DNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents (original) (raw)

Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors

Joao Afonso

2008 Third International Conference on Systems and Networks Communications, 2008

View PDFchevron_right

Improving DNS security using active firewalling with network probes

Joao Afonso

International Journal of Distributed Sensor Networks, 2012

View PDFchevron_right

Detecting and Preventing the Malicious System based on DNS Analysis

Ashok Paranjothi

View PDFchevron_right

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

Luis Trejo

Sensors, 2016

View PDFchevron_right

Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems

Amine Boukhtouta

IEEE Communications Surveys & Tutorials, 2018

View PDFchevron_right

Detection and Prevention-System of DNS query-based Distributed Denial-of-Service Attack

Kai Rannenberg

View PDFchevron_right

"Enhancing DNS Resilience against Denial of Service Attacks"

Lixia Zhang

View PDFchevron_right

A survey on Domain Name System Security

Maitri Patel

2018

View PDFchevron_right

Investigating DNS traffic anomalies for malicious activities

Fyodor Bom

View PDFchevron_right

Securing DNS over HTTPS traffic: a real-time analysis tool

csit iaesprime

Computer Science and Information Technologies, 2024

View PDFchevron_right

A Fair Solution to DNS Amplification Attacks

Dimitris Geneiatakis

2007

View PDFchevron_right

Securing the Domain Name System

Dorothy E Denning

2009

View PDFchevron_right

Detecting Malicious Activity With DNS Backscatter Over Time

Abdul Qadeer

IEEE/ACM Transactions on Networking, 2017

View PDFchevron_right

Detection and Prevention of DNS Query PTR record-based Distributed Denial-of-Service Attack

Kai Rannenberg

View PDFchevron_right

Guest Editors' Introduction: Securing the Domain Name System

Dorothy E Denning

IEEE Security & Privacy Magazine, 2000

View PDFchevron_right

Detecting DNS Amplification Attacks

Dimitris Geneiatakis

2007

View PDFchevron_right

SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates

David Arsenault

Journal of High Speed Networks, 2006

View PDFchevron_right

REMaDD: Resource-Efficient Malicious Domains Detector in Large-Scale Networks

gilad rosenthal

IEEE Access, 2020

View PDFchevron_right

An empirical reexamination of global DNS behavior

Shalini Ghosh

Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013

View PDFchevron_right

On the Performance and Analysis of DNS Security Extensions

Aniello Del Sorbo, R. Curtmola

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Anomaly Behavior Analysis of DNS Protocol

Salim Hariri

J. Internet Serv. Inf. Secur., 2015

View PDFchevron_right

Threat Analysis of the Domain Name System (DNS)

Derek Atkins

2004

View PDFchevron_right

A framework for DNS based detection and mitigation of malware infections on a network

Barry Irwin

2011 Information Security for South Africa, 2011

View PDFchevron_right

DomainProfiler: toward accurate and early discovery of domain names abused in future

Shigeki Goto

International Journal of Information Security

View PDFchevron_right

Security of Global Domain Infrastructure in the Internet

Rena Gasimova

Problems of Information Technology

View PDFchevron_right

Survey on domain name system security

Maitri Patel

2007

View PDFchevron_right

An Overview of DDoS attacks based on DNS

Kamal Alieyan

View PDFchevron_right

Detection of malicious payload distribution channels in DNS

ِAmr Y O U S S E F Bakla

2014 IEEE International Conference on Communications (ICC), 2014

View PDFchevron_right

Leveraging client-side DNS failure patterns to identify malicious behaviors

Antonio Nucci

2015 IEEE Conference on Communications and Network Security (CNS), 2015

View PDFchevron_right

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis

SANDEEP KUMAR YADAV

IEEE/ACM Transactions on Networking, 2012

View PDFchevron_right

Using Cloud Computing MapReduce operations to Detect DDoS Attacks on DNS servers

Raul Monroy

homepage.cem.itesm.mx

View PDFchevron_right