Proceedings of the 21st ACM Internet Measurement Conference 2021
DOI: 10.1145/3487552.3487817
|View full text |Cite
|
Sign up to set email alerts
|

Home is where the hijacking is

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…More intrusive DNS interceptors, such as national censors, impersonate intended query destinations and actively inject bogus responses [38]. DNS interception is often accomplished at Customer Premises Equipment [51] and can be detected by issuing CHAOS-class or other DNS queries with the NSID option enabled.…”
Section: Identifying Injectorsmentioning
confidence: 99%
See 1 more Smart Citation
“…More intrusive DNS interceptors, such as national censors, impersonate intended query destinations and actively inject bogus responses [38]. DNS interception is often accomplished at Customer Premises Equipment [51] and can be detected by issuing CHAOS-class or other DNS queries with the NSID option enabled.…”
Section: Identifying Injectorsmentioning
confidence: 99%
“…More broadly, various types of DNS manipulation have been extensively studied in the literature. Censors [57,50,58,47,48,7,23,27,46], transparent forwarders [45,33], rogue DNS servers [19], and middleboxes [51,38,61,60,16]-all interfere with the normal DNS resolution process. Particular attention has been paid to the GFW of China [3,4,5,11,22,28,39], known to intercept DNS traffic and inject bogus responses.…”
Section: Related Workmentioning
confidence: 99%