{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:52:57Z","timestamp":1774965177424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405881","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"465-478","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Akamai DNS"],"prefix":"10.1145","author":[{"given":"Kyle","family":"Schomp","sequence":"first","affiliation":[{"name":"Akamai Technologies"}]},{"given":"Onkar","family":"Bhardwaj","sequence":"additional","affiliation":[{"name":"Akamai Technologies"}]},{"given":"Eymen","family":"Kurdoglu","sequence":"additional","affiliation":[{"name":"Akamai Technologies"}]},{"given":"Mashooq","family":"Muhaimen","sequence":"additional","affiliation":[{"name":"Akamai Technologies"}]},{"given":"Ramesh K.","family":"Sitaraman","sequence":"additional","affiliation":[{"name":"Akamai Technologies and University of Massachusetts Amherst"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. DNS Camel Viewer. (2020). https:\/\/powerdns.org\/dns-camel\/  2020. DNS Camel Viewer. (2020). https:\/\/powerdns.org\/dns-camel\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879144"},{"key":"e_1_3_2_2_3_1","volume-title":"Retrieved","year":"2019","unstructured":"Akamai. 2019. EdgeScape. ( 2019 ). Retrieved December 2019 from https:\/\/developer.akamai.com\/edgescape Akamai. 2019. EdgeScape. (2019). Retrieved December 2019 from https:\/\/developer.akamai.com\/edgescape"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/777412.777437"},{"key":"e_1_3_2_2_5_1","volume-title":"The Shape of aBGP Update. (2011). Retrieved","author":"Asturiano Vasco","year":"2020","unstructured":"Vasco Asturiano . 2011. The Shape of aBGP Update. (2011). Retrieved January 2020 from https:\/\/labs.ripe.net\/Members\/vastur\/the-shape-of-a-bgp-update Vasco Asturiano. 2011. The Shape of aBGP Update. (2011). Retrieved January 2020 from https:\/\/labs.ripe.net\/Members\/vastur\/the-shape-of-a-bgp-update"},{"key":"e_1_3_2_2_6_1","unstructured":"Chris Baker. 2016. Dyn DDoS and the DNS. (2016).  Chris Baker. 2016. Dyn DDoS and the DNS. (2016)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815717"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500100"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452341"},{"key":"e_1_3_2_2_10_1","volume-title":"BGP Communities Attribute. RFC 1997","author":"Chandra R.","year":"1997","unstructured":"R. Chandra , P. Traina , and T. Li . 1996 . BGP Communities Attribute. RFC 1997 . https:\/\/tools.ietf.org\/html\/rfc 1997 R. Chandra, P. Traina, and T. Li. 1996. BGP Communities Attribute. RFC 1997. https:\/\/tools.ietf.org\/html\/rfc1997"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787500"},{"key":"e_1_3_2_2_12_1","volume-title":"Retrieved","author":"Public Recursive Resolver Cloudflare","year":"2019","unstructured":"Cloudflare. 2019. Cloudflare 1.1.1.1 Public Recursive Resolver . ( 2019 ). Retrieved June 2019 from https:\/\/1.1.1.1\/ Cloudflare. 2019. Cloudflare 1.1.1.1 Public Recursive Resolver. (2019). Retrieved June 2019 from https:\/\/1.1.1.1\/"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"C. Contavalli W. van der Gaast D. Lawrence and W. Kumari. 2016. Client Subnet in DNS Queries. RFC 7871. https:\/\/tools.ietf.org\/html\/rfc7871  C. Contavalli W. van der Gaast D. Lawrence and W. Kumari. 2016. Client Subnet in DNS Queries. RFC 7871. https:\/\/tools.ietf.org\/html\/rfc7871","DOI":"10.17487\/RFC7871"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_14"},{"key":"e_1_3_2_2_16_1","volume-title":"Broad and Load-Aware Anycast Mapping with Verfploeter. In ACM Internet Measurement Conference.","author":"De Vries Wouter B","year":"2017","unstructured":"Wouter B De Vries , Ricardo de O Schmidt , Wes Hardaker , John Heidemann , Pieter-Tjerk de Boer , and Aiko Pras . 2017 . Broad and Load-Aware Anycast Mapping with Verfploeter. In ACM Internet Measurement Conference. Wouter B De Vries, Ricardo de O Schmidt, Wes Hardaker, John Heidemann, Pieter-Tjerk de Boer, and Aiko Pras. 2017. Broad and Load-Aware Anycast Mapping with Verfploeter. In ACM Internet Measurement Conference."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486018"},{"key":"e_1_3_2_2_18_1","volume-title":"Google Public DNS. (2019). Retrieved","year":"2019","unstructured":"Google. 2019. Google Public DNS. (2019). Retrieved June 2019 from https:\/\/developers.google.com\/speed\/public-dns\/ Google. 2019. Google Public DNS. (2019). Retrieved June 2019 from https:\/\/developers.google.com\/speed\/public-dns\/"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. https:\/\/tools.ietf.org\/html\/rfc8484  P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. https:\/\/tools.ietf.org\/html\/rfc8484","DOI":"10.17487\/RFC8484"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"C. Hopps. 2000. Analysis of an Equal-Cost Multi-Path Algorithm. RFC 2992. https:\/\/tools.ietf.org\/html\/rfc2992  C. Hopps. 2000. Analysis of an Equal-Cost Multi-Path Algorithm. RFC 2992. https:\/\/tools.ietf.org\/html\/rfc2992","DOI":"10.17487\/rfc2992"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. https:\/\/tools.ietf.org\/html\/rfc7858  Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. https:\/\/tools.ietf.org\/html\/rfc7858","DOI":"10.17487\/RFC7858"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"e_1_3_2_2_23_1","volume-title":"International Workshop on Critical Information Infrastructures Security. Springer, 185--196","author":"Kambourakis Georgios","year":"2007","unstructured":"Georgios Kambourakis , Tassos Moschos , Dimitris Geneiatakis , and Stefanos Gritzalis . 2007 . Detecting DNS amplification attacks . In International Workshop on Critical Information Infrastructures Security. Springer, 185--196 . Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, and Stefanos Gritzalis. 2007. Detecting DNS amplification attacks. In International Workshop on Critical Information Infrastructures Security. Springer, 185--196."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.832956"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815683"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347428"},{"key":"e_1_3_2_2_28_1","volume-title":"2010 IEEE Network Operations and Management Symposium-NOMS","author":"Lee Bu-Sung","year":"2010","unstructured":"Bu-Sung Lee , Yu Shyang Tan , Yuji Sekiya , Atsushi Narishige , and Susumu Date . 2010 . Availability and Effectiveness of Root DNS servers: A long term study . In 2010 IEEE Network Operations and Management Symposium-NOMS 2010. IEEE, 862--865. Bu-Sung Lee, Yu Shyang Tan, Yuji Sekiya, Atsushi Narishige, and Susumu Date. 2010. Availability and Effectiveness of Root DNS servers: A long term study. In 2010 IEEE Network Operations and Management Symposium-NOMS 2010. IEEE, 862--865."},{"key":"e_1_3_2_2_29_1","volume-title":"Hoenes","author":"Lewis E.","year":"2010","unstructured":"E. Lewis and Ed. A. Hoenes . 2010 . DNS Zone Transfer Protocol (AXFR). RFC 5936. https:\/\/tools.ietf.org\/html\/rfc5936 E. Lewis and Ed. A. Hoenes. 2010. DNS Zone Transfer Protocol (AXFR). RFC 5936. https:\/\/tools.ietf.org\/html\/rfc5936"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355573"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain names - implementation and specification. STD 13. https:\/\/tools.ietf.org\/html\/rfc1035  P. Mockapetris. 1987. Domain names - implementation and specification. STD 13. https:\/\/tools.ietf.org\/html\/rfc1035","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987446"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131366"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355593"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028792"},{"key":"e_1_3_2_2_38_1","volume-title":"Behavioral Analysis of Open DNS Resolvers. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 493--504","author":"Park Jeman","year":"2019","unstructured":"Jeman Park , Aminollah Khormali , Manar Mohaisen , and Aziz Mohaisen . 2019 . Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 493--504 . Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen. 2019. Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 493--504."},{"key":"e_1_3_2_2_39_1","volume-title":"Quad9 DNS Service. (2019). Retrieved","year":"2019","unstructured":"Quad9. 2019. Quad9 DNS Service. (2019). Retrieved June 2019 from https:\/\/www.quad9.net\/ Quad9. 2019. Quad9 DNS Service. (2019). Retrieved June 2019 from https:\/\/www.quad9.net\/"},{"key":"e_1_3_2_2_40_1","volume-title":"A Border Gateway Protocol 4 (BGP-4). RFC 4271. (Jan","author":"Rekhter Yakov","year":"2006","unstructured":"Yakov Rekhter , Susan Hares , and Tony Li. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271. (Jan . 2006 ). https:\/\/doi.org\/10.17487\/RFC4271 Yakov Rekhter, Susan Hares, and Tony Li. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271. (Jan. 2006). https:\/\/doi.org\/10.17487\/RFC4271"},{"key":"e_1_3_2_2_41_1","volume-title":"Retrieved","author":"Atlas RIPE.","year":"2019","unstructured":"RIPE. 2019. Atlas . ( 2019 ). Retrieved January 2020 from https:\/\/atlas.ripe.net\/ RIPE. 2019. Atlas. (2019). Retrieved January 2020 from https:\/\/atlas.ripe.net\/"},{"key":"e_1_3_2_2_42_1","volume-title":"Atlas API v2 manual: Base Attributes. (2019). Retrieved","author":"RIPE.","year":"2020","unstructured":"RIPE. 2019. Atlas API v2 manual: Base Attributes. (2019). Retrieved June 2020 from https:\/\/atlas.ripe.net\/docs\/api\/v2\/manual\/measurements\/types\/base_attributes.html RIPE. 2019. Atlas API v2 manual: Base Attributes. (2019). Retrieved June 2020 from https:\/\/atlas.ripe.net\/docs\/api\/v2\/manual\/measurements\/types\/base_attributes.html"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2006.286248"},{"key":"e_1_3_2_2_44_1","volume-title":"DNS Recursive Resolver Delegation Selection in the Wild. (2019). Retrieved","author":"Schomp Kyle","year":"2019","unstructured":"Kyle Schomp . 2019. DNS Recursive Resolver Delegation Selection in the Wild. (2019). Retrieved May 2019 from https:\/\/indico.dns-oarc.net\/event\/31\/contributions\/676\/ Kyle Schomp. 2019. DNS Recursive Resolver Delegation Selection in the Wild. (2019). Retrieved May 2019 from https:\/\/indico.dns-oarc.net\/event\/31\/contributions\/676\/"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673881"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504734"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_21"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_20"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341617.3326145"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916678"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663731"},{"key":"e_1_3_2_2_52_1","volume-title":"Latest Internet Plague: Random Subdomain Attacks. (2014). Retrieved","author":"Weber Ralf","year":"2019","unstructured":"Ralf Weber . 2014. Latest Internet Plague: Random Subdomain Attacks. (2014). Retrieved May 2019 from https:\/\/indico.uknof.org.uk\/event\/31\/contributions\/349\/ Ralf Weber. 2014. Latest Internet Plague: Random Subdomain Attacks. (2014). Retrieved May 2019 from https:\/\/indico.uknof.org.uk\/event\/31\/contributions\/349\/"},{"key":"e_1_3_2_2_53_1","volume-title":"Long Term Analysis of Root Server System Performance Using RIPE Atlas Data. (2019). Retrieved","author":"Wessels Duane","year":"2019","unstructured":"Duane Wessels . 2019. Long Term Analysis of Root Server System Performance Using RIPE Atlas Data. (2019). Retrieved Nov 2019 from https:\/\/indico.dns-oarc.net\/event\/32\/contributions\/713\/ Duane Wessels. 2019. Long Term Analysis of Root Server System Performance Using RIPE Atlas Data. (2019). Retrieved Nov 2019 from https:\/\/indico.dns-oarc.net\/event\/32\/contributions\/713\/"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230576"},{"key":"e_1_3_2_2_55_1","unstructured":"Bill Woodcock. 2016. Best Practices in DNS Service-Provision Architecture. In ICANN 55. ICANN.  Bill Woodcock. 2016. Best Practices in DNS Service-Provision Architecture. In ICANN 55. ICANN."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185387"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA","acronym":"SIGCOMM '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405881"}},"subtitle":["Providing Authoritative Answers to the World's Queries"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":56,"alternative-id":["10.1145\/3387514.3405881","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405881","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}