Page 67 - Read Online
P. 67

Page 60                                                               Kim et al. J Surveill Secur Saf 2020;1:34-60  I  http://dx.doi.org/10.20517/jsss.2020.14

               62.  Muhammet B, Ziya GZ. Detection of phishing attacks. 2018 6th International Symposium on Digital Forensic and Security (ISDFS);
                   2018 Mar 22-25; Antalya, Turkey. IEEE; 2018. pp. 1-5.
               63.  Antonakakis M, Dagon D, Luo X, Perdisci R, Lee W, et al. A centralized monitoring infrastructure for improving dns security.
                   Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection; 2010 Sep; International Symposium, Raid,
                   Ottawa, Ontario, Canada. Berlin: Springer-Verlag; 2010. pp. 18-37.
               64.  Zhang K, Ji W, Li N, Wang Y, Liao S. Detection of malicious domain name based on DNS data analysis. JPhysConfSer
                   2020;1544:012169.
               65.  Palau F, Catania C, Guerra J, Garcia S, Rigaki M. DNS tunneling: a deep learning based lexicographical detection approach.
                   Cryptography and Security 2020.
               66.  Rajendran, B. DNS amplification & DNS tunneling attacks simulation, detection and mitigation approaches. 2020 International
                   Conference on Inventive Computation Technologies (ICICT); 2020 Feb 26-27; Coimbatore, India. IEEE; 2020. pp. 230-6.
               67.  Berger A, D’Alconzo A, Gansterer WN, Pescape A. Mining agile dns traffic using graph analysis for cybercrime detection. Comput Netw
                   2016;100:28-44.
               68.  Perdisci R, Corona I, Giacinto G. Early detection of malicious flux networks via large-scale passive DNS traffic analysis. IEEE T Depend
                   Secure 2012;9:714-26.
               69.  Yadav S, Reddy AKK, Reddy AN, Ranjan S. Detecting algorithmically generated domain-flux attacks with DNS traffic analysis.
                   IEEEACM TNetwork 2012;20:1663-77.
               70.  Vixie P, Gudmundsson O, Eastlake D, Wellington B. Secret key transaction authentication for DNS (TSIG). RFC28452000. Available
                   from: https://www.bibsonomy.org/bibtex/fbdc74e947549d1d0939d567bd377f08. [Last accessed on 27 Jul 2020]
               71.  Barnes R. Use cases and requirements for DNS-based authentication of named entities (DANE). RFC 6394 2011. Available from: https://
                   tools.ietf.org/html/rfc6394. [Last accessed on 27 Jul 2020]
               72.  Gudmundsson O. Adding acronyms to simplify conversations about DNS-based authentication of named entities (DANE). RFC 7218
                   2014. Available from: https://tools.ietf.org/html/rfc7218. [Last accessed on 27 Jul 2020]
               73.  Zhu L, Wessels D, Mankin A, Heidemann J. Measuring dane tlsa deployment. International Workshop on Traffic Monitoring and
                   Analysis; 2015 Apr 21-24; Barcelona, Spain. Springer; 2015. pp. 219-32.
               74.  Hoffman P, McManus P. DNS queries over HTTPS (DoH). RFC 8484 2018. Available from: https://tools.ietf.org/html/rfc8484. [Last
                   accessed on 27 Jul 2020]
               75.  SecSpider. Global DNSSEC deployment tracking. Available from: http://secspider.net/. [Last accessed on 17 Aug 2020]
               76.  Trostle J, van Besien B, Pujari A. Protecting against DNS cache poisoning attacks. 2010 6th IEEE Workshop on Secure Network
                   Protocols; 2010 Oct 5-5; Kyoto Japan. IEEE; 2010. pp. 25-30.
               77.  Zhu L, Hu Z, Heidemann J, Wessels D, Mankin A, et al. T-DNS: connection-oriented DNS to improve privacy and security. ACM
                   SIGCOMM CompCom 2014;44:379-80.
               78.  Bassil R, Hobeica R, Itani W, Ghali C, Kayssi A, et al. Security analysis and solution for thwarting cache poisoning attacks in the domain
                   name system. 2012 19th International Conference on Telecommunications (ICT); 2012 Apr 23-25; Jounieh, Lebanon. IEEE; 2012. pp.
                   1-6.
               79.  Neustar. Q2, 2019 Cyber threats and trends report. Available from: https://www.home.neustar/resources/whitepapers/2019-cyberthreats-
                   trends-report. [Lasted accessed on 17 Aug 2020]
   62   63   64   65   66   67   68   69   70   71   72