Page 66 - Read Online
P. 66
Kim et al. J Surveill Secur Saf 2020;1:34-60 I http://dx.doi.org/10.20517/jsss.2020.14 Page 59
32. Droms R, Arbaugh W. Authentication for DHCP messages. RFC 3118. Avaliable from: https://tools.ietf.org/html/rfc3118. [Last accessed
on 17 Aug 2020]
33. Bau J, Mitchell JC. A security evaluation of DNSSEC with NSEC3. Proceedings of the Network and Distributed System Security
Symposium, 2010 Feb 28-Mar 3; San Diego, California, USA. NDSS; 2010. pp. 18.
34. Internet society. State of DNSSEC deployment 2016. Avaliable from: https://www.internetsociety.org/resources/doc/2016/state-of-dnssec-
deployment-2016. [Last accessed on 17 Aug 2020]
35. van Rijswijk-Deij R, Sperotto A, Pras A. DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.Proceedings
of the 2014 Conference on Internet Measurement Conference; 2014 Nov; Vancouver, BC, Canada. ACM; 2014. pp. 449-60.
36. Loveless J. DNSSEC: how Savvy DDoS attackers are using our defenses against us, Security Research Report by Neustar 2016. Avaliable
from: http://www.circleid.com/posts/20160818_how_savvy_ddos_attackers_are_using_dnssec_against_us/. [Last accessed on 17 Aug
2020]
37. Alharbi F, Chang J, Zhou YC, Qian F, Qian ZY, et al. Collaborative client-side DNS cache poisoning attack. IEEE INFOCOM 2019-IEEE
Conference on Computer Communications. 2019. Apr 29 - May 2; Paris, France. IEEE, 2019.
38. Kaminsky D. Black ops 2008: It’s the end of the cache as we know it. Black Hat USA 2008; 2. Avaliable from: https://www.blackhat.
com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf. [Last accessed on 17 Aug 2020]
39. Vissers T, Barron T, van Goethem T, Joosen W, Nikiforakis N. The wolf of name street: hijacking domains through their nameservers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct; Dallas, Texas, USA. ACM;
2017. pp. 957-70.
40. Rascagneres P. Mercer W. DNSpionage campaign targets middle east. Available from: https://blogs.cisco.com/security/talos/dnspionage-
campaign-targets-middle-east. [Last accessed on 17 Aug 2020]
41. Thornewell PM, Golden LM. DNS flood protection platform for a network. US Patent 2012;8,261,351. Available from: https://portal.
unifiedpatents.com/patents/patent/US-8261351-B1. [Last accessed on 17 Aug 2020]
42. Rozekrans T, Mekking M, de Koning J. Defending against DNS reflection amplification attacks. University of Amsterdam System &
Network Engineering RP1 2013. Available from: https://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf.
[Last accessed on 17 Aug 2020]
43. Chandramouli R, Rose S. Secure domain name system (DNS) deployment guide. NIST Special Publication 2006;800:81-2.
44. Feibish SL, Afek Y, Bremler-Barr A, Cohen E, Shagam M. Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters
sketches. Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies; 2017 Oct; San Jose, California.
New York, NY, USA: Association for computing Machinery; 2017. pp. 1-6.
45. Farnham G, Atlasis A. Detecting DNS tunneling. SANS Institute InfoSec Reading Room 2013;9:1-32.
46. van Leijenhorst T, Chin KW, Lowe D. On the viability and performance of DNS tunneling. The 5th International Conference on
Information Technology and Applications (ICITA); 2008. pp. 560-6.
47. Zhou Y, Li Q, Miao Q,Yim K. DGA-based botnet detection using DNS traffic. JInternet ServInfSecur 2013;3:116-23.
48. Kessem L. The Necurs Botnet: a pandora’s box of malicious spam. Security Intelligence. Acaliable from: https://securityintelligence.com/
the-necurs-botnet-a-pandoras-box-of-malicious-spam/. [Last accessed on 17 Aug 2020]
49. Metcalf LB, Ruef, Spring JM. Open-source measurement of fast-flux networks while considering domain-name parking. The LASER
Workshop: Learning from Authoritative Security Experiment Results (LASER 2017); 2017 Oct 18-19; USENIX Association; 2017. pp.
13-24.
50. Dagon D, Lee C, Lee W, Provos N. Corrupted DNS resolution paths: The rise of a malicious resolution authority. Proceedings of the 15th
Network and Distributed System Security Symposium (NDSS); 2008 Feb 10-13; San Diego, California, USA. NDSS; 2008.
51. Mergenhagen P, Domain DP. Mainstreethost. Available from: https://www.mainstreethost.com/blog/deindexing-phantom-domains. [Last
accessed on 10 Aug 2020]
52. Krämer L, Krupp J, Makita D, Nishizoe T, Koide T, et al. Amppot: monitoring and defending against amplification ddos attacks.
International Symposium on Recent Advances in Intrusion Detection; 2015 Nov 2-4; Kyoto, Japan. Springer; 2015. pp. 615-36.
53. NS1. Enabling DNSSEC. Available from: https://ns1.com/knowledgebase/dnssec. [Last accessed on 27 Jul 2020]
54. Elz R, Bush R, Bradner S, Patton M. Selection and Operation of Secondary DNS Servers. RFC 2182 1997. Available from: https://tools.
ietf.org/html/rfc2182. [Last accessed on 27 Jul 2020]
55. Yu Y, Cai J, Osterweil E, Zhang L. Measuring the placement of DNS servers in top-level-domain. Verisign Technical Report 2011.
Available from: https://www.semanticscholar.org/paper/Measuring-the-Placement-of-DNS-Servers-in-Yu/4afb5d97b5002edc7f14708a51
d7abb322d28f9a. [Last accessed on 27 Jul 2020]
56. Bisiaux JY. DNS threats and mitigation strategies. Network Security 2014;7:5-9.
57. Ansari A, Khan N, Rais Z, Taware P. Reinforcing security of DNS using AWS cloud. Proceedings of the 3rd International Conference on
Advances in Science & Technology (ICAST); 2020 Apr 8-9; Mumbai, India. SSRN; 2020.
58. Antonakakis M, Perdisci R, Lee W, Vasiloglou N, Dagon D. Detecting malware domains at the upper DNS hierarchy. Proceedings of the
20th USENIX Conference on Security; 2011 Aug; USENIX Association. USA; 2011. pp. 1-16.
59. Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N. Building a dynamic reputation system for DNS. Proceedings of the 19th
USENIX Conference on Security; 2010 Aug; USENIX Association. USA; 2010. pp. 273-89.
60. Bilge L, Kirda E, Kruegel C, Balduzzi M. EXPOSURE: finding malicious domains using passive DNS analysis. Proceedings of the
Network and Distributed System Security Symposium, 2011 Feb 6-9; San Diego, California, USA. NDSS; 2011.
61. Zhang P, Liu T, Zhang Y, Ya J, Shi J, et al. Domain watcher: detecting malicious domains based on local and global textual features.
ProcComputSci 2017;108:2408-12.