2016 IEEE First International Conference on Data Science in Cyberspace (DSC) 2016
DOI: 10.1109/dsc.2016.96
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Domain Name System Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…It is a vital protocol within the Internet model that translates unique IP addresses to human-readable addresses [22]. Security is an essential aspect in DNS, and methods of providing security such as extensions like Domain Name System Security Extensions (DNSSec) are used [23] to mitigate against DDoS, configuration tampering, DNS poisoning, and information leakage as well as countless other DNS vulnerabilities [23]. The DNS in the current Web 2.0 is centralized as discussed in Sect.…”
Section: Application Layermentioning
confidence: 99%
“…It is a vital protocol within the Internet model that translates unique IP addresses to human-readable addresses [22]. Security is an essential aspect in DNS, and methods of providing security such as extensions like Domain Name System Security Extensions (DNSSec) are used [23] to mitigate against DDoS, configuration tampering, DNS poisoning, and information leakage as well as countless other DNS vulnerabilities [23]. The DNS in the current Web 2.0 is centralized as discussed in Sect.…”
Section: Application Layermentioning
confidence: 99%
“…This method decreases both DNS resolution time and DNS traffic since it reduces the number of queries generated to handle a given DNS resolution without generating additional DNS messages. Simulation results based on two large independent DNS traces show that our proposed approach much reduces not only the DNS resolution time but also the DNS traffic [20], [21]. F.…”
Section: Openvpnmentioning
confidence: 99%
“…Particularly, despite the large number of works in the literature on DNS security and privacy, existing contributions are scattered across different research areas and a comprehensive yet concise survey is lacking. Although there exist several surveys in the field of DNS [1,2,3,4,5], they are limited from several points of view. First, the scope of those works is narrow, e.g., covering only a certain aspect of the DNS ecosystem, such as detecting Internet abuse by analyzing passive DNS traffic [3], malicious domain detection through DNS data analysis [4], and investigating the domain name squatting ecosystem [5].…”
Section: Introductionmentioning
confidence: 99%
“…First, the scope of those works is narrow, e.g., covering only a certain aspect of the DNS ecosystem, such as detecting Internet abuse by analyzing passive DNS traffic [3], malicious domain detection through DNS data analysis [4], and investigating the domain name squatting ecosystem [5]. Second, the number of studies covered in each of those prior works-even on the very well accepted set of problems in the field of DNS security and privacy-is limited, and does not cover the most recent advances, which require further attention and consideration-especially in an evolving domain [1,5].…”
Section: Introductionmentioning
confidence: 99%