Proceedings of the 15th International Conference on Emerging Networking Experiments and Technologies 2019
DOI: 10.1145/3359989.3365429
|View full text |Cite
|
Sign up to set email alerts
|

An investigation on information leakage of DNS over TLS

Abstract: DNS over TLS (DoT) protects the confidentiality and integrity of DNS communication by encrypting DNS messages transmitted between users and resolvers. In recent years, DoT has been deployed by popular recursive resolvers like Cloudflare and Google. While DoT is supposed to prevent on-path adversaries from learning and tampering with victims' DNS requests and responses, it is unclear how much information can be deduced through traffic analysis on DoT messages. To answer this question, in this work, we develop a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
42
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(43 citation statements)
references
References 35 publications
1
42
0
Order By: Relevance
“…Significantly, encryption requires additional computing resources and slows down the processing of DNS queries [20]. Work [21] analyzes the vulnerabilities of the DoT protocol. Article [22] explores the performance of the DoH protocol and the impact of DNS traffic encryption protocols on Internet space participants.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Significantly, encryption requires additional computing resources and slows down the processing of DNS queries [20]. Work [21] analyzes the vulnerabilities of the DoT protocol. Article [22] explores the performance of the DoH protocol and the impact of DNS traffic encryption protocols on Internet space participants.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…However, the ability of continuously conducting our WF attack on more than 220K domains highlights the scalability of our method. In fact, we cover an order of magnitude more domains compared to previous WF attacks against DoT/DoH traffic [19,50,96], in which the largest openworld setting comprised fewer than 10K domains [19].…”
Section: Selection Of Test Domainsmentioning
confidence: 99%
“…Using the sequence of bytes as a key feature to build a model for classifying encrypted DoH traffic, Siby et al [96] could obtain a precision of 94% on a dataset of 5K domains. In another related work, Houser et al [50] analyze DoT traffic using a classifier based on numerous statistical features extracted from the time of DNS packets, obtaining an accuracy of 83% for a dataset of 98 websites. Compared to the scale of our measurement, these prior studies employ several machine learning techniques on much smaller datasets, with the largest open-world dataset comprising only 10K domain names [19].…”
Section: Related Workmentioning
confidence: 99%
“…In 2019, Lu et al [27] discovered 1.5K open DoT resolvers over the Internet, and 25% of the used certificates by these resolvers were invalid. Others studied security and overhead of DoT [41], and DoT's resistance to traffic analysis attacks [35], [24].…”
Section: Introductionmentioning
confidence: 99%