{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:43:43Z","timestamp":1770515023419,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737514","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"page":"1153-1161","source":"Crossref","is-referenced-by-count":34,"title":["Collaborative Client-Side DNS Cache Poisoning Attack"],"prefix":"10.1109","author":[{"given":"Fatemah","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Jie","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"Top sites in United States"},{"key":"ref38","year":"2018","journal-title":"Mac OS X\/Darwin man pages setrlimit (2)"},{"key":"ref33","author":"mockapetris","year":"2018","journal-title":"State of IP Spoofing"},{"key":"ref32","author":"beverly","year":"2013","journal-title":"Initial Longitudinal Analysis of IP Source Spoofing Capability on the Internet"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"ref30","author":"killalea","year":"2000","journal-title":"RFC 3013 - Recommended Internet Service Provider Security Services and Procedures"},{"key":"ref37","year":"2018","journal-title":"setrlimit(2) - Linux man page"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1516539.1516541"},{"key":"ref10","article-title":"Dns and bind security issues","author":"vixie","year":"1995","journal-title":"Usenix Security"},{"key":"ref40","author":"kirkland","year":"0","journal-title":"Ubuntu Manpage systemd-resolved service system-resolved - Network Name Resolution"},{"key":"ref11","author":"klein","year":"2007","journal-title":"OpenBSD DNS Cache Poisoning and Multiple O\/S Predictable IP ID Vulnerability"},{"key":"ref12","author":"klein","year":"2007","journal-title":"Windows DNS Server Cache Poisoning"},{"key":"ref13","author":"bernstein","year":"2002","journal-title":"&#x201D;dns forgery&#x201D;"},{"key":"ref14","author":"bernstein","year":"2008","journal-title":"The DNS random Library Interface"},{"key":"ref15","author":"hubert","year":"2009","journal-title":"RFC 5452 Measures for making DNS more resilient against forged answers"},{"key":"ref16","author":"larson","year":"2011","journal-title":"RFC 6056 - Recommendations for Transport-Protocol Port Randomization"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4697"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682711"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.130"},{"key":"ref28","author":"denis","year":"2015","journal-title":"DNSCrypt"},{"key":"ref4","volume":"3","author":"klein","year":"2007","journal-title":"BIND 9 DNS Cache Poisoning"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7858"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1462148.1462150"},{"key":"ref6","author":"weiler","year":"2013","journal-title":"Rfc 6840 - clarifications and implementation notes for dns security (dnssec)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673881"},{"key":"ref5","year":"2012","journal-title":"Multiple DNS Implementations Vulnerable to Cache Poisoning"},{"key":"ref8","author":"arends","year":"2005","journal-title":"RFC 4035 - Threat Analysis of the Domain Name System (DNS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455798"},{"key":"ref2","article-title":"Black ops 2008: It&#x2019;s the end of the cache as we know it","author":"kaminsky","year":"2008","journal-title":"Black Hat USA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref1","author":"atkins","year":"2004","journal-title":"Threat Analysis of the Domain Name System (DNS) RFC 3833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_31"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_13"},{"key":"ref42","year":"2018","journal-title":"Use of DNSSEC Validation for World (XA)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270363"},{"key":"ref41","year":"2017","journal-title":"Dnsmasq"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057202"},{"key":"ref44","author":"altman","year":"2013","journal-title":"Statistics with Confidence Confidence Intervals and Statistical Guidelines"},{"key":"ref26","author":"hoffman","year":"2017","journal-title":"DNS queries over HTTPS"},{"key":"ref43","author":"brown","year":"2006","journal-title":"Linux Traffic Control Howto"},{"key":"ref25","year":"2018","journal-title":"TLD Zone File Statistics"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","location":"Paris, France","start":{"date-parts":[[2019,4,29]]},"end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737514.pdf?arnumber=8737514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:22Z","timestamp":1657854922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom.2019.8737514","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}