RFC5734RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPInternet Specification
2009-03Villamarín-Salomón & BrustoloniBayesian bot detection based on DNS traffic similarityDOI 10.1145/1529282.1529734Bayesian bot detection based on DNS traffic similarityProceedings
2008-10Plonka & BarfordContext-aware clustering of DNS query trafficDOI 10.1145/1452520.1452547Context-aware clustering of DNS query trafficProceedings
2008-10Kalafut et al.Understanding implications of DNS zone provisioningDOI 10.1145/1452520.1452546Understanding implications of DNS zone provisioningProceedings
2008-10Damas & NevesRFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksDOI 10.17487/RFC5358RFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksInternet Specification
2008-10Dagon et al.Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesDOI 10.1145/1455770.1455798Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesProceedings
2008-10Ballani & FrancisMitigating DNS DoS attacksDOI 10.1145/1455770.1455796Mitigating DNS DoS attacksProceedings
2008-09Goth, G.ICANN's TLD Plans Are Defined, Not Yet RefinedDOI 10.1109/MIC.2008.102ICANN's TLD Plans Are Defined, Not Yet RefinedJournal Article
2008-08Atkinson et al.Mobility through naming: impact on DNSDOI 10.1145/1403007.1403010Mobility through naming: impact on DNSProceedings
2008-04Akcan et al.Geographic web usage estimation by monitoring DNS cachesDOI 10.1145/1367798.1367813Geographic web usage estimation by monitoring DNS cachesProceedings
2008-03Laurie et al.RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceDOI 10.17487/RFC5155RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceInternet Specification
2007-12Lindsay, D.International Domain Name Law: ICANN and the UDRPISBN 978-1841135847International Domain Name Law: ICANN and the UDRPBook
2007-10Jackson et al.Protecting browsers from DNS rebinding attacksDOI 10.1145/1315245.1315298Protecting browsers from DNS rebinding attacksProceedings
2007-10Cano et al.Solving the user-to-host binding problem in ad hoc networks through photo-idsDOI 10.1145/1298197.1298212Solving the user-to-host binding problem in ad hoc networks through photo-idsProceedings
2007-07Zhang et al.Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingDOI 10.1145/1326304.1326314Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingProceedings
2007-05Alzoubi et al.MyXDNS: a resquest routing dns server with decoupled server selectionDOI 10.1145/1242572.1242620MyXDNS: a resquest routing dns server with decoupled server selectionProceedings
2007-04Vixie, P.DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.DOI 10.1145/1242489.1242499DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.Journal Article
2007-04Ariyapperuma & MitchellSecurity vulnerabilities in DNS and DNSSECDOI 10.1109/ARES.2007.139Security vulnerabilities in DNS and DNSSECProceedings
2007-01Efroni, Z.Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsISBN 978-0275988821Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsBook Section
2006-12Padmanabhan et al.A study of end-to-end web access failuresDOI 10.1145/1368436.1368457A study of end-to-end web access failuresProceedings
2006-11Ren et al.Visualizing DNS trafficDOI 10.1145/1179576.1179582Visualizing DNS trafficProceedings
2006-10Sarat et al.On the Use of Anycast in DNSDOI 10.1109/ICCCN.2006.286248On the Use of Anycast in DNSProceedings
2006-10Hedley, S.A brief history of spamDOI 10.1080/13600830600960758A brief history of spamJournal Article
2006-09Newton, A.Replacing the Whois Protocol: IRIS and the IETF's CRISP Working GroupDOI 10.1109/MIC.2006.86Replacing the Whois Protocol: IRIS and the IETF's CRISP Working GroupJournal Article
2006-09Alexander, T.Domain name registrars: are they part of the domain name fraud problem?DOI 10.1145/1231047.1231071Domain name registrars: are they part of the domain name fraud problem?Proceedings
2006-07Lewis, E.RFC 4592: The Role of Wildcards in the Domain Name SystemDOI 10.17487/RFC4592RFC 4592: The Role of Wildcards in the Domain Name SystemInternet Specification
2006-07Kim et al.Resolving islands of security problem for DNSSECDOI 10.1145/1143549.1143804Resolving islands of security problem for DNSSECProceedings
2006-07Broido et al.The windows of pivate DNS updatesDOI 10.1145/1140086.1140098The windows of pivate DNS updatesProceedings
2005-10Ramasubramanian & SirerPerils of transitive trust in the domain name systemPerils of transitive trust in the domain name systemProceedings
2005-10Deegan et al.The main name system: an exercise in centralized computingDOI 10.1145/1096536.1096538The main name system: an exercise in centralized computingProceedings
2005-10Antonova, S.Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002)Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002)Doctoral Thesis
2005-08Ishibashi et al.Detecting mass-mailing worm infected hosts by mining DNS traffic dataDOI 10.1145/1080173.1080175Detecting mass-mailing worm infected hosts by mining DNS traffic dataProceedings
2005-03Arends et al.RFC 4033: DNS Security Introduction and RequirementsDOI 10.17487/RFC4033RFC 4033: DNS Security Introduction and RequirementsInternet Specification
2005-03Arends et al.RFC 4034: Resource Records for the DNS Security ExtensionsDOI 10.17487/RFC4034RFC 4034: Resource Records for the DNS Security ExtensionsInternet Specification
2005-03Arends et al.RFC 4035: Protocol Modifications for the DNS Security ExtensionsDOI 10.17487/RFC4035RFC 4035: Protocol Modifications for the DNS Security ExtensionsInternet Specification
2005-02Fetzer et al.Enhancing DNS security using the SSL trust infrastructureDOI 10.1109/WORDS.2005.33Enhancing DNS security using the SSL trust infrastructureProceedings
2005-01Burshtein, S.Whazup with the WHOIS?ISSN 1702-9228Whazup with the WHOIS?Journal Article
2004-10Pang et al.Availability, usage, and deployment characteristics of the domain name systemDOI 10.1145/1028788.1028790Availability, usage, and deployment characteristics of the domain name systemProceedings
2004-10Pang et al.On the responsiveness of DNS-based network controlDOI 10.1145/1028788.1028792On the responsiveness of DNS-based network controlProceedings
2004-10Jung & SitAn empirical study of spam traffic and the use of DNS black listsDOI 10.1145/1028788.1028838An empirical study of spam traffic and the use of DNS black listsProceedings
2004-09Pappas et al.Distributed DNS troubleshootingDOI 10.1145/1016687.1016694Distributed DNS troubleshootingProceedings
2004-09Hollenbeck, S.RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3915RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2004-09Daigle, L.RFC 3912: WHOIS Protocol SpecificationDOI 10.17487/RFC3912RFC 3912: WHOIS Protocol SpecificationInternet Specification
2004-08Seshan, S.Session details: DNS and namingDOI 10.1145/3244279Session details: DNS and namingProceedings
2004-08Ramasubramanian & SirerThe design and implementation of a next generation name service for the internetDOI 10.1145/1015467.1015504The design and implementation of a next generation name service for the internetProceedings
2004-08Pappas et al.Impact of configuration errors on DNS robustnessDOI 10.1145/1015467.1015503Impact of configuration errors on DNS robustnessProceedings
2004-03Hollenbeck, S.RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3735RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)Internet Specification
2003-10Wills et al.Inferring relative popularity of internet applications by actively querying DNS cachesDOI 10.1145/948205.948216Inferring relative popularity of internet applications by actively querying DNS cachesProceedings
2003-07Broido et al.Spectroscopy of DNS update trafficDOI 10.1145/781027.781077Spectroscopy of DNS update trafficProceedings
2003-05Krishnamurthy et al.DEW: DNS-enhanced web for faster content deliveryDOI 10.1145/775152.775196DEW: DNS-enhanced web for faster content deliveryProceedings
2002-11Liston et al.Diversity in DNS performance measuresDOI 10.1145/637201.637204Diversity in DNS performance measuresProceedings
2002-05Schumacher et al.Domain-Namen im InternetDOI 10.1007/978-3-642-55963-1Domain-Namen im InternetBook
2001-11Jung et al.DNS performance and the effectiveness of cachingDOI 10.1145/505202.505223DNS performance and the effectiveness of cachingProceedings
2001-11Cranor et al.Characterizing large DNS traces using graphsDOI 10.1145/505202.505210Characterizing large DNS traces using graphsProceedings
2001-11Ateniese & MangardA new approach to DNS security (DNSSEC)DOI 10.1145/501983.501996A new approach to DNS security (DNSSEC)Journal Article
2000-04Froomkin et al.Domain Names under ICANN: Technical Management or Policy ChokepointDOI 10.1145/332186.545149Domain Names under ICANN: Technical Management or Policy ChokepointProceedings
1998-03Mueller, M.The battle over Internet domain names: Global or national TLDs?DOI 10.1016/S0308-5961(97)00062-1The battle over Internet domain names: Global or national TLDs?Journal Article
1998-03Andrews, M.RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)DOI 10.17487/RFC2308RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)Internet Specification
1997-07Elz et al.RFC 2182: Selection and Operation of Secondary DNS ServersDOI 10.17487/RFC2182RFC 2182: Selection and Operation of Secondary DNS ServersInternet Specification
1997-07Elz & BushRFC 2181: Clarifications to the DNS SpecificationDOI 10.17487/RFC2181RFC 2181: Clarifications to the DNS SpecificationInternet Specification
1997-06Williamson, S.RFC 2167: Referral Whois (RWhois) Protocol V1.5DOI 10.17487/RFC2167RFC 2167: Referral Whois (RWhois) Protocol V1.5Internet Specification
1997-04Vixie et al.RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)DOI 10.17487/RFC2136RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)Internet Specification
1996-08Vixie, P.RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)DOI 10.17487/RFC1996RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)Internet Specification
1996-02Barr, D.RFC 1912: Common DNS Operational and Configuration ErrorsDOI 10.17487/RFC1912RFC 1912: Common DNS Operational and Configuration ErrorsInternet Specification
1995-08Gargano & WeissRFC 1834: Whois and Network Information Lookup Service, Whois++DOI 10.17487/RFC1834RFC 1834: Whois and Network Information Lookup Service, Whois++Internet Specification
1994-11Williamson & KostersRFC 1714: Referral Whois Protocol (RWhois)DOI 10.17487/RFC1714RFC 1714: Referral Whois Protocol (RWhois)Internet Specification
1994-03Postel, J.RFC 1591: Domain Name System Structure and DelegationDOI 10.17487/RFC1591RFC 1591: Domain Name System Structure and DelegationInternet Specification
1994-01Scheller et al.Internet Werkzeuge und Dienste: WhoisDOI 10.1007/978-3-642-85137-7_8Internet Werkzeuge und Dienste: WhoisBook Section
1993-11Calcari et al.Network information centers (NICs): is there one on your horizon?DOI 10.1145/263814.263830Network information centers (NICs): is there one on your horizon?Proceedings
1988-08Mockapetris & DunlapDevelopment of the domain name systemDOI 10.1145/52324.52338Development of the domain name systemJournal Article
1987-11Mockapetris, P.RFC 1035: Domain names - implementation and specificationDOI 10.17487/RFC1035RFC 1035: Domain names - implementation and specificationInternet Specification
1985-10Harrenstien et al.RFC 954: NICNAME/WHOISDOI 10.17487/RFC0954RFC 954: NICNAME/WHOISInternet Specification
1985-09Comer & PetersonIssues in using DARPA domain names for computer mailDOI 10.1145/318951.319036Issues in using DARPA domain names for computer mailJournal Article
1983-11Mockapetris, P.RFC 882: Domain names: Concepts and facilitiesDOI 10.17487/RFC0882RFC 882: Domain names: Concepts and facilitiesInternet Specification
1983-11Mockapetris, P.RFC 883: Domain names: Implementation specificationDOI 10.17487/RFC0883RFC 883: Domain names: Implementation specificationInternet Specification
1982-03Harrenstien & WhiteRFC 812: NICNAME/WHOISDOI 10.1080/19331680802425503RFC 812: NICNAME/WHOISInternet Specification