Open Access
MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01058
Number of page(s) 5
Section Information and Communication Technology
Published online 09 July 2015
  1. Hubert & R. Van Mook. 2009. Measures for making DNS more resilient against forged answers, RFC 5452, January.
  2. Arends, R., Austein, R., Larson, M., Massey, D. & Rose, S. RFC 4033 - DNS Security Introduction and Requirements.
  3. Tienhao Tsai, Yusheng Su, Shihjen Chen, Yanling Hwang, Fuhau Hsu. & Minhao Wu. 2013. A Network-based Solution to Kaminsky DNS Cache Poisoning Attacks. The Fifth International Conference on Evolving Internet.
  4. Dagon, D., Antonakakis, M., Day, K., Luo, X., Lee, C. & Lee, W. 2009. Recursive DNS architectures and vulnerability implications. In: Proceedings of the 16th NDSS, San Diego, CA.
  5. Dagon, D., Provos, N., Lee, C. & Lee, W. 2008. Corrupted DNS resolution paths: The rise of a malicious resolution authority. In: Proceedings of 15th NDSS, San Diego, CA.
  6. Arends, R., Austein, R., Larson, M., Massey, D. & Rose, S. RFC 4033-DNS Security Introduction and Requirements.
  7. Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee & Justin Bellmor. 2010. A centralized monitoring infrastructure for improving DNS security. Lecture Notes in Computer Science, 6307: 18–37. [CrossRef]