{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:14:10Z","timestamp":1756311250694,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Alibaba Innovative Research Program (AIR)"},{"name":"CCF-Tencent Rhino-Bird Young Faculty Open Research Fund"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102218"],"award-info":[{"award-number":["62102218"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tsinghua University-China Telecom Corp., Ltd. Joint Research Center for Next Generation Internet Technology Research Fund"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616647","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"296-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5325-175X","authenticated-orcid":false,"given":"Fenglu","family":"Zhang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9032-8063","authenticated-orcid":false,"given":"Baojun","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1189-0164","authenticated-orcid":false,"given":"Eihal","family":"Alowaisheq","sequence":"additional","affiliation":[{"name":"King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1117","authenticated-orcid":false,"given":"Jianjun","family":"Chen","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3512-7612","authenticated-orcid":false,"given":"Chaoyi","family":"Lu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9288-4778","authenticated-orcid":false,"given":"Linjian","family":"Song","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4238-4695","authenticated-orcid":false,"given":"Yong","family":"Ma","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4919-1130","authenticated-orcid":false,"given":"Ying","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0083-733X","authenticated-orcid":false,"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; Quancheng Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9714-5545","authenticated-orcid":false,"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"114DNS. 2023. 114DNS. http:\/\/www.114dns.com\/about.html."},{"key":"e_1_3_2_1_2_1","volume-title":"NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Afek Yehuda","year":"2020","unstructured":"Yehuda Afek, Anat Bremler-Barr, and Lior Shafir. 2020. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Vancouver, BC, 631--648."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879144"},{"volume-title":"Whitepaper: DNS Reflection, Amplification, and DNS Water-torture.","year":"2019","key":"e_1_3_2_1_4_1","unstructured":"Akamai. 2019. Whitepaper: DNS Reflection, Amplification, and DNS Water-torture."},{"key":"e_1_3_2_1_5_1","unstructured":"Alibaba. 2023 a. AliDNS. https:\/\/www.alidns.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Alibaba. 2023 b. Domain Name Service. https:\/\/www.alibabacloud.com\/domain."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232773"},{"key":"e_1_3_2_1_8_1","unstructured":"Alternate DNS. 2023. Alternate DNS. https:\/\/alternate-dns.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Amazon. 2023 a. Alexa Top sites. https:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_10_1","unstructured":"Amazon. 2023 b. Amazon Web Services (AWS). https:\/\/aws.amazon.com."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Mark P. Andrews. 1998. Negative Caching of DNS Queries (DNS NCACHE). RFC 2308. https:\/\/doi.org\/10.17487\/RFC2308","DOI":"10.17487\/RFC2308"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8906"},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093--1110. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"e_1_3_2_1_14_1","unstructured":"APNIC. 2023. Use of DNS Resolvers for World. https:\/\/stats.labs.apnic.net\/rvrs\/XA?hc=XA&hl=1&hs=0&ht=30&w=1&t=37."},{"key":"e_1_3_2_1_15_1","unstructured":"Baidu. 2023. BaiduDNS. https:\/\/dudns.baidu.com\/index.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787485"},{"volume-title":"Research in Attacks","author":"Bushart Jonas","key":"e_1_3_2_1_17_1","unstructured":"Jonas Bushart and Christian Rossow. 2018. DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. In Research in Attacks, Intrusions, and Defenses, Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer International Publishing, Cham, 139--160."},{"key":"e_1_3_2_1_18_1","unstructured":"CAIDA. 2022. Spoofer. https:\/\/spoofer.caida.org\/summary.php."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978394"},{"key":"e_1_3_2_1_20_1","unstructured":"CISCO. 2023. OpenDNS. https:\/\/www.opendns.com\/."},{"key":"e_1_3_2_1_21_1","unstructured":"CleanBrowsing. 2023. DNS Content Filtering. https:\/\/cleanbrowsing.org\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Cloudflare. 2023. Cloudflare DNS. https:\/\/www.cloudflare.com\/dns\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1998.679729"},{"key":"e_1_3_2_1_24_1","unstructured":"CZ.NIC. 2023. Knot Resolver. https:\/\/www.knot-resolver.cz\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6891"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484815"},{"key":"e_1_3_2_1_27_1","unstructured":"DNS.WATCH. 2023. DNS.WATCH. https:\/\/dns.watch\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Viktor Dukhovni and Wes Hardaker. 2015. The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance. RFC 7671. https:\/\/doi.org\/10.17487\/RFC7671","DOI":"10.17487\/RFC7671"},{"key":"e_1_3_2_1_29_1","unstructured":"FreeDNS. 2023. FreeDNS. https:\/\/freedns.zone\/en\/."},{"key":"e_1_3_2_1_30_1","volume-title":"GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/.","author":"GNU.","year":"2023","unstructured":"GNU. 2023. GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Godaddy. 2023. Domain Names Websites and Hosting. https:\/\/sg.godaddy.com\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Google. 2023. Google Public DNS. https:\/\/developers.google.com\/speed\/public-dns."},{"key":"e_1_3_2_1_33_1","unstructured":"Google scholar. 2023. Studies cited Tranco list. https:\/\/scholar.google.com\/scholar?cites=1499698348405075976."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2317-5"},{"key":"e_1_3_2_1_35_1","volume-title":"End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Hao Shuai","year":"2018","unstructured":"Shuai Hao, Yubao Zhang, Haining Wang, and Angelos Stavrou. 2018. End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1129--1145. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/hao"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6698"},{"key":"e_1_3_2_1_37_1","unstructured":"ICANN. 2023. Registration data lookup tool. https:\/\/lookup.icann.org\/."},{"key":"e_1_3_2_1_38_1","unstructured":"ISC. 2023. BIND9. https:\/\/www.isc.org\/bind\/."},{"key":"e_1_3_2_1_39_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jeitner Philipp","year":"2021","unstructured":"Philipp Jeitner and Haya Shulman. 2021. Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. In 30th USENIX Security Symposium (USENIX Security 21). 3165--3182."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423664"},{"key":"e_1_3_2_1_41_1","volume-title":"A Scalable HTTP Server: The NCSA Prototype. Computer Networks and ISDN systems","author":"Katz Eric Dean","year":"1994","unstructured":"Eric Dean Katz, Michelle Butler, and Robert McGrath. 1994. A Scalable HTTP Server: The NCSA Prototype. Computer Networks and ISDN systems, Vol. 27, 2 (1994), 155--164."},{"key":"e_1_3_2_1_42_1","volume-title":"The Menlo Report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102","author":"Kenneally Erin","year":"2012","unstructured":"Erin Kenneally and David Dittrich. 2012. The Menlo Report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102 (2012)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","unstructured":"Scott Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. https:\/\/doi.org\/10.17487\/RFC7208","DOI":"10.17487\/RFC7208"},{"volume-title":"Research in Attacks","author":"Lukas","key":"e_1_3_2_1_44_1","unstructured":"Lukas Kr\"amer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, and Christian Rossow. 2015. AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. In Research in Attacks, Intrusions, and Defenses, Herbert Bos, Fabian Monrose, and Gregory Blanc (Eds.). Springer International Publishing, Cham, 615--636."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","unstructured":"Murray Kucherawy Dave Crocker and Tony Hansen. 2011. DomainKeys Identified Mail (DKIM) Signatures. RFC 6376. https:\/\/doi.org\/10.17487\/RFC6376","DOI":"10.17487\/RFC6376"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815683"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","unstructured":"Warren \"Ace\" Kumari Evan Hunt Roy Arends Wes Hardaker and David C Lawrence. 2020. Extended DNS Errors. RFC 8914. https:\/\/doi.org\/10.17487\/RFC8914","DOI":"10.17487\/RFC8914"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301319"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00172"},{"key":"e_1_3_2_1_51_1","volume-title":"Measuring the Practical Impact of DNSSEC Deployment. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Lian Wilson","year":"2013","unstructured":"Wilson Lian, Eric Rescorla, Hovav Shacham, and Stefan Savage. 2013. Measuring the Practical Impact of DNSSEC Deployment. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 573--588. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/paper\/lian"},{"key":"e_1_3_2_1_52_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Liu Baojun","year":"2018","unstructured":"Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, and Min Yang. 2018. Who is answering my queries: Understanding and characterizing interception of the {DNS} resolution path. In 27th USENIX Security Symposium (USENIX Security 18). 1113--1128."},{"key":"e_1_3_2_1_53_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation","volume":"8","author":"Liu Xin","year":"2008","unstructured":"Xin Liu, Ang Li, Xiaowei Yang, and David Wetherall. 2008. Passport: Secure and Adoptable Source Authentication.. In USENIX Symposium on Networked Systems Design and Implementation, Vol. 8. 365--378."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297272"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417280"},{"key":"e_1_3_2_1_57_1","unstructured":"MaxMind. 2023. GeoIP Databases. https:\/\/www.maxmind.com\/en\/geoip2-services-and-databases."},{"key":"e_1_3_2_1_58_1","unstructured":"Microsoft. 2023 a. Windows Server 2008 R2. https:\/\/microsoft.fandom.com\/wiki\/Windows_Server_2008_R2."},{"volume-title":"2023 b. Windows Server","year":"2022","key":"e_1_3_2_1_59_1","unstructured":"Microsoft. 2023 b. Windows Server 2022. https:\/\/microsoft.fandom.com\/wiki\/Windows_Server_2022."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Walter Milliken Trevor Mendez and Dr. Craig Partridge. 1993. Host Anycasting Service. RFC 1546. https:\/\/doi.org\/10.17487\/RFC1546","DOI":"10.17487\/RFC1546"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","unstructured":"P. Mockapetris. 1987. Domain Names - Concepts and Facilities. RFC 1034. https:\/\/doi.org\/10.17487\/RFC1034","DOI":"10.17487\/RFC1034"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423625"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131366"},{"key":"e_1_3_2_1_65_1","unstructured":"MYIP.MS. 2023. DNS Nameservers for 6 000 000 Top World Websites. https:\/\/myip.ms\/browse\/dns\/Sites_DNS_Nameservers."},{"key":"e_1_3_2_1_66_1","unstructured":"Namecheap. 2023. Namecheap Hosting. https:\/\/www.namecheap.com\/hosting\/."},{"key":"e_1_3_2_1_67_1","unstructured":"NLnet Labs. 2023. Unbound. https:\/\/www.nlnetlabs.nl\/projects\/unbound\/about\/."},{"key":"e_1_3_2_1_68_1","unstructured":"Open-Xchange. 2023. PowerDNS Recursor. https:\/\/www.powerdns.com\/recursor.html."},{"key":"e_1_3_2_1_69_1","unstructured":"OpenNIC. 2023. OpenNIC Project. https:\/\/www.opennic.org\/."},{"key":"e_1_3_2_1_70_1","unstructured":"Oracle. 2023. DynDNS. https:\/\/account.dyn.com\/."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","unstructured":"Michael A. Patton Scott O. Bradner Robert Elz and Randy Bush. 1997. Selection and Operation of Secondary DNS Servers. RFC 2182. https:\/\/doi.org\/10.17487\/RFC2182","DOI":"10.17487\/RFC2182"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2304576.2304601"},{"key":"e_1_3_2_1_74_1","volume-title":"Global Measurement of DNS Manipulation. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global Measurement of DNS Manipulation. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 307--323. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/pearce"},{"key":"e_1_3_2_1_75_1","unstructured":"Quad9. 2023. Service Addresses. https:\/\/www.quad9.net\/service\/service-addresses-and-features."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423640"},{"key":"e_1_3_2_1_77_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014","author":"Rossow Christian","year":"2014","unstructured":"Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2014\/amplification-hell-revisiting-network-protocols-ddos-abuse"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3105741"},{"key":"e_1_3_2_1_79_1","unstructured":"Shodan. 2023. Shodan Search Engine. https:\/\/www.shodan.io\/."},{"key":"e_1_3_2_1_80_1","article-title":"Ripe Atlas: A Global Internet Measurement Network","volume":"18","author":"Staff RIPE NCC","year":"2015","unstructured":"RIPE NCC Staff. 2015. Ripe Atlas: A Global Internet Measurement Network. Internet Protocol Journal, Vol. 18, 3 (2015).","journal-title":"Internet Protocol Journal"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452525"},{"key":"e_1_3_2_1_82_1","unstructured":"Tencent. 2023. Tencent Cloud. https:\/\/intl.cloud.tencent.com\/?lang=en."},{"key":"e_1_3_2_1_83_1","unstructured":"Threatbook. 2023. OneDNS. https:\/\/www.onedns.net\/."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"TWNIC. 2023. Quad101. https:\/\/101.101.101.101\/.","DOI":"10.1111\/tan.14670"},{"key":"e_1_3_2_1_85_1","unstructured":"UncensoredDNS. 2023. UncensoredDNS. https:\/\/blog.uncensoreddns.org\/dns-servers\/."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663731"},{"key":"e_1_3_2_1_87_1","unstructured":"VirusTotal. 2023. VirusTotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"e_1_3_2_1_89_1","unstructured":"Christopher John Cornish Hellaby Watkins. 1989. Learning from delayed rewards. (1989)."},{"key":"e_1_3_2_1_90_1","unstructured":"Wikipedia. 2023 a. Load balancing (computing). https:\/\/en.wikipedia.org\/wiki\/Load_balancing_(computing)."},{"key":"e_1_3_2_1_91_1","unstructured":"Wikipedia. 2023 b. Public Recursive Name Server. https:\/\/en.wikipedia.org\/wiki\/Public_recursive_name_server."},{"key":"e_1_3_2_1_92_1","unstructured":"Wikipedia. 2023 c. Residential Proxy. https:\/\/en.wikipedia.org\/wiki\/Proxy_server."},{"key":"e_1_3_2_1_93_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Xie Qinge","year":"2023","unstructured":"Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, and Frank Li. 2023. Building an Open, Robust, and Stable Voting-Based Domain Top List. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 625--642. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/xie"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616668"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185387"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"volume-title":"Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study","author":"Zhang Fenglu","key":"e_1_3_2_1_97_1","unstructured":"Fenglu Zhang, Chaoyi Lu, Baojun Liu, Haixin Duan, and Ying Liu. 2022. Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study. In Passive and Active Measurement, Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser (Eds.). Springer International Publishing, Cham, 247--263."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624839"},{"key":"e_1_3_2_1_99_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zheng Xiaofeng","year":"2020","unstructured":"Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, and Zhiyun Qian. 2020. Poison over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Vancouver, BC, 577--593."},{"key":"e_1_3_2_1_100_1","volume-title":"Detection, Defense, and Challenges: A Survey","author":"Zhijun Wu","year":"2020","unstructured":"Wu Zhijun, Li Wenjing, Liu Liang, and Yue Meng. 2020. Low-rate DoS Attacks, Detection, Defense, and Challenges: A Survey. IEEE access, Vol. 8 (2020), 43920--43943."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:45:36Z","timestamp":1755740736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":100,"alternative-id":["10.1145\/3576915.3616647","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616647","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}