{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:25:42Z","timestamp":1725985542636},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811310553"},{"type":"electronic","value":"9789811310560"}],"license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1056-0_27","type":"book-chapter","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:30:31Z","timestamp":1532363431000},"page":"259-265","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A DNS RPZ Firewall and Current American DNS Practice"],"prefix":"10.1007","author":[{"given":"Norman","family":"Wilde","sequence":"first","affiliation":[]},{"given":"Lauren","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Travis","family":"Vaughn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","unstructured":"Hao S, Kantchelian A, Miller B, Paxson V, Feamster N (2016) PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (CCS\u201916). ACM, New York, NY, USA, pp 1568\u20131579. \nhttps:\/\/doi.org\/10.1145\/2976749.2978317","DOI":"10.1145\/2976749.2978317"},{"key":"27_CR2","unstructured":"Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS. In: Proceedings of the 19th USENIX conference on security (USENIX Security\u201910). USENIX Association, Berkeley, CA, USA"},{"key":"27_CR3","doi-asserted-by":"publisher","unstructured":"Shin S, Gu G (2010) Conficker and beyond: a large-scale empirical study. In: Proceedings of the 26th annual computer security applications conference (ACSAC\u201910). ACM, New York, NY, USA, pp 151\u2013160. \nhttps:\/\/doi.org\/10.1145\/1920261.1920285","DOI":"10.1145\/1920261.1920285"},{"key":"27_CR4","unstructured":"Jones L, Lopez R, Vaughn T, Wilde N (2017) Measuring the impact of DNS resource policy zones, Security and Software Engineering Research Center Technical Report S2ERC-TR-327, \nhttp:\/\/www.SERC.net\n\n, \nhttp:\/\/www.normanwilde.net\/publications\/TecRpt327\/index.html"},{"key":"27_CR5","unstructured":"Liu C, Albitz P (2009) DNS and BIND, 5th edn. O\u2019Reilly. Ebook ISBN 978-0-596-10572-3"},{"key":"27_CR6","unstructured":"DNS response policy zones. \nhttps:\/\/dnsrpz.info\/"},{"key":"27_CR7","unstructured":"Connery HM (2013) Response policy zones: history, overview, usage, and research. \nhttps:\/\/dnsrpz.info\/RPZ-History-Usage-Research.pdf"},{"issue":"2","key":"27_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2960409","volume":"19","author":"Babak Rahbarinia","year":"2016","unstructured":"Rahbarinia B, Perdisci R, Antonakakis M (2016) Efficient and accurate behavior-based tracking of malware-control domains in large ISP networks. ACM Trans Priv Secur 19(2). \nhttps:\/\/doi.org\/10.1145\/2960409","journal-title":"ACM Transactions on Privacy and Security"},{"key":"27_CR9","unstructured":"Vixie P, Schryver V (2010) DNS response policy zones (DNS RPZ), ISC-TN-2010-1-B3, Dec 2010 (Draft 3). https:\/\/ftp.isc.org\/isc\/dnsrpz\/isc-tn-2010-1.txt"},{"key":"27_CR10","unstructured":"Vixie P, Schryver V (2016) Response policy zones: draft-vixie-dns-rpz-00. \nhttps:\/\/tools.ietf.org\/html\/draft-vixie-dns-rpz-00"},{"key":"27_CR11","unstructured":"Global Cyber Alliance. Internet immunity: protecting users and networks via DNS. \nhttps:\/\/www.globalcyberalliance.org\/wp-content\/uploads\/GCA-DNS-infrastructure.pdf"},{"key":"27_CR12","unstructured":"Meisel M (2011) Top public DNS resolvers compared. \nhttp:\/\/www.circleid.com\/posts\/20110407_top_public_dns_resolvers_compared"},{"key":"27_CR13","unstructured":"Adblock plus. \nhttps:\/\/adblockplus.org\/"},{"key":"27_CR14","unstructured":"DNS-BH\u2014malware domain blocklist. \nhttp:\/\/www.malwaredomains.com\/"},{"key":"27_CR15","unstructured":"Quad9\u2014internet security & privacy in a few easy steps. \nhttps:\/\/quad9.net\/"},{"key":"27_CR16","unstructured":"How does built-in phishing and malware protection work. \nhttps:\/\/support.mozilla.org\/en-US\/kb\/how-does-phishing-and-malware-protection-work"},{"key":"27_CR17","unstructured":"Google safe browsing. \nhttps:\/\/safebrowsing.google.com\/"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1056-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:42:54Z","timestamp":1532364174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1056-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"ISBN":["9789811310553","9789811310560"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1056-0_27","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,7,24]]}}}