Xu et al., 2023
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Kim et al. | A survey of domain name system vulnerabilities and attacks | |
| Klein et al. | Internet-wide study of DNS cache injections | |
| Xu et al. | Tsuking: Coordinating dns resolvers and queries into potent dos amplifiers | |
| US7620733B1 (en) | DNS anti-spoofing using UDP | |
| MacFarland et al. | The best bang for the byte: Characterizing the potential of DNS amplification attacks | |
| Man et al. | Dns cache poisoning attack: Resurrections with side channels | |
| MacFarland et al. | Characterizing optimal DNS amplification attacks and effective mitigation | |
| Hao et al. | {End-Users} get maneuvered: Empirical analysis of redirection hijacking in content delivery networks | |
| Sommese et al. | Investigating the impact of DDoS attacks on DNS infrastructure | |
| Hlavacek et al. | Stalloris:{RPKI} downgrade attack | |
| EP2557759A1 (en) | White listing dns top-talkers | |
| Hendriks et al. | On the potential of IPv6 open resolvers for DDoS attacks | |
| EP2779591A2 (en) | Method and apparatus for creating a list of trustworthy DNS clients | |
| Zou et al. | Survey on domain name system security | |
| Li et al. | The maginot line: Attacking the boundary of {DNS} caching protection | |
| Yazdani et al. | A matter of degree: characterizing the amplification power of open DNS resolvers | |
| Herzberg et al. | Antidotes for DNS poisoning by off-path adversaries | |
| Zhang et al. | Silence is not golden: Disrupting the load balancing of authoritative dns servers | |
| Klein et al. | Counting in the dark: Dns caches discovery and enumeration in the internet | |
| Li et al. | DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses | |
| Griffioen et al. | Taxonomy and adversarial strategies of random subdomain attacks | |
| Yazdani et al. | Hazardous echoes: the dns resolvers that should be put on mute | |
| Chang et al. | ZMap performance in open DNS resolver discovery | |
| Cowperthwaite et al. | The futility of DNSSec | |
| Al-Duwairi et al. | Distributed packet pairing for reflector based DDoS attack mitigation |