{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:16Z","timestamp":1773117076160,"version":"3.50.1"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,7,5]],"date-time":"2006-07-05T00:00:00Z","timestamp":1152057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,7,5]]},"abstract":"<jats:p>This work is motivated by the observation of one particular type of unwanted traffic -- dynamic DNS updates for private (RFC1918) addresses, which leaks to global network. This spurious traffic not only wastes network resources but also jeopardizes security and privacy of users.We first look at the magnitude of these updates on two independent AS112 [1] servers. We then analyze which operating systems are responsible for these updates by using three levels of signature techniques and find that over 97% of updates come from Windows systems. While newer versions of Windows OSes are more stringent in sending private DNS updates, we did not observe an overall decreasing trend due to this evolution. Users, software vendors, and system administrators can take steps to reduce this RFC1918 traffic. However, since most end users are unlikely to interfere with vendor default settings, it should be the responsibility of software vendor and system administrators to take positive action to fix this problem.<\/jats:p>","DOI":"10.1145\/1140086.1140098","type":"journal-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T17:00:26Z","timestamp":1153760426000},"page":"93-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The windows of pivate DNS updates"],"prefix":"10.1145","volume":"36","author":[{"given":"Andre","family":"Broido","sequence":"first","affiliation":[{"name":"Google, Inc. and CAIDA, SDSC"}]},{"given":"Young","family":"Hyun","sequence":"additional","affiliation":[{"name":"Google, Inc. and CAIDA, SDSC"}]},{"given":"Marina","family":"Fomenkov","sequence":"additional","affiliation":[{"name":"CAIDA, SDSC"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"CAIDA, SDSC"}]}],"member":"320","published-online":{"date-parts":[[2006,7,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"\"AS112 Project Home Page \" www.as112.net.  \"AS112 Project Home Page \" www.as112.net."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1918"},{"key":"e_1_2_1_3_1","volume-title":"Internet traffic classification using bayesian analysis,\" in ACM SIGMETRICS","author":"Broido A.","year":"2005"},{"key":"e_1_2_1_4_1","volume-title":"Dynamic Configuration of IPv4 Link-Local Addresses,\" draft-ietf-zeroconf-ipv4-linklocal-07.txt, 23rd","author":"Cheshire S.","year":"2002"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"R. Droms \"Dynamic host configuration protocol RFC2131 \" March 1997.  R. Droms \"Dynamic host configuration protocol RFC2131 \" March 1997.","DOI":"10.17487\/rfc2131"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S. Alexander and R.Droms \"DHCP options and BOOTP vendor extensions RFC2132 \" March 1997.   S. Alexander and R.Droms \"DHCP options and BOOTP vendor extensions RFC2132 \" March 1997.","DOI":"10.17487\/rfc2132"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"P. Vixie S.Thompson Y.Rekhter and J.Bound \"Dynamic updates in the Domain Name System RFC2136 \" April 1997.   P. Vixie S.Thompson Y.Rekhter and J.Bound \"Dynamic updates in the Domain Name System RFC2136 \" April 1997.","DOI":"10.17487\/rfc2136"},{"key":"e_1_2_1_8_1","volume-title":"kc claffy, and E.Nemeth, \"DNS Measurements at a Root Server,\" Globecom","author":"Brownlee N.","year":"2001"},{"key":"e_1_2_1_9_1","unstructured":"\"Root Server Technical Operations Association \" www.root-servers.org.  \"Root Server Technical Operations Association \" www.root-servers.org."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460130105"},{"key":"e_1_2_1_11_1","unstructured":"David Meyer e.a. \"University of Oregon Route Views Archive Project www.routeviews.org \"  David Meyer e.a. \"University of Oregon Route Views Archive Project www.routeviews.org \""},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris \"Domain names - implementation and specification RFC1035 \" November 1987.  P. Mockapetris \"Domain names - implementation and specification RFC1035 \" November 1987.","DOI":"10.17487\/rfc1035"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd \"Secret Key Establishment for DNS (TKEY RR) RFC2930 \" September 2000.   D. Eastlake 3rd \"Secret Key Establishment for DNS (TKEY RR) RFC2930 \" September 2000.","DOI":"10.17487\/rfc2930"},{"key":"e_1_2_1_14_1","volume-title":"RFC3645,\"","author":"Kwan S.","year":"2003"},{"key":"e_1_2_1_15_1","unstructured":"\"Microsoft Security Bulletin MS01-008 \" 2003 www.microsoft.com\/technet\/security\/bulletin\/MS01-008.mspx.  \"Microsoft Security Bulletin MS01-008 \" 2003 www.microsoft.com\/technet\/security\/bulletin\/MS01-008.mspx."},{"key":"e_1_2_1_16_1","unstructured":"Microsoft TechNet \"Windows 2000 DNS \" www.microsoft.com\/technet\/prodtechnol\/windows2000serv\/plan\/w2kdns2.mspx.  Microsoft TechNet \"Windows 2000 DNS \" www.microsoft.com\/technet\/prodtechnol\/windows2000serv\/plan\/w2kdns2.mspx."},{"key":"e_1_2_1_17_1","unstructured":"Microsoft TechNet \"How DHCP technology works \" Mar 2003 www.microsoft.com\/technet\/prodtechnol\/windowsserver2003\/library\/TechRef\/8006f246-2029-4bad-b9f0-4f31a56b0590.mspx.  Microsoft TechNet \"How DHCP technology works \" Mar 2003 www.microsoft.com\/technet\/prodtechnol\/windowsserver2003\/library\/TechRef\/8006f246-2029-4bad-b9f0-4f31a56b0590.mspx."},{"key":"e_1_2_1_18_1","unstructured":"Microsoft TechNet \"How to configure DNS dynamic updates in Wiindows Server 2003 \" Oct. 2005 support.microsoft.com\/default.aspx?scid=kb;en-us;816592.  Microsoft TechNet \"How to configure DNS dynamic updates in Wiindows Server 2003 \" Oct. 2005 support.microsoft.com\/default.aspx?scid=kb;en-us;816592."},{"key":"e_1_2_1_19_1","volume-title":"2.0.5","author":"Zalewsky M.","year":"2004"},{"key":"e_1_2_1_20_1","unstructured":"Microsoft \"TCP\/IP and NBT config parameters for Windows 2000 or Windows NT \" 2004 support.microsoft.com\/kb\/q120642.  Microsoft \"TCP\/IP and NBT config parameters for Windows 2000 or Windows NT \" 2004 support.microsoft.com\/kb\/q120642."},{"key":"e_1_2_1_21_1","unstructured":"Microsoft \"TCP\/IP and NBT config parameters for Windows XP \" 2004 support.microsoft.com\/kb\/314053\/EN-US.  Microsoft \"TCP\/IP and NBT config parameters for Windows XP \" 2004 support.microsoft.com\/kb\/314053\/EN-US."},{"key":"e_1_2_1_22_1","unstructured":"\"W3 schools browser statistics \" 2005 www.w3schools.com\/browsers\/browsers stats.asp.  \"W3 schools browser statistics \" 2005 www.w3schools.com\/browsers\/browsers stats.asp."},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"R. Beverly \"A Robust Classifier for Passive TCP\/IP Fingerprinting \" in PAM 2004.  R. Beverly \"A Robust Classifier for Passive TCP\/IP Fingerprinting \" in PAM 2004.","DOI":"10.1007\/978-3-540-24668-8_16"},{"key":"e_1_2_1_24_1","unstructured":"\"Internet Software Consortium \" www.isc.org.  \"Internet Software Consortium \" www.isc.org."},{"key":"e_1_2_1_25_1","unstructured":"\"Secure dynamic dns howto \" 2002 ops.ietf.org\/dns\/dynupd\/secure-ddns-howto.html.  \"Secure dynamic dns howto \" 2002 ops.ietf.org\/dns\/dynupd\/secure-ddns-howto.html."},{"key":"e_1_2_1_26_1","unstructured":"\"How to Disable Dynamic DNS Updates on Windows Systems \" www.caida.org\/research\/dns\/disable dns updates.xml.  \"How to Disable Dynamic DNS Updates on Windows Systems \" www.caida.org\/research\/dns\/disable dns updates.xml."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140086.1140098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1140086.1140098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:32Z","timestamp":1750259192000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140086.1140098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,5]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,7,5]]}},"alternative-id":["10.1145\/1140086.1140098"],"URL":"https:\/\/doi.org\/10.1145\/1140086.1140098","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2006,7,5]]},"assertion":[{"value":"2006-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}