Bortzmeyer, 2015 - Google Patents
RFC 7626: DNS privacy considerationsBortzmeyer, 2015
View PDF- Document ID
- 9711055766026027430
- Author
- Bortzmeyer S
- Publication year
External Links
Snippet
RFC 7626: DNS Privacy Considerations Page 1 Internet Engineering Task Force (IETF) S.
Bortzmeyer Request for Comments: 7626 AFNIC Category: Informational August 2015 ISSN:
2070-1721 DNS Privacy Considerations Abstract This document describes the privacy issues …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bortzmeyer | DNS privacy considerations | |
US8533822B2 (en) | Method and system for propagating network policy | |
USRE50068E1 (en) | Method and system for propagating network policy | |
Wicinski | DNS privacy considerations | |
Jin et al. | Design of detecting botnet communication by monitoring direct outbound DNS queries | |
Kintis et al. | Understanding the privacy implications of ecs | |
Yan et al. | The road to DNS privacy | |
Schlamp et al. | A forensic case study on as hijacking: the attacker's perspective | |
Zhou | A survey on fast-flux attacks | |
Ichise et al. | Analysis of DNS TXT record usage and consideration of botnet communication detection | |
Ichise et al. | Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications | |
García et al. | Large scale analysis of doh deployment on the internet | |
Zhang et al. | Characterization of blacklists and tainted network traffic | |
JP2007310781A (en) | Fake website prevention method and intermediate node | |
CA3027340A1 (en) | Secure personal server system and method | |
Chen et al. | Fault-tolerant control about integrity for descriptor systems | |
Nosyk et al. | The closed resolver project: Measuring the deployment of inbound source address validation | |
Bortzmeyer | RFC 7626: DNS privacy considerations | |
Čermák et al. | Detection of DNS traffic anomalies in large networks | |
Alao et al. | The need to improve DNS security architecture: An adaptive security approach | |
Hanzawa et al. | Analysis on malicious residential hosts activities exploited by residential IP proxy services | |
Fejrskov et al. | Using NetFlow to measure the impact of deploying DNS-based blacklists | |
Wicinski | RFC 9076: DNS Privacy Considerations | |
GUDEKLI et al. | DNS Tunneling Effect on DNS Packet Sizes | |
Brahmasani et al. | Two level verification for detection of DNS rebinding attacks |