2019 26th International Conference on Telecommunications (ICT) 2019
DOI: 10.1109/ict.2019.8798832
|View full text |Cite
|
Sign up to set email alerts
|

SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Other papers focus on inspecting DNS data obtained by passively mirroring DNS traffic at the application layer at a non-authoritative point in the DNS chain. This includes dump of DNS flows at application layer at an ISP [7], at a LAN gateway [26], at a campus gateway [17] and using DNS data from the Farsight database [16]. It should be noted that the Farsight database is built upon voluntary participation by resolver owners, and so it is unlikely that queries towards intentionally malicious resolvers would be represented in this database.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other papers focus on inspecting DNS data obtained by passively mirroring DNS traffic at the application layer at a non-authoritative point in the DNS chain. This includes dump of DNS flows at application layer at an ISP [7], at a LAN gateway [26], at a campus gateway [17] and using DNS data from the Farsight database [16]. It should be noted that the Farsight database is built upon voluntary participation by resolver owners, and so it is unlikely that queries towards intentionally malicious resolvers would be represented in this database.…”
Section: Related Workmentioning
confidence: 99%
“…The maliciousness of DNS responses are evaluated using various techniques, such as by use of open threat intelligence [20] [17], by probing HTTP/POP3/ IMAP/SMTP services on the resolved IPs [13] [26], by detecting differences in responses for similar queries [7] and by detecting NS record changes [16].…”
Section: Related Workmentioning
confidence: 99%