{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:10Z","timestamp":1761401770995},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T00:00:00Z","timestamp":1445212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13388-015-0023-y","type":"journal-article","created":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T09:23:28Z","timestamp":1445246608000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A measurement study of DNSSEC misconfigurations"],"prefix":"10.1186","volume":"4","author":[{"given":"Niels L. M.","family":"van Adrichem","sequence":"first","affiliation":[]},{"given":"Norbert","family":"Blenn","sequence":"additional","affiliation":[]},{"given":"Antonio Reyes","family":"L\u00faa","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Wasif","sequence":"additional","affiliation":[]},{"given":"Ficky","family":"Fatturrahman","sequence":"additional","affiliation":[]},{"given":"Fernando A.","family":"Kuipers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,19]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"van Adrichem NLM, L\u00faa AR, Wang X, Wasif M, Fatturrahman F, Kuipers FA (2014) DNSSEC Misconfigurations: how incorrectly configured security leads to unreachability. In: Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint, pp 9\u201316","DOI":"10.1109\/JISIC.2014.12"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Mockapetris PV (1987) Domain Names\u2014Implementation and Specification. IETF. RFC 1035 (INTERNET STANDARD). http:\/\/www.ietf.org\/rfc\/rfc1035.txt","DOI":"10.17487\/rfc1035"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Migault D, Girard C, Laurent M (2010) A Performance view on DNSSEC migration. In: 2010 International Conference on Network and Service Management (CNSM), IEEE, pp 469\u2013474","DOI":"10.1109\/CNSM.2010.5691275"},{"key":"23_CR4","unstructured":"Bellovin SM (1995) Using the Domain Name System for System Break-ins. In: Proceedings of 5th USENIX UNIX Security Symposium, USENIX Association, Berkeley"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Arends R, Austein R, Larson M, Massey D, Rose S (2005) DNS Security - Introduction and Requirements. IETF. RFC 4033 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc4033.txt","DOI":"10.17487\/rfc4033"},{"key":"23_CR6","unstructured":"Cambus F StatDNS\u2014DNS and Domain Name statistics. http:\/\/www.statdns.com . Accessed 02 Mar 2015"},{"key":"23_CR7","unstructured":"ICANN and VeriSign Inc.: Root DNSSEC. http:\/\/www.root-dnssec.org\/ . Accessed 02 Mar 2015"},{"key":"23_CR8","unstructured":"ICANN: DNSSEC Securing the Internet: benefits to Companies and Consumers. http:\/\/www.icann.org\/en\/news\/in-focus\/dnssec\/dnssec-card-03dec12-en.pdf . Accessed 02 Mar 2015"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Deccio C, Sedayao J, Kant K, Mohapatra P (2011) Quantifying and Improving DNSSEC Availability. In: Proceedings of 20th International Conference On Computer Communications and Networks (ICCCN), 2011, pp 1\u20137","DOI":"10.1109\/ICCCN.2011.6005908"},{"key":"23_CR10","unstructured":"York D. HBO NOW DNSSEC Misconfiguration Makes Site Unavailable From Comcast Networks (Fixed Now) Deploy360 Programme. http:\/\/www.internetsociety.org\/deploy360\/blog\/2015\/03\/hbo-now-dnssec-misconfiguration-makes-site-unavailable-from-comcast-networks-fixed-now\/ . Accessed 12 May 2015"},{"key":"23_CR11","unstructured":"Comcast: DNSSEC News. http:\/\/dns.comcast.net\/index.php\/categories\/listings\/dnssec-news. Accessed 22 Jul 2015"},{"key":"23_CR12","unstructured":"Livingood J (2015) Responsibility for Authoritative DNSSEC Mistakes. Working Draft. http:\/\/www.ietf.org\/internet-drafts\/draft-livingood-dnsop-auth-dnssec-mistakes-02.txt"},{"key":"23_CR13","unstructured":"Comcast: gov Failing DNSSEC Validation. http:\/\/dns.comcast.net\/index.php\/entry\/gov-failing-dnssec-validation-1 . Accessed 22 Jul 2015"},{"key":"23_CR14","unstructured":"ICANN: Applicant Guidebook | ICANN New gTLDs. http:\/\/newgtlds.icann.org\/en\/applicants\/agb . Accessed 02 Mar 2015"},{"key":"23_CR15","unstructured":"Internet Infrastructure Foundation: DNSSEC\u2014The Path to a Secure Domain. https:\/\/www.iis.se\/english\/domains\/tech\/dnssec\/ . Accessed 02 Mar 2015"},{"key":"23_CR16","unstructured":"SIDN: SIDN Annual Report 2013. https:\/\/www.sidn.nl\/annualreport\/dot-nl . Accessed 04 Mar 2015"},{"key":"23_CR17","unstructured":"IANA: Root Zone DNSSEC Trust Anchors. http:\/\/data.iana.org\/root-anchors\/ . Accessed 02 Mar 2015"},{"key":"23_CR18","unstructured":"Schaeffer Y, Overeinder B, Mekking M (2012) Flexible and Robust Key Rollover in DNSSEC. In: Proceedings of the Workshop on Securing and Trusting Internet Names (SATIN 2012). NPL"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Schlyter J (2004) DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. IETF. RFC 3845 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc3845.txt","DOI":"10.17487\/rfc3845"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Laurie B, Sisson G, Arends R, Blacka D (2008) DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. IETF. RFC 5155 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc5155.txt","DOI":"10.17487\/rfc5155"},{"key":"23_CR21","unstructured":"Huston G, Michaelson G. Measuring DNSSEC Performance. http:\/\/impossible.rand.apnic.net\/ispcol\/2013-05\/dnssec-performance.pdf . Accessed 22 Jul 2015"},{"key":"23_CR22","unstructured":"Lian W, Rescorla E, Shacham H, Savage S (2013) Measuring the Practical Impact of DNSSEC Deployment. In: USENIX Security, pp 573\u2013588"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Ariyapperuma S, Mitchell CJ (2007) Security vulnerabilities in DNS and DNSSEC. In: The Second International Conference On Availability, Reliability and Security, 2007. ARES 2007. pp 335\u2013342","DOI":"10.1109\/ARES.2007.139"},{"key":"23_CR24","first-page":"115","volume":"2010","author":"J Bau","year":"2010","unstructured":"Bau J, Mitchell JC (2010) A Security Evaluation of DNSSEC with NSEC3. IACR Cryptol ePrint Archiv 2010:115","journal-title":"IACR Cryptol ePrint Archiv"},{"key":"23_CR25","unstructured":"Deccio C (2010) Quantifying the Impact of DNSSEC Misconfiguration. In: DNS-OARC Workshop (2). https:\/\/www.dns-oarc.net\/files\/workshop-201010\/Casey-2010-10-14-dns-oarc-orig.pdf"},{"key":"23_CR26","unstructured":"Verisign Labs and Internet Innovations: DNSSEC Analyzer\u2014jdnssec-tools. http:\/\/www.verisignlabs.com\/jdnssec-tools\/ . Accessed 02 Mar 2015"},{"key":"23_CR27","unstructured":"NLnet Labs: ldns. http:\/\/www.nlnetlabs.nl\/projects\/ldns\/ . Accessed 02 Mar 2015"},{"key":"23_CR28","unstructured":"Perez C Dnsrecon. https:\/\/github.com\/darkoperator\/dnsrecon . Accessed Jan 2014"},{"key":"23_CR29","unstructured":"Verisign Labs and Internet Innovations: DNSSEC Analyzer. http:\/\/Dnssec-debugger.verisignlabs.com . Accessed 02 Mar 2015"},{"key":"23_CR30","unstructured":"Google: Public DNS\u2014Google Developers. https:\/\/developers.google.com\/speed\/public-dns\/ . Accessed 02 Mar 2015"},{"key":"23_CR31","unstructured":"BIND: dig (domain information groper). ftp:\/\/ftp.isc.org\/isc\/bind9\/cur\/9.10\/doc\/arm\/man.dig.html . Accessed 04 Mar 2015"},{"key":"23_CR32","unstructured":"Anonymous: DNS Census 2013. https:\/\/dnscensus2013.neocities.org\/ . Accessed 10 Mar 2015"},{"key":"23_CR33","unstructured":"Team Cymru. IP to ASN Mapping. https:\/\/www.team-cymru.org\/IP-ASN-mapping.html . Accessed 10 Mar 2015"},{"key":"23_CR34","unstructured":"Elz R, Bush R (1996) Serial Number Arithmetic. IETF. RFC 1982 (Proposed Standard) (1996). http:\/\/www.ietf.org\/rfc\/rfc1982.txt"},{"key":"23_CR35","unstructured":"Kalchev D DNSSEC Implementation in .BG. http:\/\/www.cctld.ru\/files\/pdf\/Presentations_09-09\/17-45_dnssec%20Bulgaria.pdf . Accessed Jan 2014"},{"key":"23_CR36","unstructured":"Home-Dominios-Estatisticas. http:\/\/registro.br\/estatisticas.html . Accessed Jan 2014"},{"key":"23_CR37","unstructured":"Romero G (2013) DNSSEC Deployment in .CO. In: ICANN48 DNSSEC Workshop"},{"key":"23_CR38","unstructured":"Internet Infrastructure Foundation: Growth .se | .SE. https:\/\/www.iis.se\/english\/domains\/domain-statistics\/growth\/ . Accessed 01 2014"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0023-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-015-0023-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0023-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T18:01:03Z","timestamp":1567274463000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.security-informatics.com\/content\/4\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,19]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1186\/s13388-015-0023-y","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,19]]},"article-number":"8"}}