-
3
-
-
78249250853
-
A centralized monitoring infrastructure for improving DNS security
-
Springer
-
M. Antonakakis, D. Dagon, X. Luo, R. Perdisci, W. Lee, and J. Bellmor A centralized monitoring infrastructure for improving DNS security 13th International conference on recent advances in intrusion detection 2010 Springer 18 37
-
(2010)
13th International Conference on Recent Advances in Intrusion Detection
, pp. 18-37
-
-
Antonakakis, M.1
Dagon, D.2
Luo, X.3
Perdisci, R.4
Lee, W.5
Bellmor, J.6
-
7
-
-
41949084503
-
-
Recommendations of the National Institute of Standards and Technology (NIST)
-
R. Chandramouli, and S. Rose Secure domain name system (DNS) deployment guide April 2010 Recommendations of the National Institute of Standards and Technology (NIST) http://csrc.nist.gov/publications/nistpubs/800-81r1/sp-800- 81r1.pdf
-
(2010)
Secure Domain Name System (DNS) Deployment Guide
-
-
Chandramouli, R.1
Rose, S.2
-
10
-
-
84865581888
-
Recursive DNS architectures and vulnerability implications
-
D. Dagon, M. Antonakakis, K. Day, X. Luo, C.P. Lee, and W. Lee Recursive DNS architectures and vulnerability implications Proceedings of 16th network and distributed system security symposium (NDSS) 2009
-
(2009)
Proceedings of 16th Network and Distributed System Security Symposium (NDSS)
-
-
Dagon, D.1
Antonakakis, M.2
Day, K.3
Luo, X.4
Lee, C.P.5
Lee, W.6
-
11
-
-
84856537894
-
Formal analysis of the DNS bandwidth amplification attack and its countermeasures using probabilistic model checking
-
IEEE
-
T. Deshpande, P. Katsaros, S. Basagiannis, and S.A. Smolka Formal analysis of the DNS bandwidth amplification attack and its countermeasures using probabilistic model checking High-assurance systems engineering (HASE), 2011 IEEE 13th international symposium on 2011 IEEE 360 367
-
(2011)
High-assurance Systems Engineering (HASE), 2011 IEEE 13th International Symposium on
, pp. 360-367
-
-
Deshpande, T.1
Katsaros, P.2
Basagiannis, S.3
Smolka, S.A.4
-
14
-
-
63349101242
-
Battling botnets and online mobs
-
G. Evron Battling botnets and online mobs GJIA 9 2008 121 126
-
(2008)
GJIA
, vol.9
, pp. 121-126
-
-
Evron, G.1
-
25
-
-
78049411650
-
Detection of denial of service attacks against domain name system using neural networks
-
S. Rastegari, M.I. Saripan, and M.F.A. Rasid Detection of denial of service attacks against domain name system using neural networks Int J Comput Sci 6 2009 23 27
-
(2009)
Int J Comput Sci
, vol.6
, pp. 23-27
-
-
Rastegari, S.1
Saripan, M.I.2
Rasid, M.F.A.3
-
27
-
-
68149158844
-
UDP large-payload capability detection for DNSSEC
-
K. Rikitake, K. Nakao, S. Shimojo, and H. Nogawa UDP large-payload capability detection for DNSSEC IEICE Trans Inf Syst E91-D 5 2008 1261 1273
-
(2008)
IEICE Trans Inf Syst
, vol.91 E -D
, Issue.5
, pp. 1261-1273
-
-
Rikitake, K.1
Nakao, K.2
Shimojo, S.3
Nogawa, H.4
-
28
-
-
84888874292
-
-
Scapy project
-
Scapy project, http://www.secdev.org/projects/scapy/.
-
-
-
-
29
-
-
84881315126
-
Vulnerability analysis for DNS and DHCP
-
A. Singh, B. Singh, H. Joseph, Advances in Information Security Springer US
-
A. Singh, B. Singh, and H. Joseph Vulnerability analysis for DNS and DHCP A. Singh, B. Singh, H. Joseph, Vulnerability analysis and defense for the internet Advances in Information Security Vol. 37 2008 Springer US 111 124
-
(2008)
Vulnerability Analysis and Defense for the Internet
, vol.37
, pp. 111-124
-
-
Singh, A.1
Singh, B.2
Joseph, H.3
-
33
-
-
33750366503
-
DDoS defense by offense
-
DOI 10.1145/1151659.1159948
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker DDoS defense by offense Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications 2006 303 314 (Pubitemid 44623736)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
34
-
-
84880845563
-
Security and cost analyses of DNSSEC protocol
-
Y. Yuan, X. Wu, Y. Lu, Communications in computer and information science Springer Berlin Heidelberg
-
Y. Yao, L. He, and G. Xiong Security and cost analyses of DNSSEC protocol Y. Yuan, X. Wu, Y. Lu, Trustworthy computing and services Communications in computer and information science Vol. 320 2013 Springer Berlin Heidelberg 429 435
-
(2013)
Trustworthy Computing and Services
, vol.320
, pp. 429-435
-
-
Yao, Y.1
He, L.2
Xiong, G.3
|