{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:01Z","timestamp":1765841881380,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423649","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"65-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Behind Closed Doors"],"prefix":"10.1145","author":[{"given":"Casey","family":"Deccio","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Alden","family":"Hilton","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Michael","family":"Briggs","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Trevin","family":"Avery","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Robert","family":"Richardson","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Baidu. 2020. Baidu. http:\/\/www.baidu.com\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"S. Bortzmeyer. 2016. RFC 7816: DNS Query Name Minimisation to Improve Privacy.","DOI":"10.17487\/RFC7816"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8020"},{"key":"e_1_3_2_2_5_1","unstructured":"CAIDA. 2020. Spoofer. https:\/\/www.caida.org\/projects\/spoofer\/"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3234"},{"key":"e_1_3_2_2_7_1","unstructured":"CenturyLink. 2020. CenturyLink Domain Name Server (DNS). https:\/\/www.centurylink.com\/home\/help\/internet\/dns.html"},{"key":"e_1_3_2_2_8_1","unstructured":"Cisco. 2020. OpenDNS. https:\/\/www.opendns.com\/"},{"key":"e_1_3_2_2_9_1","volume-title":"Bonica, and B. Haberman","author":"Cotton M.","year":"2013","unstructured":"M. Cotton, L. Vegoda, Ed. R. Bonica, and B. Haberman. 2013. RFC 6890: Special-Purpose IP Address Registries."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"J. Damas. 2008. RFC 5358: Preventing Use of Recursive Nameservers in Reflector Attacks.","DOI":"10.17487\/rfc5358"},{"key":"e_1_3_2_2_11_1","unstructured":"K. Davies. 2008. DNS Cache Poisoning Vulnerability: Explanation and Remedies."},{"key":"e_1_3_2_2_12_1","volume-title":"International Conference on Computing, Networking and Communications (ICNC","author":"Deccio C.","year":"2019","unstructured":"C. Deccio, D. Argueta, and J. Demke. 2019. A Quantitative Study of the Deployment of DNS Rate Limiting. In International Conference on Computing, Networking and Communications (ICNC 2019). IEEE, New York, NY, USA, 442--447."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"J. Dickinson S. Dickinson R. Bellis A. Mankin and D. Wessels. 2016. RFC 7766: DNS Transport over TCP - Implementation Requirements.","DOI":"10.17487\/RFC7766"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"D. Dittrich and E. Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical Report. U.S. Department of Homeland Security.","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_2_15_1","volume-title":"Analysis, and Research Center (DNS-OARC)","author":"Operations DNS","year":"2018","unstructured":"DNS Operations, Analysis, and Research Center (DNS-OARC). 2018. 2018 DITL Data. https:\/\/www.dns-oarc.net\/oarc\/data\/ditl\/2018"},{"key":"e_1_3_2_2_16_1","volume-title":"Analysis, and Research Center (DNS-OARC)","author":"Operations DNS","year":"2019","unstructured":"DNS Operations, Analysis, and Research Center (DNS-OARC). 2019. 2019 DITL Data. https:\/\/www.dns-oarc.net\/oarc\/data\/ditl\/2019"},{"key":"e_1_3_2_2_17_1","volume-title":"Analysis, and Research Center","author":"System Operation Domain Name","year":"2020","unstructured":"Domain Name System Operation, Analysis, and Research Center. 2020. DNS-OARC. https:\/\/www.dns-oarc.net\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Chad Dougherty. 2008. Multiple DNS implementations vulnerable to cache poisoning. https:\/\/www.kb.cert.org\/vuls\/id\/800113\/"},{"key":"e_1_3_2_2_19_1","unstructured":"D. Eastlake and R. van Mook. 2009. RFC 5452: Measures for Making DNS More Resilient against Forged Answers."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. 2000. BCP 38: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_2_22_1","unstructured":"Google. 2020. Google Public DNS. https:\/\/developers.google.com\/speed\/public-dns\/"},{"key":"e_1_3_2_2_23_1","unstructured":"Olafur Gudmundsson. 2018. Introducing DNS Resolver 1.1.1.1 (not a joke). https:\/\/blog.cloudflare.com\/dns-resolver-1-1-1-1\/"},{"key":"e_1_3_2_2_24_1","volume-title":"Bailie","author":"Marshall Jarrett H.","year":"2015","unstructured":"H. Marshall Jarrett and Michael W. Bailie. 2015. Prosecuting Computer Crimes. https:\/\/www.justice.gov\/sites\/default\/files\/criminal-ccips\/legacy\/2015\/01\/14\/ccmanual.pdf"},{"key":"e_1_3_2_2_25_1","unstructured":"Internet Assigned Numbers Authority. 2020. Service Name and Transport Protocol Port Number Registry. https:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml"},{"key":"e_1_3_2_2_26_1","unstructured":"Lamont Jones. 2008. fix query-source comment in default install. https:\/\/salsa.debian.org\/dns-team\/bind9\/commit\/ed511a4a1182d4434d6c18b33201ae92d1bbb72f"},{"key":"e_1_3_2_2_27_1","volume-title":"Or: '64K Should Be Good Enough For Anyone'. https:\/\/www.blackhat.com\/presentations\/bh-jp-08\/bh-jp-08-Kaminsky\/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf","author":"Kaminsky Dan","year":"2008","unstructured":"Dan Kaminsky. 2008. Black Ops 2008: Its The End Of The Cache As We Know It, Or: '64K Should Be Good Enough For Anyone'. https:\/\/www.blackhat.com\/presentations\/bh-jp-08\/bh-jp-08-Kaminsky\/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"S. Kitterman. 2014. RFC 7208: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1.","DOI":"10.17487\/rfc7208"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987477"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_7"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815683"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","unstructured":"D. MacFarland C. Shue and A. Kalafut. 2015. Characterizing Optimal DNS Amplification Attacks and Effective Mitigation. In Passive and Active Measurement: 16th International Conference Proceedings. Springer International Publishing Cham 15--27. https:\/\/doi.org\/10.1007\/978-3-319-15509-8_2","DOI":"10.1007\/978-3-319-15509-8_2"},{"key":"e_1_3_2_2_34_1","volume-title":"Byte: Characterizing the Potential of DNS Amplification Attacks. Computer Networks 116 (April","author":"MacFarland D.","year":"2017","unstructured":"D. MacFarland, C. Shue, and A. Kalafut. 2017. The Best Bang for the Byte: Characterizing the Potential of DNS Amplification Attacks. Computer Networks 116 (April 2017), 12--21."},{"key":"e_1_3_2_2_35_1","unstructured":"MaxMind. 2020. MaxMind GeoLite2 data. https:\/\/www.maxmind.com\/"},{"key":"e_1_3_2_2_36_1","first-page":"2020","volume":"202","unstructured":"Microsoft. 2020. CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability. https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1350","journal-title":"Microsoft."},{"key":"e_1_3_2_2_37_1","unstructured":"NANOG. 2020. North American Network Operators Group. https:\/\/www.nanog.org\/"},{"key":"e_1_3_2_2_38_1","volume-title":"Behavioral Analysis of Open DNS Resolvers. In The 49th IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE","author":"Park Jeman","year":"2019","unstructured":"Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen. 2019. Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. In The 49th IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE, Portland, OR, USA, 12 pages."},{"key":"e_1_3_2_2_39_1","unstructured":"Quad9. 2020. Quad9. https:\/\/www.quad9.net\/"},{"key":"e_1_3_2_2_40_1","unstructured":"RIPE NCC. 2020. RIPE Network Coordination Centre. https:\/\/www.ripe.net\/"},{"key":"e_1_3_2_2_41_1","unstructured":"Root Server Operators. 2019. Root DNS. http:\/\/root-servers.org\/"},{"volume-title":"Passive and Active Measurement","author":"Scheffler Sarah","key":"e_1_3_2_2_42_1","unstructured":"Sarah Scheffler, Sean Smith, Yossi Gilad, and Sharon Goldberg. 2018. The Unintended Consequences of Email Spam Prevention. In Passive and Active Measurement. Springer International Publishing, New York, NY, USA, 158--169."},{"key":"e_1_3_2_2_43_1","volume-title":"NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Shafir Lior","year":"2020","unstructured":"Lior Shafir, Yehuda Afek, and Anat Bremler-Barr. 2020. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 631--648."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663731"},{"key":"e_1_3_2_2_45_1","unstructured":"Verisign. 2020. Verisign Public DNS. https:\/\/www.verisign.com\/en_US\/security-services\/public-dns\/index.xhtml"},{"key":"e_1_3_2_2_46_1","unstructured":"P. Vixie. 2013. On the Time Value of Security Features in DNS. http:\/\/www.circleid.com\/posts\/20130913_on_the_time_value_of_security_features_in_dns\/."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:35:32Z","timestamp":1765841732000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423649"}},"subtitle":["A Network Tale of Spoofing, Intrusion, and False DNS Security"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":46,"alternative-id":["10.1145\/3419394.3423649","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423649","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}