Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies 2021
DOI: 10.1145/3485983.3494872
|View full text |Cite
|
Sign up to set email alerts
|

Transparent forwarders

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…consists of various amplifiers [31], the driving factor for amplification are queries for names with large zones. This means that the attackers can utilize most amplifiers if they select such a name, which makes the honeypots less attractive or at least less likely to be used.…”
Section: Towards Ground Truthmentioning
confidence: 99%
“…consists of various amplifiers [31], the driving factor for amplification are queries for names with large zones. This means that the attackers can utilize most amplifiers if they select such a name, which makes the honeypots less attractive or at least less likely to be used.…”
Section: Towards Ground Truthmentioning
confidence: 99%
“…Such devices were shown to serve different purposes. Transparent forwarders [45] only relay incoming DNS requests to alternative resolvers, such as public or network's internal DNS resolvers. Importantly, they do not inject spoofed responses, but rather let those alternative resolvers respond to end clients directly.…”
Section: Identifying Injectorsmentioning
confidence: 99%
“…More broadly, various types of DNS manipulation have been extensively studied in the literature. Censors [57,50,58,47,48,7,23,27,46], transparent forwarders [45,33], rogue DNS servers [19], and middleboxes [51,38,61,60,16]-all interfere with the normal DNS resolution process. Particular attention has been paid to the GFW of China [3,4,5,11,22,28,39], known to intercept DNS traffic and inject bogus responses.…”
Section: Related Workmentioning
confidence: 99%
“…In total, we sent more than 3 billion DNS A requests (one to each routable IP address) and received 7.6 million responses on the scanner. From each DNS response packet, we retrieve the following fields: the queried domain name (remember that each domain name is globally unique as it encodes the destination IP address to which we send the request), the source IP address of the response (can be the same as the destination IP address or different, in case the destination is a transparent forwarder [40]) and the DNS response code. We refer to each response as a three-tuple (source IP address, domain name, response code).…”
Section: Internet Scanmentioning
confidence: 99%
“…The number of open DNS resolvers dropped substantially in recent years -from 17.8 million in 2015 [26] to around 2 million in 2021 [4,25,40,52]. Yet, DNS has been heavily involved in reflection and amplification attacks [20,21].…”
Section: Related Workmentioning
confidence: 99%