publication . Preprint . 2017

SFCSD: A Self-Feedback Correction System for DNS Based on Active and Passive Measurement

Huang, Caiyun; Zhang, Peng; Liu, Junpeng; Sun, Yong; Zou, Xueqiang;
Open Access English
  • Published: 21 Apr 2017
Domain Name System (DNS), one of the important infrastructure in the Internet, was vulnerable to attacks, for the DNS designer didn't take security issues into consideration at the beginning. The defects of DNS may lead to users' failure of access to the websites, what's worse, users might suffer a huge economic loss. In order to correct the DNS wrong resource records, we propose a Self-Feedback Correction System for DNS (SFCSD), which can find and track a large number of common websites' domain name and IP address correct correspondences to provide users with a real-time auto-updated correct (IP, Domain) binary tuple list. By matching specific strings with SSL,...
free text keywords: Computer Science - Networking and Internet Architecture
Download from
27 references, page 1 of 2

[1] Alexa, “Top Sites in China,” 2017. [Online]. Available: http: //

[2] A. H. Alqahtani and M. Iftikhar, “TCP/IP attacks, defenses and security tools,” International Journal of Science and Modern Engineering (IJISME), vol. 1, no. 10, 2013.

[3] APNIC, “APNIC,” 2017. [Online]. Available:

[4] ARIN, “ARIN,” 2017. [Online]. Available:

[5] D. J. Bernstein, “Dnscurve: Usable security for dns,” dnscurve. org, 2009.

[6] S. Buyrukbilen and S. Bakiras, “Secure similar document detection with simhash,” in Workshop on Secure Data Management. Springer, 2013, pp. 61-75.

[7] R. Cox, A. Muthitacharoen, and R. Morris, “Serving DNS using a Peer-to-Peer Lookup Service,” Peer-to-Peer Systems, vol. 2429, pp. 155-165, 2002. [Online]. Available: content/ba8e6p26wbxq8gbc/

[8] H. Gao, V. Yegneswaran, J. Jiang, Y. Chen, P. Porras, S. Ghosh, and H. Duan, “Reexamining DNS from a Global Recursive Resolver Perspective,” IEEE/ACM Transactions on Networking, vol. 24, no. 1, pp. 43-57, 2016.

[9] S. Hanley, “DNS overview with a discussion of DNS spoofing,” 2000.

[10] H. S. Hmood, Z. Li, H. K. Abdulwahid, and Y. Zhang, “Adaptive caching approach to prevent DNS cache poisoning attack,” The Computer Journal, vol. 58, no. 4, pp. 973-985, 2015.

[11] IPIP, “IPIP,” 2017. [Online]. Available:

[12] A. K. Jain and B. Gupta, “A novel approach to protect against phishing attacks at client side using auto-updated white-list,” EURASIP Journal on Information Security, vol. 2016, no. 1, pp. 1-11, 2016.

[13] M. Ku¨hrer, T. Hupperich, J. Bushart, C. Rossow, and T. Holz, “Going wild: Large-scale classification of open dns resolvers,” in Proceedings of the 2015 ACM Conference on Internet Measurement Conference. ACM, 2015, pp. 355-368.

[14] M. Larson, D. Massey, S. Rose, R. Arends, and R. Austein, “DNS security introduction and requirements,” 2005.

[15] T. Liu, A. X. Liu, J. Shi, Y. Sun, and L. Guo, “Towards fast and optimal grouping of regular expressions via dfa size estimation,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 10, pp. 1797-1809, 2014.

27 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue