[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …
users on the Internet. Since its first specification, DNS has been extended in numerous …
The reality of algorithm agility: Studying the DNSSEC algorithm life-cycle
The DNS Security Extensions (DNSSEC) add data origin authentication and data integrity to
the Domain Name System (DNS), the naming system of the Internet. With DNSSEC …
the Domain Name System (DNS), the naming system of the Internet. With DNSSEC …
Measurement for encrypted open resolvers: Applications and security
Encrypted DNS has been proposed to mitigate the vulnerability of traditional DNS to
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …
A first look at brand indicators for message identification (BIMI)
As promising approaches to thwarting the damage caused by phishing emails, DNS-based
email security mechanisms, such as the Sender Policy Framework (SPF), Domain-based …
email security mechanisms, such as the Sender Policy Framework (SPF), Domain-based …
[ΑΝΑΦΟΡΑ][C] A review on security and privacy issues and challenges in internet of things
DK Alferidah, NZ Jhanjhi - International Journal of Computer Science and …, 2020
From the beginning: Key transitions in the first 15 years of dnssec
When the global rollout of the DNS Security Extensions (DNSSEC) began in 2005, a first-of-
its-kind trial started: The complexity of a core Internet protocol was magnified in favor of …
its-kind trial started: The complexity of a core Internet protocol was magnified in favor of …
Improving Network, Data and Application Security for SMEs
The evolution of Information and Communications Technology and Cloud Computing,
combined with the advent of novel telecommunication frameworks such as 5G, have …
combined with the advent of novel telecommunication frameworks such as 5G, have …
Intelligent-driven adapting defense against the client-side DNS cache poisoning in the cloud
A new Domain Name System (DNS) cache poisoning attack aiming at clients has emerged
recently. It induced cloud users to visit fake web sites and thus reveal information such as …
recently. It induced cloud users to visit fake web sites and thus reveal information such as …
Measuring adoption of DNS security mechanisms with cross-sectional approach
M Yajima, D Chiba, Y Yoneya… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
The threat of attacks targeting a DNS, such as DNS cache poisoning attacks and DNS
amplification attacks, continues unabated. In addition, attacks that exploit the difficulty in …
amplification attacks, continues unabated. In addition, attacks that exploit the difficulty in …
Hybrid deeper neural network model for detection of the Domain Name System over Hypertext markup language protocol traffic flooding attacks
Ö Kasim - Soft Computing, 2023 - Springer
Abstract Domain Name System flood attacks are generally carried out in the application
layer with the user datagram protocol. This type of attack is a vulnerability that concerns …
layer with the user datagram protocol. This type of attack is a vulnerability that concerns …