A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Domain name system security and privacy: A contemporary survey
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …
today's Internet, and is the standard naming convention between human-readable domain …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Dns cache poisoning attack reloaded: Revolutions with side channels
In this paper, we report a series of flaws in the software stack that leads to a strong revival of
DNS cache poisoning---a classic attack which is mitigated in practice with simple and …
DNS cache poisoning---a classic attack which is mitigated in practice with simple and …
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
DNS packets are designed to travel in unencrypted form through the Internet based on its
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
How Great is the Great Firewall? Measuring China's {DNS} Censorship
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over
the past two decades. However, most prior studies of China's DNS filtering were performed …
the past two decades. However, most prior studies of China's DNS filtering were performed …
Securing DNSSEC keys via threshold ECDSA from generic MPC
Deployment of DNSSEC, although increasing, still suffers from many practical issues that
results in a false sense of security. While many domains outsource zone management, they …
results in a false sense of security. While many domains outsource zone management, they …
[PDF][PDF] A survey of domain name system vulnerabilities and attacks
TH Kim, D Reeves - Journal of Surveillance, Security and …, 2020 - pdfs.semanticscholar.org
Abstract Aim: The Domain Name System (DNS) plays an integral role in the functionality of
the Internet. Clients receive Internet service by map** domain names into internet protocol …
the Internet. Clients receive Internet service by map** domain names into internet protocol …
Dns cache poisoning attack: Resurrections with side channels
DNS is one of the fundamental and ancient protocols on the Internet that supports many
network applications and services. Unfortunately, DNS was designed without security in …
network applications and services. Unfortunately, DNS was designed without security in …