{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:40:24Z","timestamp":1753602024811},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319082"},{"type":"electronic","value":"9783642319099"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31909-9_17","type":"book-chapter","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T07:23:23Z","timestamp":1348298603000},"page":"303-318","source":"Crossref","is-referenced-by-count":4,"title":["Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning"],"prefix":"10.1007","author":[{"given":"Shimrit","family":"Tzur-David","sequence":"first","affiliation":[]},{"given":"Kiril","family":"Lashchiver","sequence":"additional","affiliation":[]},{"given":"Danny","family":"Dolev","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Anker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Dns, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc1034.txt"},{"key":"17_CR2","unstructured":"Dns, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc1035.txt"},{"key":"17_CR3","unstructured":"Schuba, C.: Addressing weaknesses in the domain name system protocol. Master\u2019s thesis (August 1993)"},{"key":"17_CR4","unstructured":"Hyatt, R.: Keeping dns trustworthy. The ISSA Journal, 37\u201338 (2006)"},{"key":"17_CR5","unstructured":"Bernstein, D.J.: Dnscurve, \n                    \n                      http:\/\/dnscurve.org\/"},{"key":"17_CR6","unstructured":"Sainstitute: Attacking the dns protocol security paper (2003)"},{"key":"17_CR7","unstructured":"Terry, D.B., Painter, M., Riggle, D.W., Zhou, S.: The berkeley internet name domain server. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/CSD-84-182 (May 1984), \n                    \n                      http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1984\/5957.html"},{"key":"17_CR8","unstructured":"Klein, A.: Bind 9 dns cache poisoning (2007)"},{"key":"17_CR9","unstructured":"Stewart, J.: Dns cache poisoning - the next generation (2003)"},{"key":"17_CR10","unstructured":"Kaminsky, D.: The kamisky bug, \n                    \n                      http:\/\/dankaminsky.com\/"},{"key":"17_CR11","unstructured":"Internet Systems\u00a0Consortium, I.: \u201cBind 9\u201d (2003), \n                    \n                      http:\/\/www.bind9.net\/"},{"key":"17_CR12","unstructured":"Powerdns (2011), \n                    \n                      http:\/\/doc.powerdns.com\/"},{"key":"17_CR13","unstructured":"Vixie, P., Dagon, D.: Use of bit 0x20 in dns labels to improve transaction identity (2008), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-vixie-dnsext-dns0x20-00"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/1455770.1455798","volume-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008","author":"D. Dagon","year":"2008","unstructured":"Dagon, D., Antonakakis, M., Vixie, P., Jinmei, T., Lee, W.: Increased dns forgery resistance through 0x20-bit encoding: security via leet queries. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 211\u2013222. ACM, New York (2008), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1455770.1455798"},{"key":"17_CR15","unstructured":"Perdisci, R., Antonakakis, M., Lee, W.: Solving the dns cache poisoning problem without changing the protocol (2008)"},{"key":"17_CR16","unstructured":"Perdisci, R., Antonakakis, M., Luo, X., Lee, W.: Wsec dns: Protecting recursive dns resolvers from poisoning attacks. In: DSN, pp. 3\u201312. IEEE (2009), \n                    \n                      http:\/\/dblp.uni-trier.de\/db\/conf\/dsn\/dsn2009.html#PerdisciALL09"},{"key":"17_CR17","unstructured":"Hoy, J.G.: Measures for making dns more resilient against forged answers (2008), \n                    \n                      http:\/\/www.jhsoft.com\/dns-xqid.html"},{"key":"17_CR18","unstructured":"Hubert, A., van Mook, R.: Anti dns spoofing - extended query id, xqid (2008), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-ietf-dnsext-forgery-resilience-10"},{"key":"17_CR19","unstructured":"djbdns (2004), \n                    \n                      http:\/\/cr.yp.to\/djbdns.html"},{"key":"17_CR20","unstructured":"Dnssec, \n                    \n                      http:\/\/www.dnssec.net\/"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Atkins, D., Austein, R.: Threat analysis of the domain name system, dns (2004), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3833.txt","DOI":"10.17487\/rfc3833"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/ARES.2007.139","volume-title":"Proceedings of the The Second International Conference on Availability, Reliability and Security","author":"S. Ariyapperuma","year":"2007","unstructured":"Ariyapperuma, S., Mitchell, C.J.: Security vulnerabilities in dns and dnssec. In: Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 335\u2013342. IEEE Computer Society, Washington, DC (2007), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1249254.1250514"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31909-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T13:54:33Z","timestamp":1557237273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31909-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319082","9783642319099"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31909-9_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}