Proceedings of the 13th ACM Workshop on Hot Topics in Networks 2014
DOI: 10.1145/2670518.2673881
|View full text |Cite
|
Sign up to set email alerts
|

DNS Resolvers Considered Harmful

Abstract: The Domain Name System (DNS) is a critical component of the Internet infrastructure that has many security vulnerabilities. In particular, shared DNS resolvers are a notorious security weak spot in the system. We propose an unorthodox approach for tackling vulnerabilities in shared DNS resolvers: removing shared DNS resolvers entirely and leaving recursive resolution to the clients. We show that the two primary costs of this approach-loss of performance and an increase in system load-are modest and therefore c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 16 publications
(19 reference statements)
0
19
0
Order By: Relevance
“…The case with the local cache amplified the DNS traffic 3.9 times. In other words, removing the shared DNS resolver as proposed by Schomp et al [3] would increase the DNS traffic by 3.9 times. This result led us to conclude that removing the shared DNS resolver is not a good idea.…”
Section: Assumptions Of the Dns Query Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…The case with the local cache amplified the DNS traffic 3.9 times. In other words, removing the shared DNS resolver as proposed by Schomp et al [3] would increase the DNS traffic by 3.9 times. This result led us to conclude that removing the shared DNS resolver is not a good idea.…”
Section: Assumptions Of the Dns Query Modelmentioning
confidence: 99%
“…Notably, the cache hit effect is one of the most important topics that needs to be analyzed. Because Schomp et al's proposal [3] depends on the assumption that a local cache can reduce DNS traffic to a reasonable extent, we focused on verifying this assumption. In practical terms, we analyzed the cache hit effect of the current shared DNS resolver based on the campus network traffic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, it is considered inadequate for the purposes of a global ICN NRS, even for ICN architectures that use hierarchical, rather than flat, names. One reason is its susceptibility to security attacks [17], due to the limited redundancy in name-servers and the fact that many servers have a single point of attachment to the Internet [12]. In addition, the load is not equally balanced between root servers, since names are not equally distributed among top level domains.…”
Section: B Lookup-by-name Approachesmentioning
confidence: 99%
“…The main advantage of DNS is its widespread usage, therefore the incremental deployment and adoption of a DNS-based system is easier. On the other hand, it is considered inadequate for storing object-level information since it is susceptible to security attacks, such as Denial of Service (DoS) ones [44], with root servers having a disproportionally larger load than ones at lower levels of the hierarchy.…”
Section: ) Impact Of Churnmentioning
confidence: 99%