The basis of scientific work is literature research, which can vary in length depending on the topic, time, and skills. This website offers a first overview to find scientific articles, doctoral and master's theses, books, and other works that revolve around the subject of DNS in a broader sense. Sure, there are services like ResearchGate and Google Scholar, but sometimes a curated list is more accessible. Of course, this site is free of charge (please note some works need access through your institution) and does not claim to be complete. Right now, this site covers about 360 works. This list will be updated irregularly. If you have suggestions for new entries, please get in touch by email: works@dnsscience.org.

DateAuthor(s)TitleTitleType
2023-01Melcher et al.Tunneling through DNS over TLS ProvidersTunneling through DNS over TLS ProvidersProceedings
2022-12Faulkenberry et al.View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyDOI 10.1145/3564625.3564646View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyProceedings
2022-12Fainchtein et al.User Perceptions of the Privacy and Usability of Smart DNSDOI 10.1145/3564625.3567978User Perceptions of the Privacy and Usability of Smart DNSProceedings
2022-12Csikor et al.ZeroDNS: Towards Better Zero Trust Security using DNSDOI 10.1145/3564625.3567968ZeroDNS: Towards Better Zero Trust Security using DNSProceedings
2022-12Chiscop et al.AI-based detection of DNS misuse for network securityDOI 10.1145/3565009.3569523AI-based detection of DNS misuse for network securityProceedings
2022-11Shulman & WaidnerDNS in Routers Considered HarmfulDOI 10.1145/3548606.3563509DNS in Routers Considered HarmfulProceedings
2022-11Maghsoudlou et al.FlowDNS: correlating netflow and DNS streams at scaleDOI 10.1145/3555050.3569135FlowDNS: correlating netflow and DNS streams at scaleProceedings
2022-11Hlavacek et al.Behind the Scenes of RPKIDOI 10.1145/3548606.3560645Behind the Scenes of RPKIProceedings
2022-10Yazdani et al.Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksDOI 10.1145/3545948.3545959Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksProceedings
2022-10Xia et al.Challenges in decentralized name management: the case of ENSDOI 10.1145/3517745.3561469Challenges in decentralized name management: the case of ENSProceedings
2022-10Voelker et al.Where .ru?: assessing the impact of conflict on russian domain infrastructureDOI 10.1145/3517745.3561423Where .ru?: assessing the impact of conflict on russian domain infrastructureProceedings
2022-10Toorn et al.Saving Brian's privacy: the perils of privacy exposure through reverse DNSDOI 10.1145/3517745.3561424Saving Brian's privacy: the perils of privacy exposure through reverse DNSProceedings
2022-10Sommese et al.Assessing e-Government DNS ResilienceAssessing e-Government DNS ResilienceProceedings
2022-10Sommese et al.Investigating the impact of DDoS attacks on DNS infrastructureDOI 10.1145/3517745.3561458Investigating the impact of DDoS attacks on DNS infrastructureProceedings
2022-10Sommese et al.Observable KINDNS: validating DNS hygieneDOI 10.1145/3517745.3563016Observable KINDNS: validating DNS hygieneProceedings
2022-10Nie et al.Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS ResolversTowards a Behavioral and Privacy Analysis of ECS for IPv6 DNS ResolversProceedings
2022-10Kosek et al.DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceDOI 10.1145/3517745.3561445DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceProceedings
2022-10Kaplan & FeibishPractical handling of DNS in the data planeDOI 10.1145/3563647.3563654Practical handling of DNS in the data planeProceedings
2022-10Joback et al.A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolDOI 10.1145/3477997.3478007A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolProceedings
2022-10Jin et al.An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersDOI 10.1145/3556223.3556263An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersProceedings
2022-10Izhikevich et al.ZDNS: a fast DNS toolkit for internet measurementDOI 10.1145/3517745.3561434ZDNS: a fast DNS toolkit for internet measurementProceedings
2022-10Arouna et al.On unifying diverse DNS data sourcesDOI 10.1145/3517745.3563022On unifying diverse DNS data sourcesProceedings
2022-10AlSabah et al.Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSDOI 10.1145/3545948.3545958Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSProceedings
2022-10Allman, M.Putting DNS in ContextDOI 10.1145/3419394.3423659Putting DNS in ContextProceedings
2022-10Akiwate et al.Retroactive identification of targeted DNS infrastructure hijackingDOI 10.1145/3517745.3561425Retroactive identification of targeted DNS infrastructure hijackingProceedings
2022-09Yang et al.A deep dive into DNS behavior and query failuresDOI 10.1016/j.comnet.2022.109131A deep dive into DNS behavior and query failuresJournal Article
2022-09Wala & Cotton"Off-Label" Use of DNSDOI 10.1145/3491261"Off-Label" Use of DNSJournal Article
2022-09Sattler, T.Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat.Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat.Master's Thesis
2022-09Luo et al.A global name mapping system for ICN-IP coexistenceDOI 10.1145/3517212.3559492A global name mapping system for ICN-IP coexistenceProceedings
2022-09Cheng et al.Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesDOI 10.1093/comjnl/bxab062Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesJournal Article
2022-07McGhee et al.NetInfra - A Framework for Expressing Network Infrastructure as CodeDOI 10.1145/3491418.3530762NetInfra - A Framework for Expressing Network Infrastructure as CodeProceedings
2022-07Mathews et al.A Deep Learning Approach to Create DNS Amplification AttacksDOI 10.1145/3535782.3535838A Deep Learning Approach to Create DNS Amplification AttacksProceedings
2022-07Lyu et al.A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesDOI 10.1145/3547331A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesJournal Article
2022-05Roure et al.Investigating link service infrastructuresDOI 10.1145/336296.336325Investigating link service infrastructuresProceedings
2022-04Kosek et al.Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeDOI 10.1145/3544912.3544918Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeJournal Article
2022-03Mahdavifar et al.Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningDOI 10.1145/3507509.3507520Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningProceedings
2022-03Blanchet, M.RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceDOI 10.17487/RFC9224RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceInternet Specification
2022-02Park et al.A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetDOI 10.1109/TNET.2021.3105599A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetJournal Article
2022-02Dan et al.IP Geolocation through Reverse DNSDOI 10.1145/3457611IP Geolocation through Reverse DNSJournal Article
2021-12Sattler et al.RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC9167RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)Internet Specification
2021-12Nawrocki et al.Transparent forwarders: an unnoticed component of the open DNS infrastructureDOI 10.1145/3485983.3494872Transparent forwarders: an unnoticed component of the open DNS infrastructureProceedings
2021-12Lenders et al.Securing name resolution in the IoT: DNS over CoAPDOI 10.1145/3488658.3493790Securing name resolution in the IoT: DNS over CoAPProceedings
2021-12Gould & WilhelmRFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferDOI 10.17487/RFC9154RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferInternet Specification
2021-11Zhang et al.Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisDOI 10.1016/j.cose.2021.102445Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisJournal Article
2021-11Randall et al.Home is where the hijacking is: understanding DNS interception by residential routersDOI 10.1145/3487552.3487817Home is where the hijacking is: understanding DNS interception by residential routersProceedings
2021-11Nawrocki et al.The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreDOI 10.1145/3487552.3487835The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreProceedings
2021-11Moura et al.TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSDOI 10.1145/3487552.3487824TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSProceedings
2021-11Man et al.DNS Cache Poisoning Attack: Resurrections with Side ChannelsDOI 10.1145/3460120.3486219DNS Cache Poisoning Attack: Resurrections with Side ChannelsProceedings
2021-11Kakarla et al.How Complex is DNS?DOI 10.1145/3484266.3487369How Complex is DNS?Proceedings
2021-11Hounsel et al.Designing for Tussle in Encrypted DNSDOI 10.1145/3484266.3487383Designing for Tussle in Encrypted DNSProceedings
2021-11Chhabra et al.Measuring DNS-over-HTTPS performance around the worldDOI 10.1145/3487552.3487849Measuring DNS-over-HTTPS performance around the worldProceedings
2021-11Akiwate et al.Risky BIZness: risks derived from registrar name managementDOI 10.1145/3487552.3487816Risky BIZness: risks derived from registrar name managementProceedings
2021-10Tatang et al.The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsDOI 10.1145/3471621.3471842The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsProceedings
2021-10Jin et al.Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationDOI 10.1145/3478472.3478481Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationProceedings
2021-08Kwan et al.Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsDOI 10.1145/3473604.3474563Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsProceedings
2021-08Khodjaeva & Zincir-HeywoodNetwork Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsDOI 10.1145/3465481.3470089Network Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsProceedings
2021-08Kaplan & FeibishDNS water torture detection in the data planeDOI 10.1145/3472716.3472854DNS water torture detection in the data planeProceedings
2021-07Imana et al.Institutional privacy risks in sharing DNS dataDOI 10.1145/3472305.3472324Institutional privacy risks in sharing DNS dataProceedings
2021-07Hounsel et al.Encryption without centralization: distributing DNS queries across recursive resolversDOI 10.1145/3472305.3472318Encryption without centralization: distributing DNS queries across recursive resolversProceedings
2021-07García et al.Large Scale Measurement on the Adoption of Encrypted DNSDOI 10.48550/arXiv.2107.04436Large Scale Measurement on the Adoption of Encrypted DNSResearch Paper
2021-07Dai et al.DNS-over-TCP considered vulnerableDOI 10.1145/3472305.3472884DNS-over-TCP considered vulnerableProceedings
2021-06Tehrani et al.Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIDOI 10.1145/3442381.3450033Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIProceedings
2021-06Inoue et al.Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowDOI 10.1145/3468081.3471123Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowProceedings
2021-06Hollenbeck & NewtonRFC 9082: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC9082RFC 9082: Registration Data Access Protocol (RDAP) Query FormatInternet Specification
2021-06Hollenbeck & NewtonRFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC9083RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)Internet Specification
2021-05Ibarra et al.RFC 9022: Domain Name Registration Data (DNRD) Objects MappingDOI 10.17487/RFC9022RFC 9022: Domain Name Registration Data (DNRD) Objects MappingInternet Specification
2021-05Gould & CasanovaRFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesDOI 10.17487/RFC9038RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesInternet Specification
2021-04Xia et al.Ethereum Name Service: the Good, the Bad, and the UglyDOI 10.48550/arXiv.2104.05185Ethereum Name Service: the Good, the Bad, and the UglyResearch Paper
2021-04Jin et al.Understanding the Impact of Encrypted DNS on Internet CensorshipDOI 10.1145/3442381.3450084Understanding the Impact of Encrypted DNS on Internet CensorshipProceedings
2021-03Michner, K.Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher SichtZum Schutz von Domains aus wettbewerbs- und markenrechtlicher SichtMaster's Thesis
2021-03Lyu et al.Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksDOI 10.1109/TNSM.2021.3050091Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksJournal Article
2021-03Hounsel et al.Can Encrypted DNS Be Fast?DOI 10.1007/978-3-030-72582-2_26Can Encrypted DNS Be Fast?Proceedings
2021-03Doan et al.Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesDOI 10.1007/978-3-030-72582-2_12Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesProceedings
2021-02Lu et al.From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRDOI 10.14722/ndss.2021.23134From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRProceedings
2021-02Loffredo & MartinelliRFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseDOI 10.17487/RFC8982RFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseInternet Specification
2021-01Loffredo et al.RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingDOI 10.17487/RFC8977RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingInternet Specification
2020-12Yin et al.Decentralization of DNS: Old Problems and New ChallengesDOI 10.1145/3444370.3444594Decentralization of DNS: Old Problems and New ChallengesProceedings
2020-12Kumar & LiuDecentralization, Privacy and Performance for DNSDOI 10.1145/3426746.3434060Decentralization, Privacy and Performance for DNSProceedings
2020-11Yang et al.Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersDOI 10.1145/3425329.3425335Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersProceedings
2020-11Yang et al.Naruto: DNS Covert Channels Detection Based on Stacking ModelDOI 10.1145/3425329.3425336Naruto: DNS Covert Channels Detection Based on Stacking ModelProceedings
2020-11Udiyono et al.Botnet Detection Using DNS and HTTP Traffic AnalysisDOI 10.1145/3429789.3429818Botnet Detection Using DNS and HTTP Traffic AnalysisProceedings
2020-11Lozano, G.RFC 8909: Registry Data Escrow SpecificationDOI 10.17487/RFC8909RFC 8909: Registry Data Escrow SpecificationInternet Specification
2020-11Klein et al.Black-box caches fingerprintingDOI 10.1145/3386367.3432148Black-box caches fingerprintingProceedings
2020-11Hsu et al.DNS Does Not Suffice for MEC-CDNDOI 10.1145/3422604.3425931DNS Does Not Suffice for MEC-CDNProceedings
2020-11Alowaisheq et al.Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralDOI 10.1145/3372297.3417864Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralProceedings
2020-10Sengupta et al.A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSDOI 10.1145/3418073A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSJournal Article
2020-10Randall et al.Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversDOI 10.1145/3419394.3423640Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversProceedings
2020-10Müller et al.Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECDOI 10.1145/3431832.3431838Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECJournal Article
2020-10Moura et al.Clouding up the Internet: how centralized is DNS traffic becoming?DOI 10.1145/3419394.3423625Clouding up the Internet: how centralized is DNS traffic becoming?Proceedings
2020-10Man et al.DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsDOI 10.1145/3372297.3417280DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsProceedings
2020-10Kashaf et al.Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?DOI 10.1145/3419394.3423664Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?Proceedings
2020-10Deccio et al.Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityDOI 10.1145/3419394.3423649Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityProceedings
2020-09Sommese et al.The Forgotten Side of DNS: Orphan and Abandoned RecordsDOI 10.1109/EuroSPW51379.2020.00079The Forgotten Side of DNS: Orphan and Abandoned RecordsProceedings
2020-09Albalawi & Garcia-Luna-AcevesNamed-Data Transport: An End-to-End Approach for an Information-Centric IP InternetDOI 10.1145/3405656.3418714Named-Data Transport: An End-to-End Approach for an Information-Centric IP InternetProceedings
2020-08Yu & ShengKnowledge diffusion paths of blockchain domain: the main path analysisDOI 10.1007/s11192-020-03650-yKnowledge diffusion paths of blockchain domain: the main path analysisJournal Article
2020-08Vekshin et al.DoH Insight: detecting DNS over HTTPS by machine learningDOI 10.1145/3407023.3409192DoH Insight: detecting DNS over HTTPS by machine learningProceedings
2020-08Rivera et al.Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesDOI 10.1145/3407023.3407041Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesProceedings
2020-08Gould & PozunRFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8807RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2020-08Burton, R.Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksDOI 10.1145/3377869Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksJournal Article
2020-07Schomp et al.Akamai DNS: Providing Authoritative Answers to the World's QueriesDOI 10.1145/3387514.3405881Akamai DNS: Providing Authoritative Answers to the World's QueriesProceedings
2020-07Nabeel et al.Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceDOI 10.1145/3401897Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceJournal Article
2020-07Kostopoulos et al.Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersDOI 10.1145/3404868.3406665Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersProceedings
2020-07Korczyński et al.Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversDOI 10.1145/3404868.3406668Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversProceedings
2020-07Ke & SudhirPrivacy Rights and Data Security: GDPR and Personal Data MarketsDOI 10.2139/ssrn.3643979Privacy Rights and Data Security: GDPR and Personal Data MarketsResearch Paper
2020-07Kakarla et al.GRooT: Proactive Verification of DNS ConfigurationsDOI 10.1145/3387514.3405871GRooT: Proactive Verification of DNS ConfigurationsProceedings
2020-05Bao et al.Using Passive DNS to Detect Malicious Domain NameDOI 10.1145/3387168.3387236Using Passive DNS to Detect Malicious Domain NameProceedings
2020-04Li et al.CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsDOI 10.1145/3388176.3388206CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsProceedings
2020-04Li et al.Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesDOI 10.1145/3388176.3388205Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesProceedings
2020-04Hounsel et al.Comparing the Effects of DNS, DoT, and DoH on Web PerformanceDOI 10.1145/3366423.3380139Comparing the Effects of DNS, DoT, and DoH on Web PerformanceProceedings
2020-03Toorn & SperottoLooking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsDOI 10.1145/3373639Looking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsJournal Article
2020-03Carney et al.RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8748RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2020-03Ahmed et al.Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsDOI 10.1109/TNSM.2019.2940735Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsJournal Article
2020-01Schwemmer, S.The regulation of abusive activity and content: a study of registries’ terms of serviceDOI 10.14763/2020.1.1448The regulation of abusive activity and content: a study of registries’ terms of serviceJournal Article
2020-01He et al.TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainDOI 10.1016/j.future.2019.09TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainJournal Article
2020-01Al-Mashhadi & ManickamA brief review of blockchain-based DNS systemsDOI 10.1504/ijitst.2020.108134A brief review of blockchain-based DNS systemsJournal Article
2020-01Abdelmajid et al.Location Based Model For Prevention DNS SpoofingDOI 10.1145/3424311.3424329Location Based Model For Prevention DNS SpoofingProceedings
2019-12Park et al.Investigating DNS Manipulation by Open DNS ResolversDOI 10.1145/3360468.3368172Investigating DNS Manipulation by Open DNS ResolversProceedings
2019-12Nakatsuka et al.PDoT: private DNS-over-TLS with TEE supportDOI 10.1145/3359789.3359793PDoT: private DNS-over-TLS with TEE supportProceedings
2019-12Liu et al.A Comparative Study of Blockchain-Based DNS DesignDOI 10.1145/3376044.3376057A Comparative Study of Blockchain-Based DNS DesignProceedings
2019-12Houser et al.An investigation on information leakage of DNS over TLSDOI 10.1145/3359989.3365429An investigation on information leakage of DNS over TLSProceedings
2019-12Deccio & DavisDNS privacy in practice and preparationDOI 10.1145/3359989.3365435DNS privacy in practice and preparationProceedings
2019-11Allman, M.On Eliminating Root Nameservers from the DNSDOI 10.1145/3365609.3365863On Eliminating Root Nameservers from the DNSProceedings
2019-10Müller et al.Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverDOI 10.1145/3355369.3355570Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverProceedings
2019-10Moura et al.Cache Me If You Can: Effects of DNS Time-to-LiveDOI 10.1145/3355369.3355568Cache Me If You Can: Effects of DNS Time-to-LiveProceedings
2019-10Lu et al.An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?DOI 10.1145/3355369.3355580An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?Proceedings
2019-10Foremski et al.DNS Observatory: The Big Picture of the DNSDOI 10.1145/3355369.3355566DNS Observatory: The Big Picture of the DNSProceedings
2019-10Böttger et al.An Empirical Study of the Cost of DNS-over-HTTPSDOI 10.1145/3355369.3355575An Empirical Study of the Cost of DNS-over-HTTPSProceedings
2019-10Al-Dalky et al.A Look at the ECS Behavior of DNS ResolversDOI 10.1145/3355369.3355586A Look at the ECS Behavior of DNS ResolversProceedings
2019-09Tehrani et al.NDNSSEC: Namespace Management in NDN with DNSSECDOI 10.1145/3357150.3357417NDNSSEC: Namespace Management in NDN with DNSSECProceedings
2019-09Tehrani et al.The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpDOI 10.1145/3357150.3357401The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpProceedings
2019-09Lee et al.DGA-based malware detection using DNS traffic analysisDOI 10.1145/3338840.3355672DGA-based malware detection using DNS traffic analysisProceedings
2019-08Shafir et al.DNS Negative Caching in the WildDOI 10.1145/3342280.3342338DNS Negative Caching in the WildProceedings
2019-07Schmitt et al.Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019DOI 10.1145/3340301.3341128Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019Proceedings
2019-07Liu et al.Who is answering my queries: understanding and characterizing interception of the DNS resolution pathDOI 10.1145/3340301.3341122Who is answering my queries: understanding and characterizing interception of the DNS resolution pathProceedings
2019-07Hounsel et al.Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webDOI 10.1145/3340301.3341129Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webProceedings
2019-07Ferrara, E.The history of digital spamDOI 10.1145/3299768The history of digital spamJournal Article
2019-05Lipton, J.Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America?Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America?Journal Article
2019-05Gould & FeherRFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8590RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2019-05Clemson, A.A Practical Guide to the Law of Domain Names and CybersquattingISBN 978-1912687121A Practical Guide to the Law of Domain Names and CybersquattingBook
2019-04Zhou et al.RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8544RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2019-03Zhou et al.RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingDOI 10.17487/RFC8543RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingInternet Specification
2019-03Li et al.MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningDOI 10.1145/3322645.3322675MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningProceedings
2019-01Hoffman et al.RFC 8499: DNS TerminologyDOI 10.17487/RFC8499RFC 8499: DNS TerminologyInternet Specification
2018-12Luo et al.A Large Scale Analysis of DNS Water Torture AttackDOI 10.1145/3297156.3297272A Large Scale Analysis of DNS Water Torture AttackProceedings
2018-12Liu et al.A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsDOI 10.1145/3284028.3284034A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsProceedings
2018-11Hollenbeck & NewtonRFC 8521: Registration Data Access Protocol (RDAP) Object TaggingDOI 10.17487/RFC8521RFC 8521: Registration Data Access Protocol (RDAP) Object TaggingInternet Specification
2018-11Gould & FeherRFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8495RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)Internet Specification
2018-10Zhu & HeidemannLDplayer: DNS Experimentation at ScaleDOI 10.1145/3278532.3278544LDplayer: DNS Experimentation at ScaleProceedings
2018-10Moura et al.When the Dike Breaks: Dissecting DNS Defenses During DDoSDOI 10.1145/3278532.3278534When the Dike Breaks: Dissecting DNS Defenses During DDoSProceedings
2018-10Lauinger et al.From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropDOI 10.1145/3278532.3278560From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropProceedings
2018-10Hoffman & McManusRFC 8484: DNS Queries over HTTPS (DoH)DOI 10.17487/RFC8484RFC 8484: DNS Queries over HTTPS (DoH)Internet Specification
2018-08Hohlfeld, O.Operating a DNS-based Active Internet ObservatoryDOI 10.1145/3234200.3234239Operating a DNS-based Active Internet ObservatoryProceedings
2018-08Abhishta et al.Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersDOI 10.1145/3229598.3229599Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersProceedings
2018-07Zhauniarovich et al.A Survey on Malicious Domains Detection through DNS Data AnalysisDOI 10.1145/3191329A Survey on Malicious Domains Detection through DNS Data AnalysisJournal Article
2018-07Allman, M.Comments On DNS RobustnessDOI 10.1145/3232755.3232773Comments On DNS RobustnessProceedings
2018-07Al-Dalky et al.Practical Challenge-Response for DNSDOI 10.1145/3232755.3232765Practical Challenge-Response for DNSProceedings
2018-06Szurdi & ChristinDomain Registration Policy Strategies and the Fight against Online CrimeDomain Registration Policy Strategies and the Fight against Online CrimeProceedings
2018-06Perrin, S.The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection AuthoritiesThe Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection AuthoritiesDoctoral Thesis
2018-06Messabi et al.Malware detection using DNS records and domain name featuresDOI 10.1145/3231053.3231082Malware detection using DNS records and domain name featuresProceedings
2018-05Korczynski et al.Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsDOI 10.1145/3196494.3196548Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsProceedings
2018-03Khalil et al.A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceDOI 10.1145/3176258.3176329A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceProceedings
2018-03Hananto et al.Detecting Network Security Threats Using Domain Name System and NetFlow TrafficDOI 10.1145/3199478.3199505Detecting Network Security Threats Using Domain Name System and NetFlow TrafficProceedings
2018-03Gould et al.RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8334RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2018-03Dickinson et al.RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSDOI 10.17487/RFC8310RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSInternet Specification
2018-01Ferrante, A.The impact of GDPR on WHOIS: Implications for businesses facing cybercrimeThe impact of GDPR on WHOIS: Implications for businesses facing cybercrimeJournal Article
2017-12Xu et al.An Adaptive Malicious Domain Detection Mechanism with DNS TrafficDOI 10.1145/3171592.3171595An Adaptive Malicious Domain Detection Mechanism with DNS TrafficProceedings
2017-11Sun et al.Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelDOI 10.1145/3127540.3127567Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelProceedings
2017-11Müller et al.Recursives in the wild: engineering authoritative DNS serversDOI 10.1145/3131365.3131366Recursives in the wild: engineering authoritative DNS serversProceedings
2017-11Lee & SpringIdentifying and Analyzing Broadband Internet Reverse DNS NamesDOI 10.1145/3143361.3143392Identifying and Analyzing Broadband Internet Reverse DNS NamesProceedings
2017-11Chung et al.Understanding the role of registrars in DNSSEC deploymentDOI 10.1145/3131365.3131373Understanding the role of registrars in DNSSEC deploymentProceedings
2017-11Almeida et al.Dissecting DNS Stakeholders in Mobile NetworksDOI 10.1145/3143361.3143375Dissecting DNS Stakeholders in Mobile NetworksProceedings
2017-10Vissers et al.The Wolf of Name Street: Hijacking Domains Through Their NameserversDOI 10.1145/3133956.3133988The Wolf of Name Street: Hijacking Domains Through Their NameserversProceedings
2017-10Mohaisen et al.Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresDOI 10.1109/TNET.2017.2717965Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresJournal Article
2017-10Klein et al.X-Ray Your DNSDOI 10.1145/3133956.3138821X-Ray Your DNSProceedings
2017-10Fukuda et al.Detecting Malicious Activity With DNS Backscatter Over TimeDOI 10.1109/TNET.2017.2724506Detecting Malicious Activity With DNS Backscatter Over TimeJournal Article
2017-10Feibish et al.Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesDOI 10.1145/3132465.3132474Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesProceedings
2017-10Chen et al.Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyDOI 10.1145/3133956.3134084Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyProceedings
2017-08Sperotto et al.TIDE: Threat Identification Using Active DNS MeasurementsDOI 10.1145/3123878.3131988TIDE: Threat Identification Using Active DNS MeasurementsProceedings
2017-08Rijswijk-Deij et al.The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverDOI 10.1145/3123878.3131987The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverProceedings
2017-06Zhang et al.Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesDOI 10.1016/j.procs.2017.05.204Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesProceedings
2017-04Silvestro et al.Is today's DNS the right solution for middleboxes selection?DOI 10.1145/3069383.3069389Is today's DNS the right solution for middleboxes selection?Proceedings
2017-04Radwan & HeckelPrediction of the domain name system (DNS) quality attributesDOI 10.1145/3019612.3019728Prediction of the domain name system (DNS) quality attributesProceedings
2017-03Koch et al.RFC 8109: Initializing a DNS Resolver with Priming QueriesDOI 10.17487/RFC8109RFC 8109: Initializing a DNS Resolver with Priming QueriesInternet Specification
2017-02Ribbers et al.RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolDOI 10.17487/RFC8063RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolInternet Specification
2017-02Reddy et al.RFC 8094: DNS over Datagram Transport Layer Security (DTLS)DOI 10.17487/RFC8094RFC 8094: DNS over Datagram Transport Layer Security (DTLS)Internet Specification
2017-01Hao & WangExploring Domain Name Based Features on the Effectiveness of DNS CachingDOI 10.1145/3041027.3041032Exploring Domain Name Based Features on the Effectiveness of DNS CachingJournal Article
2017-01Gould, J.RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingDOI 10.17487/RFC8056RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingInternet Specification
2017-01Aizuddin et al.DNS amplification attack detection and mitigation via sFlow with security-centric SDNDOI 10.1145/3022227.3022230DNS amplification attack detection and mitigation via sFlow with security-centric SDNProceedings
2016-11Ruohonen et al.Correlating file-based malware graphs against the empirical ground truth of DNS graphsDOI 10.1145/2993412.2993414Correlating file-based malware graphs against the empirical ground truth of DNS graphsProceedings
2016-11Moura et al.Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventDOI 10.1145/2987443.2987446Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventProceedings
2016-11Lauinger et al.WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationDOI 10.1145/2987443.2987463WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationProceedings
2016-11Korczyński et al.Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesDOI 10.1145/2987443.2987477Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesProceedings
2016-10Wright et al.Hands-on exercises about DNS attacks: details, setup and lessons learnedHands-on exercises about DNS attacks: details, setup and lessons learnedJournal Article
2016-10Liu et al.All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsDOI 10.1145/2976749.2978387All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsProceedings
2016-10Katzlinger, H.Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher PerspektiveDas „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher PerspektiveMaster's Thesis
2016-10Hao et al.PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationDOI 10.1145/2976749.2978317PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationProceedings
2016-10Farnan et al.Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesDOI 10.1145/2994620.2994636Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesProceedings
2016-10Cifuentes et al.Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECDOI 10.1145/2998373.2998452Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECProceedings
2016-08Wijekoon & NishiImplement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3Proceedings
2016-08Meitei et al.Detection of DDoS DNS Amplification Attack Using Classification AlgorithmDOI 10.1145/2980258.2980431Detection of DDoS DNS Amplification Attack Using Classification AlgorithmProceedings
2016-08Jeong et al.A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureDOI 10.1145/2934872.2960423A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureProceedings
2016-08Gautam, R.Analysis and implementation of WHOIS domain lookupISSN 2454-2024Analysis and implementation of WHOIS domain lookupJournal Article
2016-06Sahri & OkamuraProtecting DNS services from IP spoofing: SDN collaborative authentication approachDOI 10.1145/2935663.2935666Protecting DNS services from IP spoofing: SDN collaborative authentication approachProceedings
2016-06Ruohonen & LeppänenOn the Design of a Simple Network Resolver for DNS MiningDOI 10.1145/2983468.2983513On the Design of a Simple Network Resolver for DNS MiningProceedings
2016-05Khalil et al.Discovering Malicious Domains through Passive DNS Data Graph AnalysisDOI 10.1145/2897845.2897877Discovering Malicious Domains through Passive DNS Data Graph AnalysisProceedings
2016-05Hu et al.RFC 7858: Specification for DNS over Transport Layer Security (TLS)DOI 10.17487/RFC7858RFC 7858: Specification for DNS over Transport Layer Security (TLS)Internet Specification
2016-03Hermann, D.Beobachtungsmöglichkeiten im Domain Name SystemDOI 10.1007/978-3-658-13263-7Beobachtungsmöglichkeiten im Domain Name SystemBook
2016-02Gao et al.Reexamining DNS from a global recursive resolver perspectiveDOI 10.1109/TNET.2014.2358637Reexamining DNS from a global recursive resolver perspectiveProceedings
2016-01Benchaita et al.Stability and optimization of DNS-based request redirection in CDNsDOI 10.1145/2833312.2833455Stability and optimization of DNS-based request redirection in CDNsProceedings
2015-10Liu et al.Who is .com?: Learning to Parse WHOIS RecordsDOI 10.1145/2815675.2815693Who is .com?: Learning to Parse WHOIS RecordsProceedings
2015-10Kührer et al.Going Wild: Large-Scale Classification of Open DNS ResolversDOI 10.1145/2815675.2815683Going Wild: Large-Scale Classification of Open DNS ResolversProceedings
2015-10Halvorson et al.From .academy to .zone: An Analysis of the New TLD Land RushDOI 10.1145/2815675.2815696From .academy to .zone: An Analysis of the New TLD Land RushProceedings
2015-10Fukuda & HeidemannDetecting Malicious Activity with DNS BackscatterDOI 10.1145/2815675.2815706Detecting Malicious Activity with DNS BackscatterProceedings
2015-09Rijswijk-Deij et al.Making the Case for Elliptic Curves in DNSSECDOI 10.1145/2831347.2831350Making the Case for Elliptic Curves in DNSSECJournal Article
2015-09Hands et al.A Study on Botnets Utilizing DNSDOI 10.1145/2808062.2808070A Study on Botnets Utilizing DNSProceedings
2015-08Rijswijk-Deij et al.The Internet of Names: A DNS Big DatasetDOI 10.1145/2785956.2789996The Internet of Names: A DNS Big DatasetProceedings
2015-03Zhou et al.RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsDOI 10.17487/RFC7485RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsInternet Specification
2015-03Newton et al.RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7480RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Newton & HollenbeckRFC 7482: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC7482RFC 7482: Registration Data Access Protocol (RDAP) Query FormatInternet Specification
2015-03Newton & HollenbeckRFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7483RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Horne, W.Collecting, Analyzing and Responding to Enterprise Scale DNS EventsDOI 10.1145/2699026.2699027Collecting, Analyzing and Responding to Enterprise Scale DNS EventsProceedings
2015-03Hollenbeck & KongRFC 7481: Security Services for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7481RFC 7481: Security Services for the Registration Data Access Protocol (RDAP)Internet Specification
2015-03Blanchet, M.RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceDOI 10.17487/RFC7484RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceInternet Specification
2015-02Hollenbeck, S.RFC 7451: Extension Registry for the Extensible Provisioning ProtocolDOI 10.17487/RFC7451RFC 7451: Extension Registry for the Extensible Provisioning ProtocolInternet Specification
2015-02Agten et al.Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseDOI 10.14722/ndss.2015.23058Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseProceedings
2014-12Herzberg & ShulmanDNS authentication as a service: preventing amplification attacksDOI 10.1145/2664243.2664281DNS authentication as a service: preventing amplification attacksProceedings
2014-11Zaki et al.Dissecting Web Latency in GhanaDOI 10.1145/2663716.2663748Dissecting Web Latency in GhanaProceedings
2014-11Wang, Z.On the Capability of DNS Cache Poisoning AttacksDOI 10.1145/2660267.2662363On the Capability of DNS Cache Poisoning AttacksProceedings
2014-11Thomas & MohaisenMeasuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemDOI 10.1145/2665943.2665951Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemProceedings
2014-11Shulman, H.Pretty Bad Privacy: Pitfalls of DNS EncryptionDOI 10.1145/2665943.2665959Pretty Bad Privacy: Pitfalls of DNS EncryptionProceedings
2014-11Shulman & EzraOn the Resilience of DNS InfrastructureDOI 10.1145/2660267.2662376On the Resilience of DNS InfrastructureProceedings
2014-11Rula & BustamanteBehind the Curtain: Cellular DNS and Content Replica SelectionDOI 10.1145/2663716.2663734Behind the Curtain: Cellular DNS and Content Replica SelectionProceedings
2014-11Rijswijk-Deij et al.DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyDOI 10.1145/2663716.2663731DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyProceedings
2014-10Schomp et al.DNS Resolvers Considered HarmfulDOI 10.1145/2670518.2673881DNS Resolvers Considered HarmfulProceedings
2014-09Kumari et al.RFC 7344: Automating DNSSEC Delegation Trust MaintenanceDOI 10.17487/RFC7344RFC 7344: Automating DNSSEC Delegation Trust MaintenanceInternet Specification
2014-09Fernandez & VanhilstThe secure and trustable distributed name system patternThe secure and trustable distributed name system patternProceedings
2014-08Zhu et al.T-DNS: connection-oriented DNS to improve privacy and securityDOI 10.1145/2619239.2631442T-DNS: connection-oriented DNS to improve privacy and securityProceedings
2014-07Huffaker et al.DRoP: DNS-based router positioningDOI 10.1145/2656877.2656879DRoP: DNS-based router positioningProceedings
2014-06Clayton & MansfieldA Study of Whois Privacy and Proxy Service AbuseA Study of Whois Privacy and Proxy Service AbuseProceedings
2014-05Parunak et al.An agent-based framework for dynamical understanding of DNS events (DUDE)DOI 10.1145/2602945.2602951An agent-based framework for dynamical understanding of DNS events (DUDE)Proceedings
2014-04Thomas & MohaisenKindred domains: detecting and clustering botnet domains using DNS trafficDOI 10.1145/2567948.2579359Kindred domains: detecting and clustering botnet domains using DNS trafficProceedings
2014-04Halvorson et al.XXXtortion?: inferring registration intent in the .XXX TLDDOI 10.1145/2566486.2567995XXXtortion?: inferring registration intent in the .XXX TLDProceedings
2014-04Bilge et al.Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsDOI 10.1145/2584679Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsJournal Article
2014-03Leontiadis & ChristinEmpirically Measuring WHOIS MisuseDOI 10.1007/978-3-319-11203-9_2Empirically Measuring WHOIS MisuseBook Section
2014-01Jayarathna et al.Hypervisor-based security architecture for validating DNS servicesHypervisor-based security architecture for validating DNS servicesProceedings
2013-12Fofack & AloufModeling modern DNS cachesDOI 10.4108/icst.valuetools.2013.254416Modeling modern DNS cachesProceedings
2013-11Watters et al.ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?DOI 10.1109/CTC.2013.13ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?Proceedings
2013-11Kazato et al.Towards classification of DNS erroneous queriesDOI 10.1145/2534142.2534146Towards classification of DNS erroneous queriesProceedings
2013-11Chitpranee & FukudaTowards passive DNS software fingerprintingDOI 10.1145/2534142.2534144Towards passive DNS software fingerprintingProceedings
2013-11Anagnostopoulos et al.DNS amplification attack revisitedDOI 10.1016/j.cose.2013.10.001DNS amplification attack revisitedJournal Article
2013-10Streibelt et al.Exploring EDNS-client-subnet adopters in your free timeDOI 10.1145/2504730.2504767Exploring EDNS-client-subnet adopters in your free timeProceedings
2013-10Schomp et al.On measuring the client-side DNS infrastructureDOI 10.1145/2504730.2504734On measuring the client-side DNS infrastructureProceedings
2013-10Hao et al.Understanding the domain registration behavior of spammersDOI 10.1145/2504730.2504753Understanding the domain registration behavior of spammersProceedings
2013-10Garcia, F.DNS: (do not suspect)DOI 10.1145/2512209.2512222DNS: (do not suspect)Proceedings
2013-10Berger et al.Internet nameserver IPv4 and IPv6 address relationshipsDOI 10.1145/2504730.2504745Internet nameserver IPv4 and IPv6 address relationshipsProceedings
2013-08Gao et al.An empirical reexamination of global DNS behaviorDOI 10.1145/2486001.2486018An empirical reexamination of global DNS behaviorProceedings
2013-07Shue & KalafutResolvers Revealed: Characterizing DNS Resolvers and their ClientsDOI 10.1145/2499926.2499928Resolvers Revealed: Characterizing DNS Resolvers and their ClientsJournal Article
2013-07Callahan et al.On modern DNS behavior and propertiesDOI 10.1145/2500098.2500100On modern DNS behavior and propertiesJournal Article
2013-05Yuan et al.A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesDOI 10.1145/2461321.2461324A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesJournal Article
2013-04Damas et al.RFC 6891: Extension Mechanisms for DNS (EDNS(0))DOI 10.17487/RFC6891RFC 6891: Extension Mechanisms for DNS (EDNS(0))Internet Specification
2013-02Cheshire & KrochmalRFC 6762: Multicast DNSDOI 10.17487/RFC6762RFC 6762: Multicast DNSInternet Specification
2013-02Weiler & BlackaRFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)DOI 10.17487/RFC6840RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)Internet Specification
2013-01Ljunggren et al.RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsDOI 10.17487/RFC6841RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsInternet Specification
2012-12Severance, C.Vint Cerf: A Brief History of PacketsDOI 10.1109/MC.2012.422Vint Cerf: A Brief History of PacketsJournal Article
2012-12Rose, S.Progress of DNS security deployment in the federal governmentProgress of DNS security deployment in the federal governmentProceedings
2012-12Kolkman et al.RFC 6781: DNSSEC Operational Practices, Version 2DOI 10.17487/RFC6781RFC 6781: DNSSEC Operational Practices, Version 2Internet Specification
2012-11Otto et al.Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsDOI 10.1145/2398776.2398831Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsProceedings
2012-11Bermudez et al.DNS to the rescue: discerning content and services in a tangled webDOI 10.1145/2398776.2398819DNS to the rescue: discerning content and services in a tangled webProceedings
2012-10Kaliski, B.Revisiting DNS and WHOIS in the cloud eraDOI 10.1145/2381913.2381929Revisiting DNS and WHOIS in the cloud eraProceedings
2012-10Dagon, D.Large-scale DNS data analysisDOI 10.1145/2382196.2382325Large-scale DNS data analysisProceedings
2012-08Otto et al.namehelp: intelligent client-side DNS resolutionDOI 10.1145/2342356.2342413namehelp: intelligent client-side DNS resolutionProceedings
2012-08Chaudhry et al.Signposts: end-to-end networking in a world of middleboxesDOI 10.1145/2342356.2342371Signposts: end-to-end networking in a world of middleboxesProceedings
2012-07AnonymousThe collateral damage of internet censorship by DNS injectionDOI 10.1145/2317307.2317311The collateral damage of internet censorship by DNS injectionJournal Article
2012-06Rose & WijngaardsRFC 6672: DNAME Redirection in the DNSDOI 10.17487/RFC6672RFC 6672: DNAME Redirection in the DNSInternet Specification
2012-04Yu et al.Authority server selection in DNS caching resolversDOI 10.1145/2185376.2185387Authority server selection in DNS caching resolversJournal Article
2012-03Kagwe & MasindeSurvey on DNS configurations, interdependencies, resilience and security for *.ke domainsDOI 10.1145/2160601.2160632Survey on DNS configurations, interdependencies, resilience and security for *.ke domainsProceedings
2012-03Deri et al.Towards a passive DNS monitoring systemDOI 10.1145/2245276.2245396Towards a passive DNS monitoring systemProceedings
2012-03Crowcroft, J.The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...DOI 10.1145/2185376.2185392The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...Journal Article
2011-12Khurshid et al.Improving robustness of DNS to software vulnerabilitiesDOI 10.1145/2076732.2076758Improving robustness of DNS to software vulnerabilitiesProceedings
2011-12Kalafut et al.Touring DNS open houses for trends and configurationsDOI 10.1109/TNET.2011.2130537Touring DNS open houses for trends and configurationsProceedings
2011-11Hao et al.Monitoring the initial DNS behavior of malicious domainsDOI 10.1145/2068816.2068842Monitoring the initial DNS behavior of malicious domainsProceedings
2011-09Bai et al.Defense against DNS Man-In-The-Middle SpoofingDOI 10.1007/978-3-642-23971-7_39Defense against DNS Man-In-The-Middle SpoofingBook Section
2011-05Xu et al.K-means and adaptive k-means algorithms for clustering DNS trafficDOI 10.5555/2151688.2151720K-means and adaptive k-means algorithms for clustering DNS trafficProceedings
2011-02Borkar et al.Implementation of round robin policy in DNS for thresholding of distributed web server systemDOI 10.1145/1980022.1980067Implementation of round robin policy in DNS for thresholding of distributed web server systemProceedings
2011-02Bilge et al.EXPOSURE: Finding Malicious Domains Using Passive DNS AnalysisEXPOSURE: Finding Malicious Domains Using Passive DNS AnalysisProceedings
2010-12Yasmin et al.Security issues related with DNS dynamic updates for mobile nodes: a surveyDOI 10.1145/1943628.1943645Security issues related with DNS dynamic updates for mobile nodes: a surveyProceedings
2010-11Yadav et al.Detecting algorithmically generated malicious domain namesDOI 10.1145/1879141.1879148Detecting algorithmically generated malicious domain namesProceedings
2010-11Kalafut et al.An empirical study of orphan DNS servers in the internetDOI 10.1145/1879141.1879182An empirical study of orphan DNS servers in the internetProceedings
2010-11Chatzis, N.Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDOI 10.14279/depositonce-2647Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDoctoral Thesis
2010-11Ager et al.Comparing DNS resolvers in the wildDOI 10.1145/1879141.1879144Comparing DNS resolvers in the wildProceedings
2010-08Klensin, J.RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolDOI 10.17487/RFC5891RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolInternet Specification
2010-06Lewis & HoenesRFC 5936: DNS Zone Transfer Protocol (AXFR)DOI 10.17487/RFC5936RFC 5936: DNS Zone Transfer Protocol (AXFR)Internet Specification
2010-05Gould & HollenbeckRFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5910RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2010-05Abley & MandersonRFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesDOI 10.17487/RFC5855RFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesInternet Specification
2010-04Born & GustafsonNgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisDOI 10.1145/1852666.1852718NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisProceedings
2010-01Carpenter & PartridgeInternet requests for comments (RFCs) as scholarly publicationsDOI 10.1145/1672308.1672315Internet requests for comments (RFCs) as scholarly publicationsJournal Article
2009-12Vixie, P.What DNS is notDOI 10.1145/1610252.1610269What DNS is notJournal Article
2009-08Hollenbeck, S.RFC 5730: Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5730RFC 5730: Extensible Provisioning Protocol (EPP)Internet Specification
2009-08Hollenbeck, S.RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingDOI 10.17487/RFC5731RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingInternet Specification
2009-08Hollenbeck, S.RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingDOI 10.17487/RFC5732RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingInternet Specification
2009-08Hollenbeck, S.RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingDOI 10.17487/RFC5733RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingInternet Specification
2009-08Hollenbeck, S.RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPDOI 10.17487/RFC5734RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPInternet Specification
2009-03Villamarín-Salomón & BrustoloniBayesian bot detection based on DNS traffic similarityDOI 10.1145/1529282.1529734Bayesian bot detection based on DNS traffic similarityProceedings
2008-10Plonka & BarfordContext-aware clustering of DNS query trafficDOI 10.1145/1452520.1452547Context-aware clustering of DNS query trafficProceedings
2008-10Kalafut et al.Understanding implications of DNS zone provisioningDOI 10.1145/1452520.1452546Understanding implications of DNS zone provisioningProceedings
2008-10Damas & NevesRFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksDOI 10.17487/RFC5358RFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksInternet Specification
2008-10Dagon et al.Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesDOI 10.1145/1455770.1455798Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesProceedings
2008-10Ballani & FrancisMitigating DNS DoS attacksDOI 10.1145/1455770.1455796Mitigating DNS DoS attacksProceedings
2008-09Goth, G.ICANN's TLD Plans Are Defined, Not Yet RefinedDOI 10.1109/MIC.2008.102ICANN's TLD Plans Are Defined, Not Yet RefinedJournal Article
2008-08Atkinson et al.Mobility through naming: impact on DNSDOI 10.1145/1403007.1403010Mobility through naming: impact on DNSProceedings
2008-04Akcan et al.Geographic web usage estimation by monitoring DNS cachesDOI 10.1145/1367798.1367813Geographic web usage estimation by monitoring DNS cachesProceedings
2008-03Laurie et al.RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceDOI 10.17487/RFC5155RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceInternet Specification
2007-12Lindsay, D.International Domain Name Law: ICANN and the UDRPISBN 978-1841135847International Domain Name Law: ICANN and the UDRPBook
2007-10Jackson et al.Protecting browsers from DNS rebinding attacksDOI 10.1145/1315245.1315298Protecting browsers from DNS rebinding attacksProceedings
2007-10Cano et al.Solving the user-to-host binding problem in ad hoc networks through photo-idsDOI 10.1145/1298197.1298212Solving the user-to-host binding problem in ad hoc networks through photo-idsProceedings
2007-07Zhang et al.Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingDOI 10.1145/1326304.1326314Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingProceedings
2007-05Alzoubi et al.MyXDNS: a resquest routing dns server with decoupled server selectionDOI 10.1145/1242572.1242620MyXDNS: a resquest routing dns server with decoupled server selectionProceedings
2007-04Vixie, P.DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.DOI 10.1145/1242489.1242499DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.Journal Article
2007-04Ariyapperuma & MitchellSecurity vulnerabilities in DNS and DNSSECDOI 10.1109/ARES.2007.139Security vulnerabilities in DNS and DNSSECProceedings
2007-01Efroni, Z.Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsISBN 978-0275988821Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsBook Section
2006-12Padmanabhan et al.A study of end-to-end web access failuresDOI 10.1145/1368436.1368457A study of end-to-end web access failuresProceedings
2006-11Ren et al.Visualizing DNS trafficDOI 10.1145/1179576.1179582Visualizing DNS trafficProceedings
2006-10Sarat et al.On the Use of Anycast in DNSDOI 10.1109/ICCCN.2006.286248On the Use of Anycast in DNSProceedings
2006-10Hedley, S.A brief history of spamDOI 10.1080/13600830600960758A brief history of spamJournal Article
2006-09Alexander, T.Domain name registrars: are they part of the domain name fraud problem?DOI 10.1145/1231047.1231071Domain name registrars: are they part of the domain name fraud problem?Proceedings
2006-07Lewis, E.RFC 4592: The Role of Wildcards in the Domain Name SystemDOI 10.17487/RFC4592RFC 4592: The Role of Wildcards in the Domain Name SystemInternet Specification
2006-07Broido et al.The windows of pivate DNS updatesDOI 10.1145/1140086.1140098The windows of pivate DNS updatesProceedings
2005-10Deegan et al.The main name system: an exercise in centralized computingDOI 10.1145/1096536.1096538The main name system: an exercise in centralized computingProceedings
2005-10Antonova, S.Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002)Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002)Doctoral Thesis
2005-08Ishibashi et al.Detecting mass-mailing worm infected hosts by mining DNS traffic dataDOI 10.1145/1080173.1080175Detecting mass-mailing worm infected hosts by mining DNS traffic dataProceedings
2005-03Arends et al.RFC 4033: DNS Security Introduction and RequirementsDOI 10.17487/RFC4033RFC 4033: DNS Security Introduction and RequirementsInternet Specification
2005-03Arends et al.RFC 4034: Resource Records for the DNS Security ExtensionsDOI 10.17487/RFC4034RFC 4034: Resource Records for the DNS Security ExtensionsInternet Specification
2005-03Arends et al.RFC 4035: Protocol Modifications for the DNS Security ExtensionsDOI 10.17487/RFC4035RFC 4035: Protocol Modifications for the DNS Security ExtensionsInternet Specification
2004-10Pang et al.Availability, usage, and deployment characteristics of the domain name systemDOI 10.1145/1028788.1028790Availability, usage, and deployment characteristics of the domain name systemProceedings
2004-10Pang et al.On the responsiveness of DNS-based network controlDOI 10.1145/1028788.1028792On the responsiveness of DNS-based network controlProceedings
2004-10Jung & SitAn empirical study of spam traffic and the use of DNS black listsDOI 10.1145/1028788.1028838An empirical study of spam traffic and the use of DNS black listsProceedings
2004-09Pappas et al.Distributed DNS troubleshootingDOI 10.1145/1016687.1016694Distributed DNS troubleshootingProceedings
2004-09Hollenbeck, S.RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3915RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)Internet Specification
2004-09Daigle, L.RFC 3912: WHOIS Protocol SpecificationDOI 10.17487/RFC3912RFC 3912: WHOIS Protocol SpecificationInternet Specification
2004-08Seshan, S.Session details: DNS and namingDOI 10.1145/3244279Session details: DNS and namingProceedings
2004-08Ramasubramanian & SirerThe design and implementation of a next generation name service for the internetDOI 10.1145/1015467.1015504The design and implementation of a next generation name service for the internetProceedings
2004-08Pappas et al.Impact of configuration errors on DNS robustnessDOI 10.1145/1015467.1015503Impact of configuration errors on DNS robustnessProceedings
2004-03Hollenbeck, S.RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3735RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)Internet Specification
2003-10Wills et al.Inferring relative popularity of internet applications by actively querying DNS cachesDOI 10.1145/948205.948216Inferring relative popularity of internet applications by actively querying DNS cachesProceedings
2003-07Broido et al.Spectroscopy of DNS update trafficDOI 10.1145/781027.781077Spectroscopy of DNS update trafficProceedings
2003-05Krishnamurthy et al.DEW: DNS-enhanced web for faster content deliveryDOI 10.1145/775152.775196DEW: DNS-enhanced web for faster content deliveryProceedings
2002-11Liston et al.Diversity in DNS performance measuresDOI 10.1145/637201.637204Diversity in DNS performance measuresProceedings
2001-11Jung et al.DNS performance and the effectiveness of cachingDOI 10.1145/505202.505223DNS performance and the effectiveness of cachingProceedings
2001-11Cranor et al.Characterizing large DNS traces using graphsDOI 10.1145/505202.505210Characterizing large DNS traces using graphsProceedings
2001-11Ateniese & MangardA new approach to DNS security (DNSSEC)DOI 10.1145/501983.501996A new approach to DNS security (DNSSEC)Journal Article
2000-04Froomkin et al.Domain Names under ICANN: Technical Management or Policy ChokepointDOI 10.1145/332186.545149Domain Names under ICANN: Technical Management or Policy ChokepointProceedings
1998-03Andrews, M.RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)DOI 10.17487/RFC2308RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)Internet Specification
1997-07Elz et al.RFC 2182: Selection and Operation of Secondary DNS ServersDOI 10.17487/RFC2182RFC 2182: Selection and Operation of Secondary DNS ServersInternet Specification
1997-07Elz & BushRFC 2181: Clarifications to the DNS SpecificationDOI 10.17487/RFC2181RFC 2181: Clarifications to the DNS SpecificationInternet Specification
1997-04Vixie et al.RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)DOI 10.17487/RFC2136RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)Internet Specification
1996-08Vixie, P.RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)DOI 10.17487/RFC1996RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)Internet Specification
1996-02Barr, D.RFC 1912: Common DNS Operational and Configuration ErrorsDOI 10.17487/RFC1912RFC 1912: Common DNS Operational and Configuration ErrorsInternet Specification
1987-11Mockapetris, P.RFC 1035: Domain names - implementation and specificationDOI 10.17487/RFC1035RFC 1035: Domain names - implementation and specificationInternet Specification
1983-11Mockapetris, P.RFC 882: Domain names: Concepts and facilitiesDOI 10.17487/RFC0882RFC 882: Domain names: Concepts and facilitiesInternet Specification
1983-11Mockapetris, P.RFC 883: Domain names: Implementation specificationDOI 10.17487/RFC0883RFC 883: Domain names: Implementation specificationInternet Specification