2019 IEEE International Symposium on Measurements &Amp; Networking (M&N) 2019
DOI: 10.1109/iwmn.2019.8805011
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Evolution and Adoption of Top Level Domains and DNSSEC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Many empirical studies on various types of network traffic also validate the presence of power-law characteristics [3]. Analysis of traffic patterns on cloud platforms [4], DNS servers [5], video streams [6], web and peer to peer networks [7], wifi network [8], satellite network [9] time between consecutive anomalies [10] establish the existence of power-law behavior. One main proposition of these studies is that the inter-arrival time of packets or requests follow power law distribution like Pareto.…”
Section: Introductionmentioning
confidence: 86%
“…Many empirical studies on various types of network traffic also validate the presence of power-law characteristics [3]. Analysis of traffic patterns on cloud platforms [4], DNS servers [5], video streams [6], web and peer to peer networks [7], wifi network [8], satellite network [9] time between consecutive anomalies [10] establish the existence of power-law behavior. One main proposition of these studies is that the inter-arrival time of packets or requests follow power law distribution like Pareto.…”
Section: Introductionmentioning
confidence: 86%
“…DNS is an Internet service that maps human-readable names into machine-readable IP addresses [15], [16]. In DNS-based solutions, authoritative nameservers monitor the condition of application servers, e.g., server load, and keep track of the routing information from the servers to the rest of the Internet, e.g., end-to-end latency.…”
Section: Dns-based Solutionsmentioning
confidence: 99%
“…A DNSSEC-enabled client may thus detect and discard fake DNS data provided by an attacker that impersonates the nameserver of the zone of those data (or that provides those fake data in the form of cached responses). DNSSEC deployment and maintenance is complex [60,61,62] and many operators are reluctant to adopt this technology because its overall costs tend to be perceived as greater than its benefits (a concise yet highly useful summary of this issue can be found in [63]). DNSSEC is currently deployed at a small percentage of all the DNS zones and its deployment is uncommon even in zones highly ranked in terms of user traffic [64].…”
Section: Dns Security Extensions (Dnssec)mentioning
confidence: 99%