A survey on DNS encryption: Current development, malware misuse, and inference techniques

M Lyu, HH Gharakheili, V Sivaraman - ACM Computing Surveys, 2022 - dl.acm.org
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …

Summary of DNS over HTTPS abuse

K Hynek, D Vekshin, J Luxemburk, T Cejka… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …

A longitudinal and comprehensive measurement of dns strict privacy

R Li, X Jia, Z Zhang, J Shao, R Lu, J Lin… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
The DNS privacy protection mechanisms, DNS over TLS (DoT) and DNS over HTTPS (DoH),
only work correctly if both the server and client support the Strict Privacy profile and no …

Retina: analyzing 100GbE traffic on commodity hardware

G Wan, F Gong, T Barbette, Z Durumeric - Proceedings of the ACM …, 2022 - dl.acm.org
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …

Certainty: Detecting dns manipulation at scale using tls certificates

E Tsai, D Kumar, RS Raman, G Li, Y Eiger… - arXiv preprint arXiv …, 2023 - arxiv.org
DNS manipulation is an increasingly common technique used by censors and other network
adversaries to prevent users from accessing restricted Internet resources and hijack their …

Recent trends on privacy-preserving technologies under standardization at the IETF

P Dikshit, J Sengupta, V Bajpai - ACM SIGCOMM Computer …, 2023 - dl.acm.org
End-users are concerned about protecting the privacy of their sensitive personal data that
are generated while working on information systems. This extends to both the data they …

Measurement for encrypted open resolvers: Applications and security

M Luo, Y Yao, L Xin, Z Jiang, Q Wang, W Shi - Computer Networks, 2022 - Elsevier
Encrypted DNS has been proposed to mitigate the vulnerability of traditional DNS to
surveillance and tampering. Some encrypted DNS protocols, like DNS over HTTPS (DoH) …

Encrypted DNS: The good, the bad and the moot

G Kambourakis, G Karopoulos - Computer Fraud & Security, 2022 - magonlinelibrary.com
Every connection to an Internet service requires a Domain Name System (DNS) lookup.
Nevertheless, similar to other protocols used since the early days of the Internet, DNS was …

[HTML][HTML] NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification

J Koumar, K Hynek, J Pešek, T Čejka - Computer Networks, 2024 - Elsevier
Network traffic monitoring based on IP Flows is a standard monitoring approach that can be
deployed to various network infrastructures, even the large ISP networks connecting millions …

A Survey on Consumer IoT Traffic: Security and Privacy

Y Jia, Y Song, Z Liu, Q Tan, Y Song, Y Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Although CIoT has improved the convenience of daily activities, it also introduces new
security and privacy concerns. Network traffic analysis, a common technique employed by …