Development of the domain name system
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
An analysis of wide-area name server traffic: a study of the Internet Domain Name System
SIGCOMM '92 Conference proceedings on Communications architectures & protocols
End-to-end Internet packet dynamics
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
On the scale and performance of cooperative Web proxy caching
Proceedings of the seventeenth ACM symposium on Operating systems principles
An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Proactive Caching of DNS Records: Addressing a Performance Bottleneck
SAINT '01 Proceedings of the 2001 Symposium on Applications and the Internet (SAINT 2001)
Wide-area Internet traffic patterns and characteristics
IEEE Network: The Magazine of Global Internetworking
Inferring relative popularity of internet applications by actively querying DNS caches
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Consistency models for Internet caching
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Session level techniques for improving web browsing performance on wireless links
Proceedings of the 13th international conference on World Wide Web
Availability, usage, and deployment characteristics of the domain name system
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
On the responsiveness of DNS-based network control
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An empirical study of spam traffic and the use of DNS black lists
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An Extensible Platform for Evaluating Security Protocols
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
Drafting behind Akamai (travelocity-based detouring)
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Piggybacking related domain names to improve DNS performance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of Replica Placement under Expiration-Based Consistency Management
IEEE Transactions on Parallel and Distributed Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Middleboxes no longer considered harmful
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Optimal Replica Placement under TTL-Based Consistency
IEEE Transactions on Parallel and Distributed Systems
Portcullis: protecting connection setup from denial-of-capability attacks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
NIRA: a new inter-domain routing architecture
IEEE/ACM Transactions on Networking (TON)
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Pollution attacks and defenses for Internet caching systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A study of end-to-end web access failures
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Mobility through naming: impact on dns
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Passive Monitoring of DNS Anomalies
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Context-aware clustering of DNS query traffic
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Proceedings of the 15th ACM conference on Computer and communications security
Distributed Barter--Based Directory Services
Proceedings of the 2008 conference on Artificial Intelligence Research and Development: Proceedings of the 11th International Conference of the Catalan Association for Artificial Intelligence
Drafting behind Akamai: inferring network conditions based on CDN redirections
IEEE/ACM Transactions on Networking (TON)
DNS prefetching and its privacy implications: when good things go bad
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Enabling mobile networks through secure naming
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
LISP-TREE: a DNS hierarchy to support the lisp mapping system
IEEE Journal on Selected Areas in Communications - Special issue title on scaling the internet routing system: an interim report
Comparing DNS resolvers in the wild
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Collaborative, privacy-preserving data aggregation at scale
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A new statistical approach to DNS traffic anomaly detection
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II
Decoupling the design of identifier-to-locator mapping services from identifiers
Computer Networks: The International Journal of Computer and Telecommunications Networking
On name-based inter-domain routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting malware domains at the upper DNS hierarchy
SEC'11 Proceedings of the 20th USENIX conference on Security
Privacy-preserving DNS: analysis of broadcast, range queries and mix-based protection methods
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Research challenges towards the Future Internet
Computer Communications
ASAP: a low-latency transport layer
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Uncertainty in global application services with load sharing policy
DSOM'06 Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management
LOMO: location resolution of mobile hosts using internet routing structures
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Scalability of name resolution for ambient networks
WWIC'06 Proceedings of the 4th international conference on Wired/Wireless Internet Communications
Authority server selection in DNS caching resolvers
ACM SIGCOMM Computer Communication Review
Mobility Management in Identifier/Locator Split Networks
Wireless Personal Communications: An International Journal
Percolation-based routing in the Internet
Journal of Systems and Software
Proceedings of the 2012 ACM conference on Internet measurement conference
A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies
ACM Transactions on Internet Technology (TOIT)
An empirical reexamination of global DNS behavior
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Resolvers Revealed: Characterizing DNS Resolvers and their Clients
ACM Transactions on Internet Technology (TOIT)
On modern DNS behavior and properties
ACM SIGCOMM Computer Communication Review
Network layer soft handoff for IP mobility
Proceedings of the 8th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Towards passive DNS software fingerprinting
Proceedings of the 9th Asian Internet Engineering Conference
A survey and taxonomy of ID/Locator Split Architectures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper presents a detailed analysis of traces of domain name system (DNS) and associated TCP traffic collected on the Internet links of the MIT Laboratory for Computer Science and the Korea Advanced Institute of Science and Technology (KAIST). The first part of the analysis details how clients at these institutions interact with the wide-area domain name system, focusing on client-perceived performance and the prevalence of failures and errors. The second part evaluates the effectiveness of DNS caching.In the most recent MIT trace, 23% of lookups receive no answer; these lookups account for more than half of all traced DNS packets since query packets are retransmitted overly persistently. About 13% of all lookups result in an answer that indicates an error condition. Many of these errors appear to be caused by missing inverse (IP-to-name) mappings or NS records that point to nonexistent or inappropriate hosts. 27% of the queries sent to the root name servers result in such errors.The paper also presents the results of trace-driven simulations that explore the effect of varying TTLs and varying degrees of cache sharing on DNS cache hit rates. Due to the heavy-tailed nature of name accesses, reducing the TTLs of address (A) records to as low as a few hundred seconds has little adverse effect on hit rates, and little benefit is obtained from sharing a forwarding DNS cache among more than 10 or 20 clients. These results suggest that client latency is not as dependent on aggressive caching as is commonly believed, and that the widespread use of dynamic low-TTL A-record bindings should not greatly increase DNS related wide-area network traffic.