Page 66 - Read Online
P. 66

Kim et al. J Surveill Secur Saf 2020;1:34-60  I  http://dx.doi.org/10.20517/jsss.2020.14                                                               Page 59
               32.  Droms R, Arbaugh W. Authentication for DHCP messages. RFC 3118. Avaliable from: https://tools.ietf.org/html/rfc3118. [Last accessed
                   on 17 Aug 2020]
               33.  Bau J, Mitchell JC. A security evaluation of DNSSEC with NSEC3. Proceedings of the Network and Distributed System Security
                   Symposium, 2010 Feb 28-Mar 3; San Diego, California, USA. NDSS; 2010. pp. 18.
               34.  Internet society. State of DNSSEC deployment 2016. Avaliable from: https://www.internetsociety.org/resources/doc/2016/state-of-dnssec-
                   deployment-2016. [Last accessed on 17 Aug 2020]
               35.  van Rijswijk-Deij R, Sperotto A, Pras A. DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.Proceedings
                   of the 2014 Conference on Internet Measurement Conference; 2014 Nov; Vancouver, BC, Canada. ACM; 2014. pp. 449-60.
               36.  Loveless J. DNSSEC: how Savvy DDoS attackers are using our defenses against us, Security Research Report by Neustar 2016. Avaliable
                   from: http://www.circleid.com/posts/20160818_how_savvy_ddos_attackers_are_using_dnssec_against_us/. [Last accessed on 17 Aug
                   2020]
               37.  Alharbi F, Chang J, Zhou YC, Qian F, Qian ZY, et al. Collaborative client-side DNS cache poisoning attack. IEEE INFOCOM 2019-IEEE
                   Conference on Computer Communications. 2019. Apr 29 - May 2; Paris, France. IEEE, 2019.
               38.  Kaminsky D. Black ops 2008: It’s the end of the cache as we know it. Black Hat USA 2008; 2. Avaliable from: https://www.blackhat.
                   com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf. [Last accessed on 17 Aug 2020]
               39.  Vissers T, Barron T, van Goethem T, Joosen W, Nikiforakis N. The wolf of name street: hijacking domains through their nameservers.
                   Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct; Dallas, Texas, USA. ACM;
                   2017. pp. 957-70.
               40.  Rascagneres P. Mercer W. DNSpionage campaign targets middle east. Available from: https://blogs.cisco.com/security/talos/dnspionage-
                   campaign-targets-middle-east. [Last accessed on 17 Aug 2020]
               41.  Thornewell PM, Golden LM. DNS flood protection platform for a network. US Patent 2012;8,261,351. Available from: https://portal.
                   unifiedpatents.com/patents/patent/US-8261351-B1. [Last accessed on 17 Aug 2020]
               42.  Rozekrans T, Mekking M, de Koning J. Defending against DNS reflection amplification attacks. University of Amsterdam System &
                   Network Engineering RP1 2013. Available from: https://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf.
                   [Last accessed on 17 Aug 2020]
               43.  Chandramouli R, Rose S. Secure domain name system (DNS) deployment guide. NIST Special Publication 2006;800:81-2.
               44.  Feibish SL, Afek Y, Bremler-Barr A, Cohen E, Shagam M. Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters
                   sketches. Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies; 2017 Oct; San Jose, California.
                   New York, NY, USA: Association for computing Machinery; 2017. pp. 1-6.
               45.  Farnham G, Atlasis A. Detecting DNS tunneling. SANS Institute InfoSec Reading Room 2013;9:1-32.
               46.  van Leijenhorst T, Chin KW, Lowe D. On the viability and performance of DNS tunneling. The 5th International Conference on
                   Information Technology and Applications (ICITA); 2008. pp. 560-6.
               47.  Zhou Y, Li Q, Miao Q,Yim K. DGA-based botnet detection using DNS traffic. JInternet ServInfSecur 2013;3:116-23.
               48.  Kessem L. The Necurs Botnet: a pandora’s box of malicious spam. Security Intelligence. Acaliable from: https://securityintelligence.com/
                   the-necurs-botnet-a-pandoras-box-of-malicious-spam/. [Last accessed on 17 Aug 2020]
               49.  Metcalf LB, Ruef, Spring JM. Open-source measurement of fast-flux networks while considering domain-name parking. The LASER
                   Workshop: Learning from Authoritative Security Experiment Results (LASER 2017); 2017 Oct 18-19; USENIX Association; 2017. pp.
                   13-24.
               50.  Dagon D, Lee C, Lee W, Provos N. Corrupted DNS resolution paths: The rise of a malicious resolution authority. Proceedings of the 15th
                   Network and Distributed System Security Symposium (NDSS); 2008 Feb 10-13; San Diego, California, USA. NDSS; 2008.
               51.  Mergenhagen P, Domain DP. Mainstreethost. Available from: https://www.mainstreethost.com/blog/deindexing-phantom-domains. [Last
                   accessed on 10 Aug 2020]
               52.  Krämer L, Krupp J, Makita D, Nishizoe T, Koide T, et al. Amppot: monitoring and defending against amplification ddos attacks.
                   International Symposium on Recent Advances in Intrusion Detection; 2015 Nov 2-4; Kyoto, Japan. Springer; 2015. pp. 615-36.
               53.  NS1. Enabling DNSSEC. Available from: https://ns1.com/knowledgebase/dnssec. [Last accessed on 27 Jul 2020]
               54.  Elz R, Bush R, Bradner S, Patton M. Selection and Operation of Secondary DNS Servers. RFC 2182 1997. Available from: https://tools.
                   ietf.org/html/rfc2182. [Last accessed on 27 Jul 2020]
               55.  Yu Y, Cai J, Osterweil E, Zhang L. Measuring the placement of DNS servers in top-level-domain. Verisign Technical Report 2011.
                   Available from: https://www.semanticscholar.org/paper/Measuring-the-Placement-of-DNS-Servers-in-Yu/4afb5d97b5002edc7f14708a51
                   d7abb322d28f9a. [Last accessed on 27 Jul 2020]
               56.  Bisiaux JY. DNS threats and mitigation strategies. Network Security 2014;7:5-9.
               57.  Ansari A, Khan N, Rais Z, Taware P. Reinforcing security of DNS using AWS cloud. Proceedings of the 3rd International Conference on
                   Advances in Science & Technology (ICAST); 2020 Apr 8-9; Mumbai, India. SSRN; 2020.
               58.  Antonakakis M, Perdisci R, Lee W, Vasiloglou N, Dagon D. Detecting malware domains at the upper DNS hierarchy. Proceedings of the
                   20th USENIX Conference on Security; 2011 Aug; USENIX Association. USA; 2011. pp. 1-16.
               59.  Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N. Building a dynamic reputation system for DNS. Proceedings of the 19th
                   USENIX Conference on Security; 2010 Aug; USENIX Association. USA; 2010. pp. 273-89.
               60.  Bilge L, Kirda E, Kruegel C, Balduzzi M. EXPOSURE: finding malicious domains using passive DNS analysis. Proceedings of the
                   Network and Distributed System Security Symposium, 2011 Feb 6-9; San Diego, California, USA. NDSS; 2011.
               61.  Zhang P, Liu T, Zhang Y, Ya J, Shi J, et al. Domain watcher: detecting malicious domains based on local and global textual features.
                   ProcComputSci 2017;108:2408-12.
   61   62   63   64   65   66   67   68   69   70   71