Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Duane Wessels"'
This document describes a protocol and new DNS Resource Record that can be used to provide a cryptographic message digest over DNS zone data. The ZONEMD Resource Record conveys the digest data in the zone itself. When a zone publisher includes an ZON
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d7254545af83c76e143401972955b44
https://doi.org/10.17487/rfc8976
https://doi.org/10.17487/rfc8976
Autor:
Willem Toorop, Taejoong Chung, Matthew Thomas, Wes Hardaker, Duane Wessels, Roland van Rijswijk-Deij, Moritz Müller
Publikováno v:
IMC '19: Proceedings of the Internet Measurement Conference, 1-14
STARTPAGE=1;ENDPAGE=14;TITLE=IMC '19
Internet Measurement Conference
STARTPAGE=1;ENDPAGE=14;TITLE=IMC '19
Internet Measurement Conference
The DNS Security Extensions (DNSSEC) add authenticity and integrity to the naming system of the Internet. Resolvers that validate information in the DNS need to know the cryptographic public key used to sign the root zone of the DNS. Eight years afte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::02ebf22655b50a03d82d0f5bdaee2e9b
https://doi.org/10.1145/3355369.3355570
https://doi.org/10.1145/3355369.3355570
Publikováno v:
ACM SIGCOMM Computer Communication Review. 42:80-86
Operators of high-profile DNS zones utilize multiple authority servers for performance and robustness. We conducted a series of trace-driven measurements to understand how current caching resolver implementations distribute queries among a set of aut
Publikováno v:
ACM SIGCOMM Computer Communication Review. 38:41-46
We analyzed the largest simultaneous collection of full-payload packet traces from a core component of the global Internet infrastructure ever made available to academic researchers. Our dataset consists of three large samples of global DNS traffic c
Publikováno v:
IEEE Symposium on Security and Privacy
The Domain Name System (DNS) seems ideal for connectionless UDP, yet this choice results in challenges of eavesdropping that compromises privacy, source-address spoofing that simplifies denial-of-service (DoS) attacks on the server and third parties,
Publikováno v:
Traffic Monitoring and Analysis ISBN: 9783319171715
TMA
TMA
The DANE (DNS-based Authentication of Named Entities) framework uses DNSSEC to provide a source of trust, and with TLSA it can serve as a root of trust for TLS certificates. This serves to complement traditional certificate authentication methods, wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff61d30d5f7fad347c6a66b7099ba276
https://doi.org/10.1007/978-3-319-17172-2_15
https://doi.org/10.1007/978-3-319-17172-2_15
Autor:
Alex Rousskov, Duane Wessels
Publikováno v:
Software: Practice and Experience. 34:187-211
This paper presents the design and implementation of Web Polygraph, a tool for benchmarking HTTP intermediaries. We discuss various challenges involved in simulating Web traffic and in developing a portable, high-performance tool for generating such
Publikováno v:
Computer Networks and ISDN Systems. 30:2131-2139
As the NLANR caching hierarchy has increased in size and complexity, researchers and users have had a difficult time depicting a comprehensive view of the overall topology. Planet Cache was one of the first attempts to visualize the hierarchy, but wa
Autor:
Duane Wessels, Alex Rousskov
Publikováno v:
Computer Networks and ISDN Systems. 30:2155-2168
Publikováno v:
INFOCOM Workshops
As more and more authority DNS servers turn on DNS security extensions (DNSSEC), it becomes increasingly important to understand whether, and how many, DNS resolvers perform DNSSEC validation. In this paper we present a query-based measurement method