Page 65 - Read Online
P. 65

Page 58                                                               Kim et al. J Surveill Secur Saf 2020;1:34-60  I  http://dx.doi.org/10.20517/jsss.2020.14

               REFERENCES
               1.   Mockapetris P. Domain names-implementation and specification. RFC1035 1987. Available from: https://tools.ietf.org/html/rfc1035. [Last
                   accessed on 17 Aug 2020]
               2.   Mockapetris P. Domain names-implementation and facilities. RFC1034 1987.
               3.   Engel S. My ether wallet DNS attack explained. Available from: https://cryptovoid.net/mew-dns-attack-explained. [Last accessed on 17
                   Aug 2020]
               4.   Arends R, Austein R, Larson M, Massey D, Rose S. DNS security introduction and requirements. RFC 4033 2005:1-21. Available from:
                   https://tools.ietf.org/html/rfc4033. [Last accessed on 17 Aug 2020]
               5.   Arends R, Austein R, Larson M, Massey D, Rose S. Resource records for the DNS security extensions. RFC 4034 2005:1-30. Available
                   from: https://tools.ietf.org/html/rfc4034. [Last accessed on 17 Aug 2020]
               6.   Arends R, Austein R, Larson M, Massey D, Rose S. Protocol modifications for the DNS security extensions. RFC 4035 2005:1-54.
                   Available from: https://tools.ietf.org/html/rfc4035. [Last accessed on 17 Aug 2020]
               7.   Eastlake 3rd D. Domain name system security extensions. RFC 2535 1999. Available from: https://tools.ietf.org/html/rfc2535. [Last
                   accessed on 17 Aug 2020]
               8.   Chung T, an Rijswijk-Deij R, Chandrasekaran B, Choffnes D, Levin D, et al. A longitudinal, end-to-end view of the DNSSEC ecosystem.
                   Proceedings of the 26th USENIX Conference on Security Symposium; 2017 Aug; Vancouver, BC. USENIX Association, USA; 2017. pp.
                   1307-22.
               9.   NIST. Estimating USG IPv6 and DNSSEC external service deployment status. Available from: https://fedv6-deployment.antd.nist.gov/
                   cgi-bin/generate-gov. [Last accessed on 17 Aug 2020]
               10.  Roosa SB, Schultze S. Trust darknet: control and compromise in the internet’s certificate authority model. IEEE Internet Comput
                   2013;17:8-25.
               11.  Wikipedia. 2016 Dyn cyberattack. Avaliable from: https://en.wikipedia.org/wiki/2016_Dyn_cyberattack. [Last accessed on 17 Aug 2020]
               12.  Downdetector. Internet outage map. Avaliable form: https://downdetector.com/status/centurylink/map/. [Lasted accessed on 27 Jul 2020]
               13.  NETSCOUT. NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report. Avaliable from: https://www.netscout.com/report/.
                   [Last accessed on 17 Aug 2020]
               14.  Zhauniarovich Y, Khalil I, Yu T, Dacier M. A survey on malicious domains detection through DNS data analysis. ACM Computing
                   Surveys (CSUR) 2018;51:1-36.
               15.  Fernandes D, Soares LFB, Gomes JV, Freire M, Inácio PRM. Security issues in cloud environments: a survey. Int J Inf Secur
                   2014;13:113-70.
               16.  Alieyan K, ALmomani A, Manasrah A, Kadhum, MM. A survey of botnet detection based on DNS. Neural Computing and Applications
                   2017;28:1541-58.
               17.  Peng T, Leckie C, Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM
                   Comput Surv 2007;39:31-42.
               18.  Casalicchio E, Caselli M, Coletta A. Measuring the global domain name system. IEEE network 2013;27:25-31.
               19.  Wikipedia. List of DNS resource records. Available from: https://en.wikipedia.org/wiki/List-of-DNS-record-types. [Last accessed on 17
                   Aug 2020]
               20.  Cheshire S, Krochmal M. Multicast DNS, RFC 6762 2013. Available from: https://tools.ietf.org/html/rfc6762. [Last accessed on 17 Aug
                   2020]
               21.  Aboba B, Thaler D, Esibov L. Link-local multicast name resolution (LLMNR), RFC 4795, January 2007. Available from: https://www.
                   rfc-editor.org/info/rfc4795. [Last accessed on 17 Aug 2020]
               22.  Andress J. The basics of information security: understanding the fundamentals of InfoSec in theory and practice, 2nd ed. Syngress;
                   2014. p. 240.
               23.  Bates S, Bowers J, Greenstein S, Weinstock J, Xu Y, et al. Evidence of decreasing internet entropy: the lack of redundancy in DNS
                   resolution by major websites and services. Available from: https://www.nber.org/papers/w24317. [Last accessed on 17 Aug 2020]
               24.  Schiffman M. Bound by tradition: a sampling of the security posture of the internet’s DNS servers. LinuxSecurity 2003. Available from:
                   http://packetfactory.openwall.net/papers/DNS-posture/DNS-posture-1.0.pdf. [Last accessed on 17 Aug 2020]
               25.  Migault D, Cédric G, Laurent M. A performance view on dnssec migration. 2010 International Conference on Network and Service
                   Management (CNSM); 2010 Oct 25-29; Niagara Falls, Canada. IEEE; 2010. pp. 469-74.
               26.  Klein A. BIND 9 DNS cache poisoning. SecuriTeam 2007. Available from: https://securiteam.com/securitynews/5vp0l0um0a/. [Lasted
                   accessed on 28 Jul 2020]
               27.  Yu X, Chen X, Xu F. Recovering and protecting against DNS cache poisoning attacks.2011 International Conference onInformation
                   Technology, Computer Engineering and Management Sciences (ICM); 2011 Dec 26-28; Beijing, China. IEEE; 2011. pp. 120-3.
               28.  Ager B, Dreger H, Feldmann A. Predicting the DNSSEC overhead using DNS traces. In 2006 40th Annual Conference on Information
                   Sciences and Systems. 2006, March 22-24, Princeton, NJ, USA. IEEE; 2006.
               29.  Van Adrichem NLM, Blenn N, Lua AR, Wang X, Wasif M, et al. A measurement study of DNSSEC misconfigurations. Secur Inform
                   2015;4:1-14.
               30.  Deccio C, Sedayao J, Kant K, Mohapatra P. Quantifying and improving dnssec availability. 2011 Proceedings of 20th International
                   Conference on Computer Communications and Networks (ICCCN); 2011 Jul 31-Aug 4; Lahaina, HI, USA. IEEE; 2011. pp. 1-7.
               31.  Clark L. A cartoon intro to DNS over HTTPS. Avaliable from: https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/. [Last
                   accessed on 17 Aug 2020]
   60   61   62   63   64   65   66   67   68   69   70