[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial

O Van Der Toorn, M Müller, S Dickinson… - Computer Science …, 2022 - Elsevier
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …

The reality of algorithm agility: Studying the DNSSEC algorithm life-cycle

M Müller, W Toorop, T Chung, J Jansen… - Proceedings of the …, 2020 - dl.acm.org
The DNS Security Extensions (DNSSEC) add data origin authentication and data integrity to
the Domain Name System (DNS), the naming system of the Internet. With DNSSEC …

Measurement for encrypted open resolvers: Applications and security

M Luo, Y Yao, L **n, Z Jiang, Q Wang, W Shi - Computer Networks, 2022 - Elsevier
Encrypted DNS has been proposed to mitigate the vulnerability of traditional DNS to
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …

A first look at brand indicators for message identification (BIMI)

M Yajima, D Chiba, Y Yoneya, T Mori - International Conference on …, 2023 - Springer
As promising approaches to thwarting the damage caused by phishing emails, DNS-based
email security mechanisms, such as the Sender Policy Framework (SPF), Domain-based …

[ΑΝΑΦΟΡΑ][C] A review on security and privacy issues and challenges in internet of things

DK Alferidah, NZ Jhanjhi - International Journal of Computer Science and …, 2020

From the beginning: Key transitions in the first 15 years of dnssec

E Osterweil, PF Tehrani, TC Schmidt… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
When the global rollout of the DNS Security Extensions (DNSSEC) began in 2005, a first-of-
its-kind trial started: The complexity of a core Internet protocol was magnified in favor of …

Improving Network, Data and Application Security for SMEs

C Tselios, I Politis, C Xenakis - … of the 17th International Conference on …, 2022 - dl.acm.org
The evolution of Information and Communications Technology and Cloud Computing,
combined with the advent of novel telecommunication frameworks such as 5G, have …

Intelligent-driven adapting defense against the client-side DNS cache poisoning in the cloud

T Ma, C Xu, Z Zhou, X Kuang, L Zhong… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
A new Domain Name System (DNS) cache poisoning attack aiming at clients has emerged
recently. It induced cloud users to visit fake web sites and thus reveal information such as …

Measuring adoption of DNS security mechanisms with cross-sectional approach

M Yajima, D Chiba, Y Yoneya… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
The threat of attacks targeting a DNS, such as DNS cache poisoning attacks and DNS
amplification attacks, continues unabated. In addition, attacks that exploit the difficulty in …

Hybrid deeper neural network model for detection of the Domain Name System over Hypertext markup language protocol traffic flooding attacks

Ö Kasim - Soft Computing, 2023 - Springer
Abstract Domain Name System flood attacks are generally carried out in the application
layer with the user datagram protocol. This type of attack is a vulnerability that concerns …