MADDVIPR

State of The Art

Bibliograpy and State of the Art

Measurements

Brownlee, Nevil, Kimberly C Claffy, and Evi Nemeth. 2001. “DNS Measurements at a Root Server.” In Global Telecommunications Conference, 2001. Globecom’01. Ieee, 3:1672–6. IEEE.

Benson, Karyn, Alberto Dainotti, kc claffy, Alex C. Snoeren, and Michael Kallitsis. 2015. “Leveraging Internet Background Radiation for Opportunistic Network Analysis.” In Proceedings of the 2015 Internet Measurement Conference, 423–36. IMC ’15. New York, NY, USA: ACM. doi:10.11452815675.2815702.

DNS as Source of Attacks

Rijswijk-Deij, Roland van, Anna Sperotto, and Aiko Pras. 2014. “DNSSEC and Its Potential for Ddos Attacks: A Comprehensive Measurement Study.” In Proceedings of the 2014 Conference on Internet Measurement Conference, 449–60. IMC ’14. New York, NY, USA: ACM. doi:10.11452663716.2663731.

Krämer, Lukas, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, and Christian Rossow. n.d. “AmpPot: Monitoring and Defending Against Amplification Ddos Attacks.”

DNS as Destination of Attacks

Jonker, Mattijs, Alistair King CAIDA, and Christian Rossow. 2017. “A Third of the Internet Is Under Attack : A Macroscopic Characterization of the Dos Ecosystem.” In.

Pan, Lanlan, Xuebiao Yuchi, and Yong Chen. 2016. “Mitigating Ddos Attacks Towards Top Level Domain Name Service.” In 2016 18th Asia-Pacific Network Operations and Management Symposium (Apnoms), 1–4. doi:10.1109/APNOMS.2016.7737252.

Moura, Giovane, John Heidemann, Moritz Müller, Ricardo de O Schmidt, and Marco Davids. 2018. “When the Dike Breaks: Dissecting Dns Defenses During Ddos.” In Proceedings of the Internet Measurement Conference 2018, 8–21. ACM.

Moura, Giovane, Ricardo de O Schmidt, John Heidemann, Wouter B de Vries, Moritz Muller, Lan Wei, and Cristian Hesselman. 2016. “Anycast Vs. Ddos: Evaluating the November 2015 Root Dns Event.” In Proceedings of the 2016 Internet Measurement Conference, 255–70. ACM.

Pappas, Vasileios, Dan Massey, and Lixia Zhang. 2007. “Enhancing Dns Resilience Against Denial of Service Attacks.” In, 450–59. doi:10.1109/DSN.2007.42.

DNS Misconfiguration and Vulnerabilities

Barili, A., and D. Lanterna. 2015. “On the Effects of Large-Scale Dns Poisoning.” In 2015 Ieee Conference on Communications and Network Security (Cns), 723–24. doi:10.1109/CNS.2015.7346904.

Jonker, Mattijs, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, and Aiko Pras. 2016. “Measuring the Adoption of Ddos Protection Services.” In Internet Measurement Conference.

Adrichem, N. L. M. v., A. R. Lua, X. Wang, M. Wasif, F. Fatturrahman, and F. A. Kuipers. 2014. “DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability.” In 2014 Ieee Joint Intelligence and Security Informatics Conference, 9–16. doi:10.1109/JISIC.2014.12.

Bushart, Jonas, and Christian Rossow. 2018. “DNS Unchained: Amplified Application-Layer Dos Attacks Against Dns Authoritatives.” In Research in Attacks, Intrusions, and Defenses, edited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis, 139–60. Cham: Springer International Publishing.

Dagon, David, Chris Lee, Wenke Lee, and Niels Provos. 2008. “Corrupted Dns Resolution Paths: The Rise of a Malicious Resolution Authority.”

Liu, Daiping, Shuai Hao, and Haining Wang. 2016. “All Your Dns Records Point to Us: Understanding the Security Threats of Dangling Dns Records.” In Proceedings of the 2016 Acm Sigsac Conference on Computer and Communications Security, 1414–25. CCS ’16. New York, NY, USA: ACM. doi:10.11452976749.2978387.

Vixie, Paul. 1999. “Extension Mechanisms for Dns (Edns0).”