{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:42:31Z","timestamp":1752982951020,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1455770.1455796","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"189-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Mitigating DNS DoS attacks"],"prefix":"10.1145","author":[{"given":"Hitesh","family":"Ballani","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Paul","family":"Francis","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"},{"key":"e_1_3_2_1_2_1","volume-title":"Nov","author":"Ballani H.","year":"2006","unstructured":"H. Ballani and P. Francis , \" A Simple Approach to DNS DoS Mitigation,\" in Proc. of workshop on Hot Topics in Networks , Nov 2006 . H. Ballani and P. Francis, \"A Simple Approach to DNS DoS Mitigation,\" in Proc. of workshop on Hot Topics in Networks, Nov 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"Domain Name System Tools","author":"Bernstein D. J.","year":"2008","unstructured":"D. J. Bernstein , \"djbdns : Domain Name System Tools ,\" Apr 2008 , http:\/\/cr.yp.to\/djbdns.html. D. J. Bernstein, \"djbdns: Domain Name System Tools,\" Apr 2008, http:\/\/cr.yp.to\/djbdns.html."},{"key":"e_1_3_2_1_4_1","volume-title":"k claffy, and E. Nemeth, \"DNS Measurements at a Root Server,\" in Proc. of Globecom","author":"Brownlee N.","year":"2001","unstructured":"N. Brownlee , k claffy, and E. Nemeth, \"DNS Measurements at a Root Server,\" in Proc. of Globecom , 2001 . N. Brownlee, k claffy, and E. Nemeth, \"DNS Measurements at a Root Server,\" in Proc. of Globecom, 2001."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_6_1","volume-title":"Proactive Caching of DNS Records: Addressing a Performance Bottleneck,\" in Proc. of Symposium on Applications and the Internet","author":"Cohen E.","year":"2001","unstructured":"E. Cohen and H. Kaplan , \" Proactive Caching of DNS Records: Addressing a Performance Bottleneck,\" in Proc. of Symposium on Applications and the Internet , 2001 . E. Cohen and H. Kaplan, \"Proactive Caching of DNS Records: Addressing a Performance Bottleneck,\" in Proc. of Symposium on Applications and the Internet, 2001."},{"key":"e_1_3_2_1_7_1","volume-title":"Serving DNS using a Peer-to-Peer Lookup Service,\" in Proc. of IPTPS","author":"Cox R.","year":"2002","unstructured":"R. Cox , A. Muthitacharoen , and R. T. Morris , \" Serving DNS using a Peer-to-Peer Lookup Service,\" in Proc. of IPTPS , 2002 . R. Cox, A. Muthitacharoen, and R. T. Morris, \"Serving DNS using a Peer-to-Peer Lookup Service,\" in Proc. of IPTPS, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096538"},{"key":"e_1_3_2_1_9_1","volume-title":"The Case for Pushing DNS,\" in Proc. of Hotnets-IV","author":"Handley M.","year":"2005","unstructured":"M. Handley and A. Greenhalgh , \" The Case for Pushing DNS,\" in Proc. of Hotnets-IV , 2005 . M. Handley and A. Greenhalgh, \"The Case for Pushing DNS,\" in Proc. of Hotnets-IV, 2005."},{"key":"e_1_3_2_1_10_1","unstructured":"T. Hardy \"RFC 3258 -- Distributing Authoritative Name Servers via Shared Unicast Addresses \" April 2002.  T. Hardy \"RFC 3258 -- Distributing Authoritative Name Servers via Shared Unicast Addresses \" April 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.803905"},{"key":"e_1_3_2_1_12_1","volume-title":"A Replicated Architecture for the Domain Name System,\" in Proc. of INFOCOM","author":"Kangasharju J.","year":"2000","unstructured":"J. Kangasharju and K. W. Ross , \" A Replicated Architecture for the Domain Name System,\" in Proc. of INFOCOM , 2000 . J. Kangasharju and K. W. Ross, \"A Replicated Architecture for the Domain Name System,\" in Proc. of INFOCOM, 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138877"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_1_15_1","volume-title":"Service placement in a shared wide-area platform,\" in phProc. of the USENIX '06 Annual Technical Conference","author":"Oppenheimer D.","year":"2006","unstructured":"D. Oppenheimer , B. Chun , D. Patterson , A. C. Snoeren , and A. Vahdat , \" Service placement in a shared wide-area platform,\" in phProc. of the USENIX '06 Annual Technical Conference , 2006 . D. Oppenheimer, B. Chun, D. Patterson, A. C. Snoeren, and A. Vahdat, \"Service placement in a shared wide-area platform,\" in phProc. of the USENIX '06 Annual Technical Conference, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028790"},{"key":"e_1_3_2_1_17_1","volume-title":"June","author":"Pappas V.","year":"2006","unstructured":"V. Pappas , B. Zhang , E. Osterweil , D. Massey , and L. Zhang , \" Improving DNS Service Availability by Using Long TTLs,\" draft-pappas-dnsop-long-ttl-02 , June 2006 . V. Pappas, B. Zhang, E. Osterweil, D. Massey, and L. Zhang, \"Improving DNS Service Availability by Using Long TTLs,\" draft-pappas-dnsop-long-ttl-02, June 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.42"},{"key":"e_1_3_2_1_19_1","volume-title":"CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups,\" in Proc. of USENIX OSDI","author":"Park K.","year":"2004","unstructured":"K. Park , V. Pai , L. Peterson , and Z. Wang , \" CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups,\" in Proc. of USENIX OSDI , 2004 . K. Park, V. Pai, L. Peterson, and Z. Wang, \"CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups,\" in Proc. of USENIX OSDI, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.54"},{"key":"e_1_3_2_1_21_1","volume-title":"Large Distributed Systems (WORLDS)","author":"Poole L.","year":"2006","unstructured":"L. Poole and V. S. Pai , \" ConfiDNS: leveraging scale and history to improve DNS security,\" in Proc. of the 3rd USENIX Workshop on Real , Large Distributed Systems (WORLDS) , 2006 . L. Poole and V. S. Pai, \"ConfiDNS: leveraging scale and history to improve DNS security,\" in Proc. of the 3rd USENIX Workshop on Real, Large Distributed Systems (WORLDS), 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"e_1_3_2_1_23_1","volume-title":"dissertation","author":"Soring D.","year":"2002","unstructured":"D. Soring , \"Using lightweight checkpoint\/recovery to improve the availability and designability of shared memory multiprocessors,\" Ph. D. dissertation , University of Wisconsin-Madison , 2002 . D. Soring, \"Using lightweight checkpoint\/recovery to improve the availability and designability of shared memory multiprocessors,\" Ph.D. dissertation, University of Wisconsin-Madison, 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"Overlook: Scalable Name Service on an Overlay Network,\" in Proc. of ICDCS","author":"Theimer M.","year":"2002","unstructured":"M. Theimer and M. B. Jones , \" Overlook: Scalable Name Service on an Overlay Network,\" in Proc. of ICDCS , 2002 . M. Theimer and M. B. Jones, \"Overlook: Scalable Name Service on an Overlay Network,\" in Proc. of ICDCS, 2002."},{"key":"e_1_3_2_1_25_1","volume-title":"HOURS: Achieving DoS Resilience in an Open Service Hierarchy,\" in Proc. of Conference on Dependable Systems and Networks (DSN)","author":"Yang H.","year":"2004","unstructured":"H. Yang , H. Luo , Y. Yang , S. Lu , and L. Zhang , \" HOURS: Achieving DoS Resilience in an Open Service Hierarchy,\" in Proc. of Conference on Dependable Systems and Networks (DSN) , 2004 . H. Yang, H. Luo, Y. Yang, S. Lu, and L. Zhang, \"HOURS: Achieving DoS Resilience in an Open Service Hierarchy,\" in Proc. of Conference on Dependable Systems and Networks (DSN), 2004."},{"key":"e_1_3_2_1_26_1","unstructured":"\"Microsoft DDoS Attack NetworkWorld \" Jan 2001 http:\/\/www.networkworld.com\/news\/2001\/0125mshacked.html.  \"Microsoft DDoS Attack NetworkWorld \" Jan 2001 http:\/\/www.networkworld.com\/news\/2001\/0125mshacked.html."},{"key":"e_1_3_2_1_27_1","volume-title":"RIPE Mail Archive","author":"Attack S","year":"2002","unstructured":"\"Root Server DDo S Attack , RIPE Mail Archive ,\" Nov 2002 , https:\/\/www.ripe.net\/ripe\/maillists\/archives\/eof-list\/2002\/msg00009.html. \"Root Server DDoS Attack, RIPE Mail Archive,\" Nov 2002, https:\/\/www.ripe.net\/ripe\/maillists\/archives\/eof-list\/2002\/msg00009.html."},{"key":"e_1_3_2_1_28_1","volume-title":"Internet Security News","author":"Attack S","year":"2004","unstructured":"\"Akamai DDo S Attack , Internet Security News ,\" Jun 2004 , http:\/\/www.landfield.com\/isn\/mail-archive\/2004\/Jun\/0088.html. \"Akamai DDoS Attack, Internet Security News,\" Jun 2004, http:\/\/www.landfield.com\/isn\/mail-archive\/2004\/Jun\/0088.html."},{"key":"e_1_3_2_1_29_1","unstructured":"\"UltrDNS DDoS Attack Washington Post \" May 2005 http:\/\/blog.washingtonpost.com\/securityfix\/2006\/05\/blue_security_surrenders_but_s.html.  \"UltrDNS DDoS Attack Washington Post \" May 2005 http:\/\/blog.washingtonpost.com\/securityfix\/2006\/05\/blue_security_surrenders_but_s.html."},{"key":"e_1_3_2_1_30_1","unstructured":"\"CISCO DNSSEC page \" Aug 2006 http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_7-2\/dnssec.html.  \"CISCO DNSSEC page \" Aug 2006 http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_7-2\/dnssec.html."},{"key":"e_1_3_2_1_31_1","unstructured":"\"Internet Systems Consortium \" Aug 2006 http:\/\/www.isc.org\/.  \"Internet Systems Consortium \" Aug 2006 http:\/\/www.isc.org\/."},{"volume-title":"Providers Ignoring DNS TTL?","year":"2006","key":"e_1_3_2_1_32_1","unstructured":"\"SLASHDOT : Providers Ignoring DNS TTL? \" Aug 2006 , http:\/\/ask.slashdot.org\/article.pl?sid=05\/04\/18\/198259&tid=95&tid=128&tid=4. \"SLASHDOT: Providers Ignoring DNS TTL?\" Aug 2006, http:\/\/ask.slashdot.org\/article.pl?sid=05\/04\/18\/198259&tid=95&tid=128&tid=4."},{"key":"e_1_3_2_1_33_1","unstructured":"\"SiteKey at Bank of America \" Jul 2007 http:\/\/www.bankofamerica.com\/privacy\/sitekey\/.  \"SiteKey at Bank of America \" Jul 2007 http:\/\/www.bankofamerica.com\/privacy\/sitekey\/."},{"key":"e_1_3_2_1_34_1","unstructured":"\"DNS -- What do big sites do?\" Aug 2008 http:\/\/forum.powweb.com\/archive\/index.php\/t-54961.html.  \"DNS -- What do big sites do?\" Aug 2008 http:\/\/forum.powweb.com\/archive\/index.php\/t-54961.html."},{"key":"e_1_3_2_1_35_1","unstructured":"\"nonamed -- Man page \" Aug 2008 http:\/\/www.minix3.org\/previous-versions\/Intel-2.0.3\/wwwman\/man8\/nonamed.8.html.  \"nonamed -- Man page \" Aug 2008 http:\/\/www.minix3.org\/previous-versions\/Intel-2.0.3\/wwwman\/man8\/nonamed.8.html."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 15th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1455770.1455796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:14Z","timestamp":1750287254000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":35,"alternative-id":["10.1145\/1455770.1455796","10.1145\/1455770"],"URL":"https:\/\/doi.org\/10.1145\/1455770.1455796","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}