{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:46:21Z","timestamp":1775231181874,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["Cyber Security Creatieve industrie"],"award-info":[{"award-number":["Cyber Security Creatieve industrie"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423625","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"42-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Clouding up the Internet"],"prefix":"10.1145","author":[{"given":"Giovane C. M.","family":"Moura","sequence":"first","affiliation":[{"name":"SIDN Labs"}]},{"given":"Sebastian","family":"Castro","sequence":"additional","affiliation":[{"name":"InternetNZ"}]},{"given":"Wes","family":"Hardaker","sequence":"additional","affiliation":[{"name":"USC\/ISI"}]},{"given":"Maarten","family":"Wullink","sequence":"additional","affiliation":[{"name":"SIDN Labs"}]},{"given":"Cristian","family":"Hesselman","sequence":"additional","affiliation":[{"name":"University of Twente"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"1.1.1.1. 2018. The Internets Fastest Privacy-First DNS Resolver. https:\/\/1.1.1.1\/.https:\/\/1.1.1.1\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278541"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4033.txt","DOI":"10.17487\/rfc4033"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. Protocol Modifications for the DNS Security Extensions. RFC 4035. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4035.txt","DOI":"10.17487\/rfc4035"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"R. Arends R. Austein M. Larson D. Massey and S. Rose. 2005. Resource Records for the DNS Security Extensions. RFC 4034. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4034.txt","DOI":"10.17487\/rfc4034"},{"key":"e_1_3_2_2_6_1","unstructured":"J. Arkko. 2019. Centralised Architectures in Internet Infrastructure. Internet Draft. https:\/\/tools.ietf.org\/html\/draft-arkko-arch-infrastructure-centralisation-00"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2020.1740753"},{"key":"e_1_3_2_2_8_1","volume-title":"M and Huitema, C and Thomson, M. and Tantsura, J. and ten Oever, N.","author":"Tramme Jari","year":"2019","unstructured":"Arkko, Jari and Tramme, B. and Nottingham, M and Huitema, C and Thomson, M. and Tantsura, J. and ten Oever, N. 2019. Considerations on Internet Consolidation and the Internet Architecture. Internet Draft. https:\/\/tools.ietf.org\/html\/draft-arkko-iab-internet-consolidation-02"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"S. Bortzmeyer. 2016. DNS Query Name Minimisation to Improve Privacy. RFC 7816. IETF. http:\/\/tools.ietf.org\/rfc\/rfc7816.txt","DOI":"10.17487\/RFC7816"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452341"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"J. Damas M. Graff and P. Vixie. 2013. Extension Mechanisms for DNS (EDNS(0)). RFC 6891. IETF. http:\/\/tools.ietf.org\/rfc\/rfc6891.txt","DOI":"10.17487\/rfc6891"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506536"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_10"},{"key":"e_1_3_2_2_14_1","unstructured":"DNS OARC. 2020. DITL Traces and Analysis. https:\/\/www.dns-oarc.net\/index.php\/oarc\/data\/ditl\/."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355566"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"K. Fujiwara A. Kato and W. Kumari. 2017. Aggressive Use of DNSSEC-Validated Cache. RFC 8198. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8198.txt","DOI":"10.17487\/RFC8198"},{"key":"e_1_3_2_2_17_1","unstructured":"Google. 2019. Google Public DNS. https:\/\/developers.google.com\/speed\/public-dns\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Google. 2020. Google Public DNS: Frequently Asked Questions. https:\/\/developers.google.com\/speed\/public-dns\/faq"},{"key":"e_1_3_2_2_19_1","unstructured":"Wes Hardaker. [n.d.]. Whats in a name? https:\/\/blog.apnic.net\/2020\/04\/13\/whats-in-a-name\/ https:\/\/blog.apnic.net\/2020\/04\/13\/whats-in-a-name\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman A. Sullivan and K. Fujiwara. 2018. DNS Terminology. RFC 8499. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8499.txt","DOI":"10.17487\/RFC8499"},{"key":"e_1_3_2_2_21_1","unstructured":"ICANN. 2014. RSSAC002: RSSAC Advisory on Measurements of the Root Server System. https:\/\/www.icann.org\/en\/system\/files\/files\/rssac-002-measurements-root-20nov14-en.pdf."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"P. Johansson. 1999. IPv4 over IEEE 1394. RFC 2734. IETF. http:\/\/tools.ietf.org\/rfc\/rfc2734.txt","DOI":"10.17487\/rfc2734"},{"key":"e_1_3_2_2_23_1","volume-title":"Lash Out at Big Techs Leaders.","author":"Kang Cecilia","year":"2020","unstructured":"Cecilia Kang and David McCabe. 2020. Lawmakers, United in Their Ire, Lash Out at Big Techs Leaders. New York Times (July. 29 2020). https:\/\/www.nytimes.com\/2020\/07\/29\/technology\/big-tech-hearing-apple-amazon-facebook-google.html"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"D. McPherson D. Oran D. Thaler and E. Osterweil. 2014. Architectural Considerations of IP Anycast. RFC 7094. IETF. http:\/\/tools.ietf.org\/rfc\/rfc7094.txt","DOI":"10.17487\/rfc7094"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"P.V. Mockapetris. 1987. Domain names - concepts and facilities. RFC 1034. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1034.txt","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"P.V. Mockapetris. 1987. Domain names - implementation and specification. RFC 1035. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1035.txt","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987446"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355568"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131366"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015503"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"C. Partridge T. Mendez and W. Milliken. 1993. Host Anycasting Service. RFC 1546. IETF. http:\/\/tools.ietf.org\/rfc\/rfc1546.txt","DOI":"10.17487\/rfc1546"},{"key":"e_1_3_2_2_33_1","volume-title":"Hackers Used New Weapons to Disrupt Major Websites Across U.S. New York Times (Oct. 22","author":"Perlroth Nicole","year":"2016","unstructured":"Nicole Perlroth. 2016. Hackers Used New Weapons to Disrupt Major Websites Across U.S. New York Times (Oct. 22 2016), A1. http:\/\/www.nytimes.com\/2016\/10\/22\/business\/internet-problems-attack.html"},{"key":"e_1_3_2_2_34_1","unstructured":"Quad9. 2018. Quad9 | Internet Security & Privacy In a Few Easy Steps. https:\/\/quad9.net."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663721"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2020.1722191"},{"key":"e_1_3_2_2_37_1","unstructured":"Root Server Operators. 2020. Root DNS. http:\/\/root-servers.org\/."},{"key":"e_1_3_2_2_38_1","unstructured":"Root Zone file. 2020. Root. http:\/\/www.internic.net\/domain\/root.zone."},{"key":"e_1_3_2_2_39_1","unstructured":"Bruce Schneier. 2018. Censorship in the Age of Large Cloud Providers. https:\/\/www.schneier.com\/essays\/archives\/2018\/06\/censorship_in_the_ag.html"},{"key":"e_1_3_2_2_40_1","unstructured":"SIDN Labs. 2020. ENTRADA - DNS Big Data Analytics. https:\/\/entrada.sidnlabs.nl\/."},{"key":"e_1_3_2_2_41_1","unstructured":"Internet Society. 2019. Consolidation in the Internet Economy. https:\/\/future.internetsociety.org\/2019\/"},{"key":"e_1_3_2_2_42_1","unstructured":"Matthew Thomas. [n.d.]. Chromiums impact on root DNS traffic. https:\/\/blog.apnic.net\/2020\/08\/21\/chromiums-impact-on-root-dns-traffic\/ https:\/\/blog.apnic.net\/2020\/08\/21\/chromiums-impact-on-root-dns-traffic\/."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"P. Vixie. 1999. Extension Mechanisms for DNS (EDNS0). RFC 2671. IETF. http:\/\/tools.ietf.org\/rfc\/rfc2671.txt","DOI":"10.17487\/rfc2671"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578902"},{"key":"e_1_3_2_2_45_1","unstructured":"Duane Wessels. 2020. RSSAC002-data. https:\/\/github.com\/rssac-caucus\/RSSAC002-data\/."},{"key":"e_1_3_2_2_46_1","unstructured":"Chris Williams. 2019. Bezos DDoSd: Amazon Web Services DNS systems knackered by hours-long cyber-attack. https:\/\/www.theregister.co.uk\/2019\/10\/22\/aws_dns_ddos\/."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502925"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_12"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:37:56Z","timestamp":1765841876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423625"}},"subtitle":["how centralized is DNS traffic becoming?"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":48,"alternative-id":["10.1145\/3419394.3423625","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423625","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}