A survey on DNS encryption: Current development, malware misuse, and inference techniques
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
Summary of DNS over HTTPS abuse
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …
remediate privacy issues regarding the plain text transmission of the DNS protocol …
A longitudinal and comprehensive measurement of dns strict privacy
The DNS privacy protection mechanisms, DNS over TLS (DoT) and DNS over HTTPS (DoH),
only work correctly if both the server and client support the Strict Privacy profile and no …
only work correctly if both the server and client support the Strict Privacy profile and no …
Retina: analyzing 100GbE traffic on commodity hardware
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …
Certainty: Detecting dns manipulation at scale using tls certificates
DNS manipulation is an increasingly common technique used by censors and other network
adversaries to prevent users from accessing restricted Internet resources and hijack their …
adversaries to prevent users from accessing restricted Internet resources and hijack their …
Recent trends on privacy-preserving technologies under standardization at the IETF
End-users are concerned about protecting the privacy of their sensitive personal data that
are generated while working on information systems. This extends to both the data they …
are generated while working on information systems. This extends to both the data they …
Measurement for encrypted open resolvers: Applications and security
Encrypted DNS has been proposed to mitigate the vulnerability of traditional DNS to
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …
Encrypted DNS: The good, the bad and the moot
G Kambourakis, G Karopoulos - Computer Fraud & Security, 2022 - magonlinelibrary.com
Every connection to an Internet service requires a Domain Name System (DNS) lookup.
Nevertheless, similar to other protocols used since the early days of the Internet, DNS was …
Nevertheless, similar to other protocols used since the early days of the Internet, DNS was …
[HTML][HTML] NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification
Network traffic monitoring based on IP Flows is a standard monitoring approach that can be
deployed to various network infrastructures, even the large ISP networks connecting millions …
deployed to various network infrastructures, even the large ISP networks connecting millions …
A Survey on Consumer IoT Traffic: Security and Privacy
Y Jia, Y Song, Z Liu, Q Tan, Y Song, Y Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Although CIoT has improved the convenience of daily activities, it also introduces new
security and privacy concerns. Network traffic analysis, a common technique employed by …
security and privacy concerns. Network traffic analysis, a common technique employed by …