DNS Science
The basis of scientific work is literature research, which can vary in length depending on the topic, time, and skills. This website offers a first overview to find scientific articles, doctoral and master's theses, books, and other works that revolve around the subject of DNS in a broader sense. Sure, there are services like ResearchGate and Google Scholar, but sometimes a curated list is more accessible. Of course, this site is free of charge (please note some works need access through your institution) and does not claim to be complete. Right now, this site covers about 360 works. This list will be updated irregularly. If you have suggestions for new entries, please get in touch by email: works@dnsscience.org.
Date | Author(s) | Title | Title | Type |
---|---|---|---|---|
2023-01 | Melcher et al. | Tunneling through DNS over TLS Providers | Tunneling through DNS over TLS Providers | Proceedings |
2022-12 | Faulkenberry et al. | View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyDOI 10.1145/3564625.3564646 | View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy | Proceedings |
2022-12 | Fainchtein et al. | User Perceptions of the Privacy and Usability of Smart DNSDOI 10.1145/3564625.3567978 | User Perceptions of the Privacy and Usability of Smart DNS | Proceedings |
2022-12 | Csikor et al. | ZeroDNS: Towards Better Zero Trust Security using DNSDOI 10.1145/3564625.3567968 | ZeroDNS: Towards Better Zero Trust Security using DNS | Proceedings |
2022-12 | Chiscop et al. | AI-based detection of DNS misuse for network securityDOI 10.1145/3565009.3569523 | AI-based detection of DNS misuse for network security | Proceedings |
2022-11 | Shulman & Waidner | DNS in Routers Considered HarmfulDOI 10.1145/3548606.3563509 | DNS in Routers Considered Harmful | Proceedings |
2022-11 | Maghsoudlou et al. | FlowDNS: correlating netflow and DNS streams at scaleDOI 10.1145/3555050.3569135 | FlowDNS: correlating netflow and DNS streams at scale | Proceedings |
2022-11 | Hlavacek et al. | Behind the Scenes of RPKIDOI 10.1145/3548606.3560645 | Behind the Scenes of RPKI | Proceedings |
2022-10 | Yazdani et al. | Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksDOI 10.1145/3545948.3545959 | Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks | Proceedings |
2022-10 | Xia et al. | Challenges in decentralized name management: the case of ENSDOI 10.1145/3517745.3561469 | Challenges in decentralized name management: the case of ENS | Proceedings |
2022-10 | Voelker et al. | Where .ru?: assessing the impact of conflict on russian domain infrastructureDOI 10.1145/3517745.3561423 | Where .ru?: assessing the impact of conflict on russian domain infrastructure | Proceedings |
2022-10 | Toorn et al. | Saving Brian's privacy: the perils of privacy exposure through reverse DNSDOI 10.1145/3517745.3561424 | Saving Brian's privacy: the perils of privacy exposure through reverse DNS | Proceedings |
2022-10 | Sommese et al. | Assessing e-Government DNS Resilience | Assessing e-Government DNS Resilience | Proceedings |
2022-10 | Sommese et al. | Investigating the impact of DDoS attacks on DNS infrastructureDOI 10.1145/3517745.3561458 | Investigating the impact of DDoS attacks on DNS infrastructure | Proceedings |
2022-10 | Sommese et al. | Observable KINDNS: validating DNS hygieneDOI 10.1145/3517745.3563016 | Observable KINDNS: validating DNS hygiene | Proceedings |
2022-10 | Nie et al. | Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers | Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers | Proceedings |
2022-10 | Kosek et al. | DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceDOI 10.1145/3517745.3561445 | DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performance | Proceedings |
2022-10 | Kaplan & Feibish | Practical handling of DNS in the data planeDOI 10.1145/3563647.3563654 | Practical handling of DNS in the data plane | Proceedings |
2022-10 | Joback et al. | A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolDOI 10.1145/3477997.3478007 | A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System Protocol | Proceedings |
2022-10 | Jin et al. | An OpenFlow based Optimal Selection Mechanism for Multiple Web ServersDOI 10.1145/3556223.3556263 | An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers | Proceedings |
2022-10 | Izhikevich et al. | ZDNS: a fast DNS toolkit for internet measurementDOI 10.1145/3517745.3561434 | ZDNS: a fast DNS toolkit for internet measurement | Proceedings |
2022-10 | Arouna et al. | On unifying diverse DNS data sourcesDOI 10.1145/3517745.3563022 | On unifying diverse DNS data sources | Proceedings |
2022-10 | AlSabah et al. | Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSDOI 10.1145/3545948.3545958 | Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS | Proceedings |
2022-10 | Allman, M. | Putting DNS in ContextDOI 10.1145/3419394.3423659 | Putting DNS in Context | Proceedings |
2022-10 | Akiwate et al. | Retroactive identification of targeted DNS infrastructure hijackingDOI 10.1145/3517745.3561425 | Retroactive identification of targeted DNS infrastructure hijacking | Proceedings |
2022-09 | Yang et al. | A deep dive into DNS behavior and query failuresDOI 10.1016/j.comnet.2022.109131 | A deep dive into DNS behavior and query failures | Journal Article |
2022-09 | Wala & Cotton | "Off-Label" Use of DNSDOI 10.1145/3491261 | "Off-Label" Use of DNS | Journal Article |
2022-09 | Sattler, T. | Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat. | Internet Corporation for Assigned Names and Numbers im internationalen Rechtssystem – wie diese die Europäische Datenschutz-Grundverordnung umsetzt und welchen Einfluss die Umsetzung auf das E-Mail-Marketing hat. | Master's Thesis |
2022-09 | Luo et al. | A global name mapping system for ICN-IP coexistenceDOI 10.1145/3517212.3559492 | A global name mapping system for ICN-IP coexistence | Proceedings |
2022-09 | Cheng et al. | Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based RulesDOI 10.1093/comjnl/bxab062 | Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules | Journal Article |
2022-07 | McGhee et al. | NetInfra - A Framework for Expressing Network Infrastructure as CodeDOI 10.1145/3491418.3530762 | NetInfra - A Framework for Expressing Network Infrastructure as Code | Proceedings |
2022-07 | Mathews et al. | A Deep Learning Approach to Create DNS Amplification AttacksDOI 10.1145/3535782.3535838 | A Deep Learning Approach to Create DNS Amplification Attacks | Proceedings |
2022-07 | Lyu et al. | A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesDOI 10.1145/3547331 | A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques | Journal Article |
2022-05 | Roure et al. | Investigating link service infrastructuresDOI 10.1145/336296.336325 | Investigating link service infrastructures | Proceedings |
2022-04 | Kosek et al. | Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edgeDOI 10.1145/3544912.3544918 | Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edge | Journal Article |
2022-03 | Mahdavifar et al. | Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine LearningDOI 10.1145/3507509.3507520 | Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning | Proceedings |
2022-03 | Blanchet, M. | RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) ServiceDOI 10.17487/RFC9224 | RFC 9224: Finding the Authoritative Registration Data Access Protocol (RDAP) Service | Internet Specification |
2022-02 | Park et al. | A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the InternetDOI 10.1109/TNET.2021.3105599 | A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet | Journal Article |
2022-02 | Dan et al. | IP Geolocation through Reverse DNSDOI 10.1145/3457611 | IP Geolocation through Reverse DNS | Journal Article |
2021-12 | Sattler et al. | RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC9167 | RFC 9167: Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2021-12 | Nawrocki et al. | Transparent forwarders: an unnoticed component of the open DNS infrastructureDOI 10.1145/3485983.3494872 | Transparent forwarders: an unnoticed component of the open DNS infrastructure | Proceedings |
2021-12 | Lenders et al. | Securing name resolution in the IoT: DNS over CoAPDOI 10.1145/3488658.3493790 | Securing name resolution in the IoT: DNS over CoAP | Proceedings |
2021-12 | Gould & Wilhelm | RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for TransferDOI 10.17487/RFC9154 | RFC 9154: Extensible Provisioning Protocol (EPP) Secure Authorization Information for Transfer | Internet Specification |
2021-11 | Zhang et al. | Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysisDOI 10.1016/j.cose.2021.102445 | Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis | Journal Article |
2021-11 | Randall et al. | Home is where the hijacking is: understanding DNS interception by residential routersDOI 10.1145/3487552.3487817 | Home is where the hijacking is: understanding DNS interception by residential routers | Proceedings |
2021-11 | Nawrocki et al. | The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreDOI 10.1145/3487552.3487835 | The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core | Proceedings |
2021-11 | Moura et al. | TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSDOI 10.1145/3487552.3487824 | TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS | Proceedings |
2021-11 | Man et al. | DNS Cache Poisoning Attack: Resurrections with Side ChannelsDOI 10.1145/3460120.3486219 | DNS Cache Poisoning Attack: Resurrections with Side Channels | Proceedings |
2021-11 | Kakarla et al. | How Complex is DNS?DOI 10.1145/3484266.3487369 | How Complex is DNS? | Proceedings |
2021-11 | Hounsel et al. | Designing for Tussle in Encrypted DNSDOI 10.1145/3484266.3487383 | Designing for Tussle in Encrypted DNS | Proceedings |
2021-11 | Chhabra et al. | Measuring DNS-over-HTTPS performance around the worldDOI 10.1145/3487552.3487849 | Measuring DNS-over-HTTPS performance around the world | Proceedings |
2021-11 | Akiwate et al. | Risky BIZness: risks derived from registrar name managementDOI 10.1145/3487552.3487816 | Risky BIZness: risks derived from registrar name management | Proceedings |
2021-10 | Tatang et al. | The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsDOI 10.1145/3471621.3471842 | The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws | Proceedings |
2021-10 | Jin et al. | Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program IdentificationDOI 10.1145/3478472.3478481 | Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification | Proceedings |
2021-08 | Kwan et al. | Exploring Simple Detection Techniques for DNS-over-HTTPS TunnelsDOI 10.1145/3473604.3474563 | Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels | Proceedings |
2021-08 | Khodjaeva & Zincir-Heywood | Network Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsDOI 10.1145/3465481.3470089 | Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels | Proceedings |
2021-08 | Kaplan & Feibish | DNS water torture detection in the data planeDOI 10.1145/3472716.3472854 | DNS water torture detection in the data plane | Proceedings |
2021-07 | Imana et al. | Institutional privacy risks in sharing DNS dataDOI 10.1145/3472305.3472324 | Institutional privacy risks in sharing DNS data | Proceedings |
2021-07 | Hounsel et al. | Encryption without centralization: distributing DNS queries across recursive resolversDOI 10.1145/3472305.3472318 | Encryption without centralization: distributing DNS queries across recursive resolvers | Proceedings |
2021-07 | García et al. | Large Scale Measurement on the Adoption of Encrypted DNSDOI 10.48550/arXiv.2107.04436 | Large Scale Measurement on the Adoption of Encrypted DNS | Research Paper |
2021-07 | Dai et al. | DNS-over-TCP considered vulnerableDOI 10.1145/3472305.3472884 | DNS-over-TCP considered vulnerable | Proceedings |
2021-06 | Tehrani et al. | Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKIDOI 10.1145/3442381.3450033 | Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI | Proceedings |
2021-06 | Inoue et al. | Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlowDOI 10.1145/3468081.3471123 | Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlow | Proceedings |
2021-06 | Hollenbeck & Newton | RFC 9082: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC9082 | RFC 9082: Registration Data Access Protocol (RDAP) Query Format | Internet Specification |
2021-06 | Hollenbeck & Newton | RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC9083 | RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP) | Internet Specification |
2021-05 | Ibarra et al. | RFC 9022: Domain Name Registration Data (DNRD) Objects MappingDOI 10.17487/RFC9022 | RFC 9022: Domain Name Registration Data (DNRD) Objects Mapping | Internet Specification |
2021-05 | Gould & Casanova | RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled NamespacesDOI 10.17487/RFC9038 | RFC 9038: Extensible Provisioning Protocol (EPP) Unhandled Namespaces | Internet Specification |
2021-04 | Xia et al. | Ethereum Name Service: the Good, the Bad, and the UglyDOI 10.48550/arXiv.2104.05185 | Ethereum Name Service: the Good, the Bad, and the Ugly | Research Paper |
2021-04 | Jin et al. | Understanding the Impact of Encrypted DNS on Internet CensorshipDOI 10.1145/3442381.3450084 | Understanding the Impact of Encrypted DNS on Internet Censorship | Proceedings |
2021-03 | Michner, K. | Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher Sicht | Zum Schutz von Domains aus wettbewerbs- und markenrechtlicher Sicht | Master's Thesis |
2021-03 | Lyu et al. | Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise NetworksDOI 10.1109/TNSM.2021.3050091 | Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks | Journal Article |
2021-03 | Hounsel et al. | Can Encrypted DNS Be Fast?DOI 10.1007/978-3-030-72582-2_26 | Can Encrypted DNS Be Fast? | Proceedings |
2021-03 | Doan et al. | Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response TimesDOI 10.1007/978-3-030-72582-2_12 | Measuring DNS over TLS from the Edge: Adoption, Reliability, and Response Times | Proceedings |
2021-02 | Lu et al. | From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRDOI 10.14722/ndss.2021.23134 | From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR | Proceedings |
2021-02 | Loffredo & Martinelli | RFC 8982: Registration Data Access Protocol (RDAP) Partial ResponseDOI 10.17487/RFC8982 | RFC 8982: Registration Data Access Protocol (RDAP) Partial Response | Internet Specification |
2021-01 | Loffredo et al. | RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and PagingDOI 10.17487/RFC8977 | RFC 8977: Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and Paging | Internet Specification |
2020-12 | Yin et al. | Decentralization of DNS: Old Problems and New ChallengesDOI 10.1145/3444370.3444594 | Decentralization of DNS: Old Problems and New Challenges | Proceedings |
2020-12 | Kumar & Liu | Decentralization, Privacy and Performance for DNSDOI 10.1145/3426746.3434060 | Decentralization, Privacy and Performance for DNS | Proceedings |
2020-11 | Yang et al. | Mechanism of Parked Domains Recognition Based on Authoritative DNS ServersDOI 10.1145/3425329.3425335 | Mechanism of Parked Domains Recognition Based on Authoritative DNS Servers | Proceedings |
2020-11 | Yang et al. | Naruto: DNS Covert Channels Detection Based on Stacking ModelDOI 10.1145/3425329.3425336 | Naruto: DNS Covert Channels Detection Based on Stacking Model | Proceedings |
2020-11 | Udiyono et al. | Botnet Detection Using DNS and HTTP Traffic AnalysisDOI 10.1145/3429789.3429818 | Botnet Detection Using DNS and HTTP Traffic Analysis | Proceedings |
2020-11 | Lozano, G. | RFC 8909: Registry Data Escrow SpecificationDOI 10.17487/RFC8909 | RFC 8909: Registry Data Escrow Specification | Internet Specification |
2020-11 | Klein et al. | Black-box caches fingerprintingDOI 10.1145/3386367.3432148 | Black-box caches fingerprinting | Proceedings |
2020-11 | Hsu et al. | DNS Does Not Suffice for MEC-CDNDOI 10.1145/3422604.3425931 | DNS Does Not Suffice for MEC-CDN | Proceedings |
2020-11 | Alowaisheq et al. | Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralDOI 10.1145/3372297.3417864 | Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral | Proceedings |
2020-10 | Sengupta et al. | A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNSDOI 10.1145/3418073 | A High Accuracy Preserving Parallel Algorithm for Compact Schemes for DNS | Journal Article |
2020-10 | Randall et al. | Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversDOI 10.1145/3419394.3423640 | Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers | Proceedings |
2020-10 | Müller et al. | Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSECDOI 10.1145/3431832.3431838 | Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC | Journal Article |
2020-10 | Moura et al. | Clouding up the Internet: how centralized is DNS traffic becoming?DOI 10.1145/3419394.3423625 | Clouding up the Internet: how centralized is DNS traffic becoming? | Proceedings |
2020-10 | Man et al. | DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsDOI 10.1145/3372297.3417280 | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | Proceedings |
2020-10 | Kashaf et al. | Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?DOI 10.1145/3419394.3423664 | Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident? | Proceedings |
2020-10 | Deccio et al. | Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityDOI 10.1145/3419394.3423649 | Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security | Proceedings |
2020-09 | Sommese et al. | The Forgotten Side of DNS: Orphan and Abandoned RecordsDOI 10.1109/EuroSPW51379.2020.00079 | The Forgotten Side of DNS: Orphan and Abandoned Records | Proceedings |
2020-09 | Albalawi & Garcia-Luna-Aceves | Named-Data Transport: An End-to-End Approach for an Information-Centric IP InternetDOI 10.1145/3405656.3418714 | Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet | Proceedings |
2020-08 | Yu & Sheng | Knowledge diffusion paths of blockchain domain: the main path analysisDOI 10.1007/s11192-020-03650-y | Knowledge diffusion paths of blockchain domain: the main path analysis | Journal Article |
2020-08 | Vekshin et al. | DoH Insight: detecting DNS over HTTPS by machine learningDOI 10.1145/3407023.3409192 | DoH Insight: detecting DNS over HTTPS by machine learning | Proceedings |
2020-08 | Rivera et al. | Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesDOI 10.1145/3407023.3407041 | Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries | Proceedings |
2020-08 | Gould & Pozun | RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8807 | RFC 8807: Login Security Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2020-08 | Burton, R. | Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS AttacksDOI 10.1145/3377869 | Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks | Journal Article |
2020-07 | Schomp et al. | Akamai DNS: Providing Authoritative Answers to the World's QueriesDOI 10.1145/3387514.3405881 | Akamai DNS: Providing Authoritative Answers to the World's Queries | Proceedings |
2020-07 | Nabeel et al. | Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph InferenceDOI 10.1145/3401897 | Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference | Journal Article |
2020-07 | Kostopoulos et al. | Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS ServersDOI 10.1145/3404868.3406665 | Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers | Proceedings |
2020-07 | Korczyński et al. | Inferring the Deployment of Inbound Source Address Validation Using DNS ResolversDOI 10.1145/3404868.3406668 | Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers | Proceedings |
2020-07 | Ke & Sudhir | Privacy Rights and Data Security: GDPR and Personal Data MarketsDOI 10.2139/ssrn.3643979 | Privacy Rights and Data Security: GDPR and Personal Data Markets | Research Paper |
2020-07 | Kakarla et al. | GRooT: Proactive Verification of DNS ConfigurationsDOI 10.1145/3387514.3405871 | GRooT: Proactive Verification of DNS Configurations | Proceedings |
2020-05 | Bao et al. | Using Passive DNS to Detect Malicious Domain NameDOI 10.1145/3387168.3387236 | Using Passive DNS to Detect Malicious Domain Name | Proceedings |
2020-04 | Li et al. | CDN-hosted Domain Detection with Supervised Machine Learning through DNS RecordsDOI 10.1145/3388176.3388206 | CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records | Proceedings |
2020-04 | Li et al. | Role Identification of Domain Name Server Using Machine Learning based on DNS Response FeaturesDOI 10.1145/3388176.3388205 | Role Identification of Domain Name Server Using Machine Learning based on DNS Response Features | Proceedings |
2020-04 | Hounsel et al. | Comparing the Effects of DNS, DoT, and DoH on Web PerformanceDOI 10.1145/3366423.3380139 | Comparing the Effects of DNS, DoT, and DoH on Web Performance | Proceedings |
2020-03 | Toorn & Sperotto | Looking Beyond the Horizon: Thoughts on Proactive Detection of ThreatsDOI 10.1145/3373639 | Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats | Journal Article |
2020-03 | Carney et al. | RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8748 | RFC 8748: Registry Fee Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2020-03 | Ahmed et al. | Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsDOI 10.1109/TNSM.2019.2940735 | Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal Hosts | Journal Article |
2020-01 | Schwemmer, S. | The regulation of abusive activity and content: a study of registries’ terms of serviceDOI 10.14763/2020.1.1448 | The regulation of abusive activity and content: a study of registries’ terms of service | Journal Article |
2020-01 | He et al. | TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainDOI 10.1016/j.future.2019.09 | TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain | Journal Article |
2020-01 | Al-Mashhadi & Manickam | A brief review of blockchain-based DNS systemsDOI 10.1504/ijitst.2020.108134 | A brief review of blockchain-based DNS systems | Journal Article |
2020-01 | Abdelmajid et al. | Location Based Model For Prevention DNS SpoofingDOI 10.1145/3424311.3424329 | Location Based Model For Prevention DNS Spoofing | Proceedings |
2019-12 | Park et al. | Investigating DNS Manipulation by Open DNS ResolversDOI 10.1145/3360468.3368172 | Investigating DNS Manipulation by Open DNS Resolvers | Proceedings |
2019-12 | Nakatsuka et al. | PDoT: private DNS-over-TLS with TEE supportDOI 10.1145/3359789.3359793 | PDoT: private DNS-over-TLS with TEE support | Proceedings |
2019-12 | Liu et al. | A Comparative Study of Blockchain-Based DNS DesignDOI 10.1145/3376044.3376057 | A Comparative Study of Blockchain-Based DNS Design | Proceedings |
2019-12 | Houser et al. | An investigation on information leakage of DNS over TLSDOI 10.1145/3359989.3365429 | An investigation on information leakage of DNS over TLS | Proceedings |
2019-12 | Deccio & Davis | DNS privacy in practice and preparationDOI 10.1145/3359989.3365435 | DNS privacy in practice and preparation | Proceedings |
2019-11 | Allman, M. | On Eliminating Root Nameservers from the DNSDOI 10.1145/3365609.3365863 | On Eliminating Root Nameservers from the DNS | Proceedings |
2019-10 | Müller et al. | Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverDOI 10.1145/3355369.3355570 | Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover | Proceedings |
2019-10 | Moura et al. | Cache Me If You Can: Effects of DNS Time-to-LiveDOI 10.1145/3355369.3355568 | Cache Me If You Can: Effects of DNS Time-to-Live | Proceedings |
2019-10 | Lu et al. | An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?DOI 10.1145/3355369.3355580 | An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? | Proceedings |
2019-10 | Foremski et al. | DNS Observatory: The Big Picture of the DNSDOI 10.1145/3355369.3355566 | DNS Observatory: The Big Picture of the DNS | Proceedings |
2019-10 | Böttger et al. | An Empirical Study of the Cost of DNS-over-HTTPSDOI 10.1145/3355369.3355575 | An Empirical Study of the Cost of DNS-over-HTTPS | Proceedings |
2019-10 | Al-Dalky et al. | A Look at the ECS Behavior of DNS ResolversDOI 10.1145/3355369.3355586 | A Look at the ECS Behavior of DNS Resolvers | Proceedings |
2019-09 | Tehrani et al. | NDNSSEC: Namespace Management in NDN with DNSSECDOI 10.1145/3357150.3357417 | NDNSSEC: Namespace Management in NDN with DNSSEC | Proceedings |
2019-09 | Tehrani et al. | The Missing Piece: On Namespace Management in NDN and How DNSSEC Might HelpDOI 10.1145/3357150.3357401 | The Missing Piece: On Namespace Management in NDN and How DNSSEC Might Help | Proceedings |
2019-09 | Lee et al. | DGA-based malware detection using DNS traffic analysisDOI 10.1145/3338840.3355672 | DGA-based malware detection using DNS traffic analysis | Proceedings |
2019-08 | Shafir et al. | DNS Negative Caching in the WildDOI 10.1145/3342280.3342338 | DNS Negative Caching in the Wild | Proceedings |
2019-07 | Schmitt et al. | Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019DOI 10.1145/3340301.3341128 | Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019 | Proceedings |
2019-07 | Liu et al. | Who is answering my queries: understanding and characterizing interception of the DNS resolution pathDOI 10.1145/3340301.3341122 | Who is answering my queries: understanding and characterizing interception of the DNS resolution path | Proceedings |
2019-07 | Hounsel et al. | Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern webDOI 10.1145/3340301.3341129 | Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web | Proceedings |
2019-07 | Ferrara, E. | The history of digital spamDOI 10.1145/3299768 | The history of digital spam | Journal Article |
2019-05 | Lipton, J. | Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America? | Everything Old Is New Again: Does the '.sucks' gTLD Change the Regulatory Paradigm in North America? | Journal Article |
2019-05 | Gould & Feher | RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8590 | RFC 8590: Change Poll Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2019-05 | Clemson, A. | A Practical Guide to the Law of Domain Names and CybersquattingISBN 978-1912687121 | A Practical Guide to the Law of Domain Names and Cybersquatting | Book |
2019-04 | Zhou et al. | RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8544 | RFC 8544: Organization Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2019-03 | Zhou et al. | RFC 8543: Extensible Provisioning Protocol (EPP) Organization MappingDOI 10.17487/RFC8543 | RFC 8543: Extensible Provisioning Protocol (EPP) Organization Mapping | Internet Specification |
2019-03 | Li et al. | MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep LearningDOI 10.1145/3322645.3322675 | MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep Learning | Proceedings |
2019-01 | Hoffman et al. | RFC 8499: DNS TerminologyDOI 10.17487/RFC8499 | RFC 8499: DNS Terminology | Internet Specification |
2018-12 | Luo et al. | A Large Scale Analysis of DNS Water Torture AttackDOI 10.1145/3297156.3297272 | A Large Scale Analysis of DNS Water Torture Attack | Proceedings |
2018-12 | Liu et al. | A High Performance, Scalable DNS Service for Very Large Scale Container Cloud PlatformsDOI 10.1145/3284028.3284034 | A High Performance, Scalable DNS Service for Very Large Scale Container Cloud Platforms | Proceedings |
2018-11 | Hollenbeck & Newton | RFC 8521: Registration Data Access Protocol (RDAP) Object TaggingDOI 10.17487/RFC8521 | RFC 8521: Registration Data Access Protocol (RDAP) Object Tagging | Internet Specification |
2018-11 | Gould & Feher | RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8495 | RFC 8495: Allocation Token Extension for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2018-10 | Zhu & Heidemann | LDplayer: DNS Experimentation at ScaleDOI 10.1145/3278532.3278544 | LDplayer: DNS Experimentation at Scale | Proceedings |
2018-10 | Moura et al. | When the Dike Breaks: Dissecting DNS Defenses During DDoSDOI 10.1145/3278532.3278534 | When the Dike Breaks: Dissecting DNS Defenses During DDoS | Proceedings |
2018-10 | Lauinger et al. | From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropDOI 10.1145/3278532.3278560 | From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop | Proceedings |
2018-10 | Hoffman & McManus | RFC 8484: DNS Queries over HTTPS (DoH)DOI 10.17487/RFC8484 | RFC 8484: DNS Queries over HTTPS (DoH) | Internet Specification |
2018-08 | Hohlfeld, O. | Operating a DNS-based Active Internet ObservatoryDOI 10.1145/3234200.3234239 | Operating a DNS-based Active Internet Observatory | Proceedings |
2018-08 | Abhishta et al. | Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service ProvidersDOI 10.1145/3229598.3229599 | Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers | Proceedings |
2018-07 | Zhauniarovich et al. | A Survey on Malicious Domains Detection through DNS Data AnalysisDOI 10.1145/3191329 | A Survey on Malicious Domains Detection through DNS Data Analysis | Journal Article |
2018-07 | Allman, M. | Comments On DNS RobustnessDOI 10.1145/3232755.3232773 | Comments On DNS Robustness | Proceedings |
2018-07 | Al-Dalky et al. | Practical Challenge-Response for DNSDOI 10.1145/3232755.3232765 | Practical Challenge-Response for DNS | Proceedings |
2018-06 | Szurdi & Christin | Domain Registration Policy Strategies and the Fight against Online Crime | Domain Registration Policy Strategies and the Fight against Online Crime | Proceedings |
2018-06 | Perrin, S. | The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection Authorities | The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection Authorities | Doctoral Thesis |
2018-06 | Messabi et al. | Malware detection using DNS records and domain name featuresDOI 10.1145/3231053.3231082 | Malware detection using DNS records and domain name features | Proceedings |
2018-05 | Korczynski et al. | Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsDOI 10.1145/3196494.3196548 | Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs | Proceedings |
2018-03 | Khalil et al. | A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceDOI 10.1145/3176258.3176329 | A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference | Proceedings |
2018-03 | Hananto et al. | Detecting Network Security Threats Using Domain Name System and NetFlow TrafficDOI 10.1145/3199478.3199505 | Detecting Network Security Threats Using Domain Name System and NetFlow Traffic | Proceedings |
2018-03 | Gould et al. | RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC8334 | RFC 8334: Launch Phase Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2018-03 | Dickinson et al. | RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLSDOI 10.17487/RFC8310 | RFC 8310: Usage Profiles for DNS over TLS and DNS over DTLS | Internet Specification |
2018-01 | Ferrante, A. | The impact of GDPR on WHOIS: Implications for businesses facing cybercrime | The impact of GDPR on WHOIS: Implications for businesses facing cybercrime | Journal Article |
2017-12 | Xu et al. | An Adaptive Malicious Domain Detection Mechanism with DNS TrafficDOI 10.1145/3171592.3171595 | An Adaptive Malicious Domain Detection Mechanism with DNS Traffic | Proceedings |
2017-11 | Sun et al. | Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture ModelDOI 10.1145/3127540.3127567 | Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model | Proceedings |
2017-11 | Müller et al. | Recursives in the wild: engineering authoritative DNS serversDOI 10.1145/3131365.3131366 | Recursives in the wild: engineering authoritative DNS servers | Proceedings |
2017-11 | Lee & Spring | Identifying and Analyzing Broadband Internet Reverse DNS NamesDOI 10.1145/3143361.3143392 | Identifying and Analyzing Broadband Internet Reverse DNS Names | Proceedings |
2017-11 | Chung et al. | Understanding the role of registrars in DNSSEC deploymentDOI 10.1145/3131365.3131373 | Understanding the role of registrars in DNSSEC deployment | Proceedings |
2017-11 | Almeida et al. | Dissecting DNS Stakeholders in Mobile NetworksDOI 10.1145/3143361.3143375 | Dissecting DNS Stakeholders in Mobile Networks | Proceedings |
2017-10 | Vissers et al. | The Wolf of Name Street: Hijacking Domains Through Their NameserversDOI 10.1145/3133956.3133988 | The Wolf of Name Street: Hijacking Domains Through Their Nameservers | Proceedings |
2017-10 | Mohaisen et al. | Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresDOI 10.1109/TNET.2017.2717965 | Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures | Journal Article |
2017-10 | Klein et al. | X-Ray Your DNSDOI 10.1145/3133956.3138821 | X-Ray Your DNS | Proceedings |
2017-10 | Fukuda et al. | Detecting Malicious Activity With DNS Backscatter Over TimeDOI 10.1109/TNET.2017.2724506 | Detecting Malicious Activity With DNS Backscatter Over Time | Journal Article |
2017-10 | Feibish et al. | Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesDOI 10.1145/3132465.3132474 | Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches | Proceedings |
2017-10 | Chen et al. | Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyDOI 10.1145/3133956.3134084 | Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study | Proceedings |
2017-08 | Sperotto et al. | TIDE: Threat Identification Using Active DNS MeasurementsDOI 10.1145/3123878.3131988 | TIDE: Threat Identification Using Active DNS Measurements | Proceedings |
2017-08 | Rijswijk-Deij et al. | The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverDOI 10.1145/3123878.3131987 | The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover | Proceedings |
2017-06 | Zhang et al. | Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual FeaturesDOI 10.1016/j.procs.2017.05.204 | Domain Watcher: Detecting Malicious Domains Based on Local and Global Textual Features | Proceedings |
2017-04 | Silvestro et al. | Is today's DNS the right solution for middleboxes selection?DOI 10.1145/3069383.3069389 | Is today's DNS the right solution for middleboxes selection? | Proceedings |
2017-04 | Radwan & Heckel | Prediction of the domain name system (DNS) quality attributesDOI 10.1145/3019612.3019728 | Prediction of the domain name system (DNS) quality attributes | Proceedings |
2017-03 | Koch et al. | RFC 8109: Initializing a DNS Resolver with Priming QueriesDOI 10.17487/RFC8109 | RFC 8109: Initializing a DNS Resolver with Priming Queries | Internet Specification |
2017-02 | Ribbers et al. | RFC 8063: Key Relay Mapping for the Extensible Provisioning ProtocolDOI 10.17487/RFC8063 | RFC 8063: Key Relay Mapping for the Extensible Provisioning Protocol | Internet Specification |
2017-02 | Reddy et al. | RFC 8094: DNS over Datagram Transport Layer Security (DTLS)DOI 10.17487/RFC8094 | RFC 8094: DNS over Datagram Transport Layer Security (DTLS) | Internet Specification |
2017-01 | Hao & Wang | Exploring Domain Name Based Features on the Effectiveness of DNS CachingDOI 10.1145/3041027.3041032 | Exploring Domain Name Based Features on the Effectiveness of DNS Caching | Journal Article |
2017-01 | Gould, J. | RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status MappingDOI 10.17487/RFC8056 | RFC 8056: Extensible Provisioning Protocol (EPP) and Registration Data Access Protocol (RDAP) Status Mapping | Internet Specification |
2017-01 | Aizuddin et al. | DNS amplification attack detection and mitigation via sFlow with security-centric SDNDOI 10.1145/3022227.3022230 | DNS amplification attack detection and mitigation via sFlow with security-centric SDN | Proceedings |
2016-11 | Ruohonen et al. | Correlating file-based malware graphs against the empirical ground truth of DNS graphsDOI 10.1145/2993412.2993414 | Correlating file-based malware graphs against the empirical ground truth of DNS graphs | Proceedings |
2016-11 | Moura et al. | Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventDOI 10.1145/2987443.2987446 | Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event | Proceedings |
2016-11 | Lauinger et al. | WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationDOI 10.1145/2987443.2987463 | WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration | Proceedings |
2016-11 | Korczyński et al. | Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesDOI 10.1145/2987443.2987477 | Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates | Proceedings |
2016-10 | Wright et al. | Hands-on exercises about DNS attacks: details, setup and lessons learned | Hands-on exercises about DNS attacks: details, setup and lessons learned | Journal Article |
2016-10 | Liu et al. | All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsDOI 10.1145/2976749.2978387 | All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records | Proceedings |
2016-10 | Katzlinger, H. | Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher Perspektive | Das „dunkle Netz“ im Kontext von Internet Governance aus politischer und gesellschaftlicher Perspektive | Master's Thesis |
2016-10 | Hao et al. | PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationDOI 10.1145/2976749.2978317 | PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration | Proceedings |
2016-10 | Farnan et al. | Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesDOI 10.1145/2994620.2994636 | Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses | Proceedings |
2016-10 | Cifuentes et al. | Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSECDOI 10.1145/2998373.2998452 | Poor Man's Hardware Security Module (pmHSM): A Threshold Cryptographic Backend for DNSSEC | Proceedings |
2016-08 | Wijekoon & Nishi | Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3 | Implement Domain Name System (DNS) on network simulator-3: Implement RFC 1035 on ns-3 | Proceedings |
2016-08 | Meitei et al. | Detection of DDoS DNS Amplification Attack Using Classification AlgorithmDOI 10.1145/2980258.2980431 | Detection of DDoS DNS Amplification Attack Using Classification Algorithm | Proceedings |
2016-08 | Jeong et al. | A Longitudinal Analysis of .i2p Leakage in the Public DNS InfrastructureDOI 10.1145/2934872.2960423 | A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure | Proceedings |
2016-08 | Gautam, R. | Analysis and implementation of WHOIS domain lookupISSN 2454-2024 | Analysis and implementation of WHOIS domain lookup | Journal Article |
2016-06 | Sahri & Okamura | Protecting DNS services from IP spoofing: SDN collaborative authentication approachDOI 10.1145/2935663.2935666 | Protecting DNS services from IP spoofing: SDN collaborative authentication approach | Proceedings |
2016-06 | Ruohonen & Leppänen | On the Design of a Simple Network Resolver for DNS MiningDOI 10.1145/2983468.2983513 | On the Design of a Simple Network Resolver for DNS Mining | Proceedings |
2016-05 | Khalil et al. | Discovering Malicious Domains through Passive DNS Data Graph AnalysisDOI 10.1145/2897845.2897877 | Discovering Malicious Domains through Passive DNS Data Graph Analysis | Proceedings |
2016-05 | Hu et al. | RFC 7858: Specification for DNS over Transport Layer Security (TLS)DOI 10.17487/RFC7858 | RFC 7858: Specification for DNS over Transport Layer Security (TLS) | Internet Specification |
2016-03 | Hermann, D. | Beobachtungsmöglichkeiten im Domain Name SystemDOI 10.1007/978-3-658-13263-7 | Beobachtungsmöglichkeiten im Domain Name System | Book |
2016-02 | Gao et al. | Reexamining DNS from a global recursive resolver perspectiveDOI 10.1109/TNET.2014.2358637 | Reexamining DNS from a global recursive resolver perspective | Proceedings |
2016-01 | Benchaita et al. | Stability and optimization of DNS-based request redirection in CDNsDOI 10.1145/2833312.2833455 | Stability and optimization of DNS-based request redirection in CDNs | Proceedings |
2015-10 | Liu et al. | Who is .com?: Learning to Parse WHOIS RecordsDOI 10.1145/2815675.2815693 | Who is .com?: Learning to Parse WHOIS Records | Proceedings |
2015-10 | Kührer et al. | Going Wild: Large-Scale Classification of Open DNS ResolversDOI 10.1145/2815675.2815683 | Going Wild: Large-Scale Classification of Open DNS Resolvers | Proceedings |
2015-10 | Halvorson et al. | From .academy to .zone: An Analysis of the New TLD Land RushDOI 10.1145/2815675.2815696 | From .academy to .zone: An Analysis of the New TLD Land Rush | Proceedings |
2015-10 | Fukuda & Heidemann | Detecting Malicious Activity with DNS BackscatterDOI 10.1145/2815675.2815706 | Detecting Malicious Activity with DNS Backscatter | Proceedings |
2015-09 | Rijswijk-Deij et al. | Making the Case for Elliptic Curves in DNSSECDOI 10.1145/2831347.2831350 | Making the Case for Elliptic Curves in DNSSEC | Journal Article |
2015-09 | Hands et al. | A Study on Botnets Utilizing DNSDOI 10.1145/2808062.2808070 | A Study on Botnets Utilizing DNS | Proceedings |
2015-08 | Rijswijk-Deij et al. | The Internet of Names: A DNS Big DatasetDOI 10.1145/2785956.2789996 | The Internet of Names: A DNS Big Dataset | Proceedings |
2015-03 | Zhou et al. | RFC 7485: Inventory and Analysis of WHOIS Registration ObjectsDOI 10.17487/RFC7485 | RFC 7485: Inventory and Analysis of WHOIS Registration Objects | Internet Specification |
2015-03 | Newton et al. | RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7480 | RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Newton & Hollenbeck | RFC 7482: Registration Data Access Protocol (RDAP) Query FormatDOI 10.17487/RFC7482 | RFC 7482: Registration Data Access Protocol (RDAP) Query Format | Internet Specification |
2015-03 | Newton & Hollenbeck | RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7483 | RFC 7483: JSON Responses for the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Horne, W. | Collecting, Analyzing and Responding to Enterprise Scale DNS EventsDOI 10.1145/2699026.2699027 | Collecting, Analyzing and Responding to Enterprise Scale DNS Events | Proceedings |
2015-03 | Hollenbeck & Kong | RFC 7481: Security Services for the Registration Data Access Protocol (RDAP)DOI 10.17487/RFC7481 | RFC 7481: Security Services for the Registration Data Access Protocol (RDAP) | Internet Specification |
2015-03 | Blanchet, M. | RFC 7484: Finding the Authoritative Registration Data (RDAP) ServiceDOI 10.17487/RFC7484 | RFC 7484: Finding the Authoritative Registration Data (RDAP) Service | Internet Specification |
2015-02 | Hollenbeck, S. | RFC 7451: Extension Registry for the Extensible Provisioning ProtocolDOI 10.17487/RFC7451 | RFC 7451: Extension Registry for the Extensible Provisioning Protocol | Internet Specification |
2015-02 | Agten et al. | Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbuseDOI 10.14722/ndss.2015.23058 | Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse | Proceedings |
2014-12 | Herzberg & Shulman | DNS authentication as a service: preventing amplification attacksDOI 10.1145/2664243.2664281 | DNS authentication as a service: preventing amplification attacks | Proceedings |
2014-11 | Zaki et al. | Dissecting Web Latency in GhanaDOI 10.1145/2663716.2663748 | Dissecting Web Latency in Ghana | Proceedings |
2014-11 | Wang, Z. | On the Capability of DNS Cache Poisoning AttacksDOI 10.1145/2660267.2662363 | On the Capability of DNS Cache Poisoning Attacks | Proceedings |
2014-11 | Thomas & Mohaisen | Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemDOI 10.1145/2665943.2665951 | Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system | Proceedings |
2014-11 | Shulman, H. | Pretty Bad Privacy: Pitfalls of DNS EncryptionDOI 10.1145/2665943.2665959 | Pretty Bad Privacy: Pitfalls of DNS Encryption | Proceedings |
2014-11 | Shulman & Ezra | On the Resilience of DNS InfrastructureDOI 10.1145/2660267.2662376 | On the Resilience of DNS Infrastructure | Proceedings |
2014-11 | Rula & Bustamante | Behind the Curtain: Cellular DNS and Content Replica SelectionDOI 10.1145/2663716.2663734 | Behind the Curtain: Cellular DNS and Content Replica Selection | Proceedings |
2014-11 | Rijswijk-Deij et al. | DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyDOI 10.1145/2663716.2663731 | DNSSEC and its potential for DDoS attacks: a comprehensive measurement study | Proceedings |
2014-10 | Schomp et al. | DNS Resolvers Considered HarmfulDOI 10.1145/2670518.2673881 | DNS Resolvers Considered Harmful | Proceedings |
2014-09 | Kumari et al. | RFC 7344: Automating DNSSEC Delegation Trust MaintenanceDOI 10.17487/RFC7344 | RFC 7344: Automating DNSSEC Delegation Trust Maintenance | Internet Specification |
2014-09 | Fernandez & Vanhilst | The secure and trustable distributed name system pattern | The secure and trustable distributed name system pattern | Proceedings |
2014-08 | Zhu et al. | T-DNS: connection-oriented DNS to improve privacy and securityDOI 10.1145/2619239.2631442 | T-DNS: connection-oriented DNS to improve privacy and security | Proceedings |
2014-07 | Huffaker et al. | DRoP: DNS-based router positioningDOI 10.1145/2656877.2656879 | DRoP: DNS-based router positioning | Proceedings |
2014-06 | Clayton & Mansfield | A Study of Whois Privacy and Proxy Service Abuse | A Study of Whois Privacy and Proxy Service Abuse | Proceedings |
2014-05 | Parunak et al. | An agent-based framework for dynamical understanding of DNS events (DUDE)DOI 10.1145/2602945.2602951 | An agent-based framework for dynamical understanding of DNS events (DUDE) | Proceedings |
2014-04 | Thomas & Mohaisen | Kindred domains: detecting and clustering botnet domains using DNS trafficDOI 10.1145/2567948.2579359 | Kindred domains: detecting and clustering botnet domains using DNS traffic | Proceedings |
2014-04 | Halvorson et al. | XXXtortion?: inferring registration intent in the .XXX TLDDOI 10.1145/2566486.2567995 | XXXtortion?: inferring registration intent in the .XXX TLD | Proceedings |
2014-04 | Bilge et al. | Exposure: A Passive DNS Analysis Service to Detect and Report Malicious DomainsDOI 10.1145/2584679 | Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | Journal Article |
2014-03 | Leontiadis & Christin | Empirically Measuring WHOIS MisuseDOI 10.1007/978-3-319-11203-9_2 | Empirically Measuring WHOIS Misuse | Book Section |
2014-01 | Jayarathna et al. | Hypervisor-based security architecture for validating DNS services | Hypervisor-based security architecture for validating DNS services | Proceedings |
2013-12 | Fofack & Alouf | Modeling modern DNS cachesDOI 10.4108/icst.valuetools.2013.254416 | Modeling modern DNS caches | Proceedings |
2013-11 | Watters et al. | ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?DOI 10.1109/CTC.2013.13 | ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? | Proceedings |
2013-11 | Kazato et al. | Towards classification of DNS erroneous queriesDOI 10.1145/2534142.2534146 | Towards classification of DNS erroneous queries | Proceedings |
2013-11 | Chitpranee & Fukuda | Towards passive DNS software fingerprintingDOI 10.1145/2534142.2534144 | Towards passive DNS software fingerprinting | Proceedings |
2013-11 | Anagnostopoulos et al. | DNS amplification attack revisitedDOI 10.1016/j.cose.2013.10.001 | DNS amplification attack revisited | Journal Article |
2013-10 | Streibelt et al. | Exploring EDNS-client-subnet adopters in your free timeDOI 10.1145/2504730.2504767 | Exploring EDNS-client-subnet adopters in your free time | Proceedings |
2013-10 | Schomp et al. | On measuring the client-side DNS infrastructureDOI 10.1145/2504730.2504734 | On measuring the client-side DNS infrastructure | Proceedings |
2013-10 | Hao et al. | Understanding the domain registration behavior of spammersDOI 10.1145/2504730.2504753 | Understanding the domain registration behavior of spammers | Proceedings |
2013-10 | Garcia, F. | DNS: (do not suspect)DOI 10.1145/2512209.2512222 | DNS: (do not suspect) | Proceedings |
2013-10 | Berger et al. | Internet nameserver IPv4 and IPv6 address relationshipsDOI 10.1145/2504730.2504745 | Internet nameserver IPv4 and IPv6 address relationships | Proceedings |
2013-08 | Gao et al. | An empirical reexamination of global DNS behaviorDOI 10.1145/2486001.2486018 | An empirical reexamination of global DNS behavior | Proceedings |
2013-07 | Shue & Kalafut | Resolvers Revealed: Characterizing DNS Resolvers and their ClientsDOI 10.1145/2499926.2499928 | Resolvers Revealed: Characterizing DNS Resolvers and their Clients | Journal Article |
2013-07 | Callahan et al. | On modern DNS behavior and propertiesDOI 10.1145/2500098.2500100 | On modern DNS behavior and properties | Journal Article |
2013-05 | Yuan et al. | A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival StrategiesDOI 10.1145/2461321.2461324 | A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies | Journal Article |
2013-04 | Damas et al. | RFC 6891: Extension Mechanisms for DNS (EDNS(0))DOI 10.17487/RFC6891 | RFC 6891: Extension Mechanisms for DNS (EDNS(0)) | Internet Specification |
2013-02 | Cheshire & Krochmal | RFC 6762: Multicast DNSDOI 10.17487/RFC6762 | RFC 6762: Multicast DNS | Internet Specification |
2013-02 | Weiler & Blacka | RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)DOI 10.17487/RFC6840 | RFC 6840: Clarifications and Implementation Notes for DNS Security (DNSSEC) | Internet Specification |
2013-01 | Ljunggren et al. | RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice StatementsDOI 10.17487/RFC6841 | RFC 6841: A Framework for DNSSEC Policies and DNSSEC Practice Statements | Internet Specification |
2012-12 | Severance, C. | Vint Cerf: A Brief History of PacketsDOI 10.1109/MC.2012.422 | Vint Cerf: A Brief History of Packets | Journal Article |
2012-12 | Rose, S. | Progress of DNS security deployment in the federal government | Progress of DNS security deployment in the federal government | Proceedings |
2012-12 | Kolkman et al. | RFC 6781: DNSSEC Operational Practices, Version 2DOI 10.17487/RFC6781 | RFC 6781: DNSSEC Operational Practices, Version 2 | Internet Specification |
2012-11 | Otto et al. | Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutionsDOI 10.1145/2398776.2398831 | Content delivery and the natural evolution of DNS: remote dns trends, performance issues and alternative solutions | Proceedings |
2012-11 | Bermudez et al. | DNS to the rescue: discerning content and services in a tangled webDOI 10.1145/2398776.2398819 | DNS to the rescue: discerning content and services in a tangled web | Proceedings |
2012-10 | Kaliski, B. | Revisiting DNS and WHOIS in the cloud eraDOI 10.1145/2381913.2381929 | Revisiting DNS and WHOIS in the cloud era | Proceedings |
2012-10 | Dagon, D. | Large-scale DNS data analysisDOI 10.1145/2382196.2382325 | Large-scale DNS data analysis | Proceedings |
2012-08 | Otto et al. | namehelp: intelligent client-side DNS resolutionDOI 10.1145/2342356.2342413 | namehelp: intelligent client-side DNS resolution | Proceedings |
2012-08 | Chaudhry et al. | Signposts: end-to-end networking in a world of middleboxesDOI 10.1145/2342356.2342371 | Signposts: end-to-end networking in a world of middleboxes | Proceedings |
2012-07 | Anonymous | The collateral damage of internet censorship by DNS injectionDOI 10.1145/2317307.2317311 | The collateral damage of internet censorship by DNS injection | Journal Article |
2012-06 | Rose & Wijngaards | RFC 6672: DNAME Redirection in the DNSDOI 10.17487/RFC6672 | RFC 6672: DNAME Redirection in the DNS | Internet Specification |
2012-04 | Yu et al. | Authority server selection in DNS caching resolversDOI 10.1145/2185376.2185387 | Authority server selection in DNS caching resolvers | Journal Article |
2012-03 | Kagwe & Masinde | Survey on DNS configurations, interdependencies, resilience and security for *.ke domainsDOI 10.1145/2160601.2160632 | Survey on DNS configurations, interdependencies, resilience and security for *.ke domains | Proceedings |
2012-03 | Deri et al. | Towards a passive DNS monitoring systemDOI 10.1145/2245276.2245396 | Towards a passive DNS monitoring system | Proceedings |
2012-03 | Crowcroft, J. | The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is...DOI 10.1145/2185376.2185392 | The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is... | Journal Article |
2011-12 | Khurshid et al. | Improving robustness of DNS to software vulnerabilitiesDOI 10.1145/2076732.2076758 | Improving robustness of DNS to software vulnerabilities | Proceedings |
2011-12 | Kalafut et al. | Touring DNS open houses for trends and configurationsDOI 10.1109/TNET.2011.2130537 | Touring DNS open houses for trends and configurations | Proceedings |
2011-11 | Hao et al. | Monitoring the initial DNS behavior of malicious domainsDOI 10.1145/2068816.2068842 | Monitoring the initial DNS behavior of malicious domains | Proceedings |
2011-09 | Bai et al. | Defense against DNS Man-In-The-Middle SpoofingDOI 10.1007/978-3-642-23971-7_39 | Defense against DNS Man-In-The-Middle Spoofing | Book Section |
2011-05 | Xu et al. | K-means and adaptive k-means algorithms for clustering DNS trafficDOI 10.5555/2151688.2151720 | K-means and adaptive k-means algorithms for clustering DNS traffic | Proceedings |
2011-02 | Borkar et al. | Implementation of round robin policy in DNS for thresholding of distributed web server systemDOI 10.1145/1980022.1980067 | Implementation of round robin policy in DNS for thresholding of distributed web server system | Proceedings |
2011-02 | Bilge et al. | EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis | EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis | Proceedings |
2010-12 | Yasmin et al. | Security issues related with DNS dynamic updates for mobile nodes: a surveyDOI 10.1145/1943628.1943645 | Security issues related with DNS dynamic updates for mobile nodes: a survey | Proceedings |
2010-11 | Yadav et al. | Detecting algorithmically generated malicious domain namesDOI 10.1145/1879141.1879148 | Detecting algorithmically generated malicious domain names | Proceedings |
2010-11 | Kalafut et al. | An empirical study of orphan DNS servers in the internetDOI 10.1145/1879141.1879182 | An empirical study of orphan DNS servers in the internet | Proceedings |
2010-11 | Chatzis, N. | Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and MitigationDOI 10.14279/depositonce-2647 | Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and Mitigation | Doctoral Thesis |
2010-11 | Ager et al. | Comparing DNS resolvers in the wildDOI 10.1145/1879141.1879144 | Comparing DNS resolvers in the wild | Proceedings |
2010-08 | Klensin, J. | RFC 5891: Internationalized Domain Names in Applications (IDNA): ProtocolDOI 10.17487/RFC5891 | RFC 5891: Internationalized Domain Names in Applications (IDNA): Protocol | Internet Specification |
2010-06 | Lewis & Hoenes | RFC 5936: DNS Zone Transfer Protocol (AXFR)DOI 10.17487/RFC5936 | RFC 5936: DNS Zone Transfer Protocol (AXFR) | Internet Specification |
2010-05 | Gould & Hollenbeck | RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5910 | RFC 5910: Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2010-05 | Abley & Manderson | RFC 5855: Nameservers for IPv4 and IPv6 Reverse ZonesDOI 10.17487/RFC5855 | RFC 5855: Nameservers for IPv4 and IPv6 Reverse Zones | Internet Specification |
2010-04 | Born & Gustafson | NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisDOI 10.1145/1852666.1852718 | NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis | Proceedings |
2010-01 | Carpenter & Partridge | Internet requests for comments (RFCs) as scholarly publicationsDOI 10.1145/1672308.1672315 | Internet requests for comments (RFCs) as scholarly publications | Journal Article |
2009-12 | Vixie, P. | What DNS is notDOI 10.1145/1610252.1610269 | What DNS is not | Journal Article |
2009-08 | Hollenbeck, S. | RFC 5730: Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC5730 | RFC 5730: Extensible Provisioning Protocol (EPP) | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name MappingDOI 10.17487/RFC5731 | RFC 5731: Extensible Provisioning Protocol (EPP) Domain Name Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5732: Extensible Provisioning Protocol (EPP) Host MappingDOI 10.17487/RFC5732 | RFC 5732: Extensible Provisioning Protocol (EPP) Host Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5733: Extensible Provisioning Protocol (EPP) Contact MappingDOI 10.17487/RFC5733 | RFC 5733: Extensible Provisioning Protocol (EPP) Contact Mapping | Internet Specification |
2009-08 | Hollenbeck, S. | RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCPDOI 10.17487/RFC5734 | RFC 5734: Extensible Provisioning Protocol (EPP) Transport over TCP | Internet Specification |
2009-03 | Villamarín-Salomón & Brustoloni | Bayesian bot detection based on DNS traffic similarityDOI 10.1145/1529282.1529734 | Bayesian bot detection based on DNS traffic similarity | Proceedings |
2008-10 | Plonka & Barford | Context-aware clustering of DNS query trafficDOI 10.1145/1452520.1452547 | Context-aware clustering of DNS query traffic | Proceedings |
2008-10 | Kalafut et al. | Understanding implications of DNS zone provisioningDOI 10.1145/1452520.1452546 | Understanding implications of DNS zone provisioning | Proceedings |
2008-10 | Damas & Neves | RFC 5358: Preventing Use of Recursive Nameservers in Reflector AttacksDOI 10.17487/RFC5358 | RFC 5358: Preventing Use of Recursive Nameservers in Reflector Attacks | Internet Specification |
2008-10 | Dagon et al. | Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesDOI 10.1145/1455770.1455798 | Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries | Proceedings |
2008-10 | Ballani & Francis | Mitigating DNS DoS attacksDOI 10.1145/1455770.1455796 | Mitigating DNS DoS attacks | Proceedings |
2008-09 | Goth, G. | ICANN's TLD Plans Are Defined, Not Yet RefinedDOI 10.1109/MIC.2008.102 | ICANN's TLD Plans Are Defined, Not Yet Refined | Journal Article |
2008-08 | Atkinson et al. | Mobility through naming: impact on DNSDOI 10.1145/1403007.1403010 | Mobility through naming: impact on DNS | Proceedings |
2008-04 | Akcan et al. | Geographic web usage estimation by monitoring DNS cachesDOI 10.1145/1367798.1367813 | Geographic web usage estimation by monitoring DNS caches | Proceedings |
2008-03 | Laurie et al. | RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of ExistenceDOI 10.17487/RFC5155 | RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence | Internet Specification |
2007-12 | Lindsay, D. | International Domain Name Law: ICANN and the UDRPISBN 978-1841135847 | International Domain Name Law: ICANN and the UDRP | Book |
2007-10 | Jackson et al. | Protecting browsers from DNS rebinding attacksDOI 10.1145/1315245.1315298 | Protecting browsers from DNS rebinding attacks | Proceedings |
2007-10 | Cano et al. | Solving the user-to-host binding problem in ad hoc networks through photo-idsDOI 10.1145/1298197.1298212 | Solving the user-to-host binding problem in ad hoc networks through photo-ids | Proceedings |
2007-07 | Zhang et al. | Denial of service attack and prevention on SIP VoIP infrastructures using DNS floodingDOI 10.1145/1326304.1326314 | Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding | Proceedings |
2007-05 | Alzoubi et al. | MyXDNS: a resquest routing dns server with decoupled server selectionDOI 10.1145/1242572.1242620 | MyXDNS: a resquest routing dns server with decoupled server selection | Proceedings |
2007-04 | Vixie, P. | DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system.DOI 10.1145/1242489.1242499 | DNS Complexity: Although it contains just a few simple rules, DNS has grown into an enormously complex system. | Journal Article |
2007-04 | Ariyapperuma & Mitchell | Security vulnerabilities in DNS and DNSSECDOI 10.1109/ARES.2007.139 | Security vulnerabilities in DNS and DNSSEC | Proceedings |
2007-01 | Efroni, Z. | Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark RightsISBN 978-0275988821 | Names as Domains, Names as Marks: Issues Concerning the Interface between Internet Domain Names and Trademark Rights | Book Section |
2006-12 | Padmanabhan et al. | A study of end-to-end web access failuresDOI 10.1145/1368436.1368457 | A study of end-to-end web access failures | Proceedings |
2006-11 | Ren et al. | Visualizing DNS trafficDOI 10.1145/1179576.1179582 | Visualizing DNS traffic | Proceedings |
2006-10 | Sarat et al. | On the Use of Anycast in DNSDOI 10.1109/ICCCN.2006.286248 | On the Use of Anycast in DNS | Proceedings |
2006-10 | Hedley, S. | A brief history of spamDOI 10.1080/13600830600960758 | A brief history of spam | Journal Article |
2006-09 | Alexander, T. | Domain name registrars: are they part of the domain name fraud problem?DOI 10.1145/1231047.1231071 | Domain name registrars: are they part of the domain name fraud problem? | Proceedings |
2006-07 | Lewis, E. | RFC 4592: The Role of Wildcards in the Domain Name SystemDOI 10.17487/RFC4592 | RFC 4592: The Role of Wildcards in the Domain Name System | Internet Specification |
2006-07 | Broido et al. | The windows of pivate DNS updatesDOI 10.1145/1140086.1140098 | The windows of pivate DNS updates | Proceedings |
2005-10 | Deegan et al. | The main name system: an exercise in centralized computingDOI 10.1145/1096536.1096538 | The main name system: an exercise in centralized computing | Proceedings |
2005-10 | Antonova, S. | Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002) | Power dynamics in global communication governance: Internet regulation and the case of ICANN (1998-2002) | Doctoral Thesis |
2005-08 | Ishibashi et al. | Detecting mass-mailing worm infected hosts by mining DNS traffic dataDOI 10.1145/1080173.1080175 | Detecting mass-mailing worm infected hosts by mining DNS traffic data | Proceedings |
2005-03 | Arends et al. | RFC 4033: DNS Security Introduction and RequirementsDOI 10.17487/RFC4033 | RFC 4033: DNS Security Introduction and Requirements | Internet Specification |
2005-03 | Arends et al. | RFC 4034: Resource Records for the DNS Security ExtensionsDOI 10.17487/RFC4034 | RFC 4034: Resource Records for the DNS Security Extensions | Internet Specification |
2005-03 | Arends et al. | RFC 4035: Protocol Modifications for the DNS Security ExtensionsDOI 10.17487/RFC4035 | RFC 4035: Protocol Modifications for the DNS Security Extensions | Internet Specification |
2004-10 | Pang et al. | Availability, usage, and deployment characteristics of the domain name systemDOI 10.1145/1028788.1028790 | Availability, usage, and deployment characteristics of the domain name system | Proceedings |
2004-10 | Pang et al. | On the responsiveness of DNS-based network controlDOI 10.1145/1028788.1028792 | On the responsiveness of DNS-based network control | Proceedings |
2004-10 | Jung & Sit | An empirical study of spam traffic and the use of DNS black listsDOI 10.1145/1028788.1028838 | An empirical study of spam traffic and the use of DNS black lists | Proceedings |
2004-09 | Pappas et al. | Distributed DNS troubleshootingDOI 10.1145/1016687.1016694 | Distributed DNS troubleshooting | Proceedings |
2004-09 | Hollenbeck, S. | RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3915 | RFC 3915: Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP) | Internet Specification |
2004-09 | Daigle, L. | RFC 3912: WHOIS Protocol SpecificationDOI 10.17487/RFC3912 | RFC 3912: WHOIS Protocol Specification | Internet Specification |
2004-08 | Seshan, S. | Session details: DNS and namingDOI 10.1145/3244279 | Session details: DNS and naming | Proceedings |
2004-08 | Ramasubramanian & Sirer | The design and implementation of a next generation name service for the internetDOI 10.1145/1015467.1015504 | The design and implementation of a next generation name service for the internet | Proceedings |
2004-08 | Pappas et al. | Impact of configuration errors on DNS robustnessDOI 10.1145/1015467.1015503 | Impact of configuration errors on DNS robustness | Proceedings |
2004-03 | Hollenbeck, S. | RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP)DOI 10.17487/RFC3735 | RFC 3735: Guidelines for Extending the Extensible Provisioning Protocol (EPP) | Internet Specification |
2003-10 | Wills et al. | Inferring relative popularity of internet applications by actively querying DNS cachesDOI 10.1145/948205.948216 | Inferring relative popularity of internet applications by actively querying DNS caches | Proceedings |
2003-07 | Broido et al. | Spectroscopy of DNS update trafficDOI 10.1145/781027.781077 | Spectroscopy of DNS update traffic | Proceedings |
2003-05 | Krishnamurthy et al. | DEW: DNS-enhanced web for faster content deliveryDOI 10.1145/775152.775196 | DEW: DNS-enhanced web for faster content delivery | Proceedings |
2002-11 | Liston et al. | Diversity in DNS performance measuresDOI 10.1145/637201.637204 | Diversity in DNS performance measures | Proceedings |
2001-11 | Jung et al. | DNS performance and the effectiveness of cachingDOI 10.1145/505202.505223 | DNS performance and the effectiveness of caching | Proceedings |
2001-11 | Cranor et al. | Characterizing large DNS traces using graphsDOI 10.1145/505202.505210 | Characterizing large DNS traces using graphs | Proceedings |
2001-11 | Ateniese & Mangard | A new approach to DNS security (DNSSEC)DOI 10.1145/501983.501996 | A new approach to DNS security (DNSSEC) | Journal Article |
2000-04 | Froomkin et al. | Domain Names under ICANN: Technical Management or Policy ChokepointDOI 10.1145/332186.545149 | Domain Names under ICANN: Technical Management or Policy Chokepoint | Proceedings |
1998-03 | Andrews, M. | RFC 2308: Negative Caching of DNS Queries (DNS NCACHE)DOI 10.17487/RFC2308 | RFC 2308: Negative Caching of DNS Queries (DNS NCACHE) | Internet Specification |
1997-07 | Elz et al. | RFC 2182: Selection and Operation of Secondary DNS ServersDOI 10.17487/RFC2182 | RFC 2182: Selection and Operation of Secondary DNS Servers | Internet Specification |
1997-07 | Elz & Bush | RFC 2181: Clarifications to the DNS SpecificationDOI 10.17487/RFC2181 | RFC 2181: Clarifications to the DNS Specification | Internet Specification |
1997-04 | Vixie et al. | RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE)DOI 10.17487/RFC2136 | RFC 2136: Dynamic Updates in the Domain Name System (DNS UPDATE) | Internet Specification |
1996-08 | Vixie, P. | RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)DOI 10.17487/RFC1996 | RFC 1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY) | Internet Specification |
1996-02 | Barr, D. | RFC 1912: Common DNS Operational and Configuration ErrorsDOI 10.17487/RFC1912 | RFC 1912: Common DNS Operational and Configuration Errors | Internet Specification |
1987-11 | Mockapetris, P. | RFC 1035: Domain names - implementation and specificationDOI 10.17487/RFC1035 | RFC 1035: Domain names - implementation and specification | Internet Specification |
1983-11 | Mockapetris, P. | RFC 882: Domain names: Concepts and facilitiesDOI 10.17487/RFC0882 | RFC 882: Domain names: Concepts and facilities | Internet Specification |
1983-11 | Mockapetris, P. | RFC 883: Domain names: Implementation specificationDOI 10.17487/RFC0883 | RFC 883: Domain names: Implementation specification | Internet Specification |