A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[HTML][HTML] A survey of domain name system vulnerabilities and attacks

TH Kim, D Reeves - Journal of Surveillance, Security and Safety, 2020 - oaepublish.com
Aim: The Domain Name System (DNS) plays an integral role in the functionality of the
Internet. Clients receive Internet service by map** domain names into internet protocol …

Who is answering my queries: Understanding and characterizing interception of the {DNS} resolution path

B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao… - 27th USENIX Security …, 2018 - usenix.org
DNS queries from end users are handled by recursive DNS servers for scalability. For
convenience, Internet Service Providers (ISPs) assign recursive servers for their clients …

[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.

C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu… - NDSS, 2021 - utdallas.edu
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …

Cross the Zone: Toward a Covert Domain Hijacking via Shared {DNS} Infrastructure

Y Zhang, M Zhang, B Liu, Z Liu, J Zhang… - 33rd USENIX Security …, 2024 - usenix.org
Domain Name System (DNS) establishes clear responsibility boundaries among
nameservers for managing DNS records via authoritative delegation. However, the rise of …

[PDF][PDF] Cracking wall of confinement: Understanding and analyzing malicious domain takedowns

E Alowaisheq - The Network and Distributed System Security …, 2019 - par.nsf.gov
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past
decade, many successful take-down operations have been reported, including those against …

A first look at certification authority authorization (CAA)

Q Scheitle, T Chung, J Hiller, O Gasser… - ACM SIGCOMM …, 2018 - dl.acm.org
Shaken by severe compromises, the Web's Public Key Infrastructure has seen the addition
of several security mechanisms over recent years. One such mechanism is the Certification …