Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

DNS hijacking

Known as: DNS redirection, Rogue DNS server 
DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The heterogeneous and distributed nature of the Internet of Things (IoT) is driving the need for extremely fast and fine-grained… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
  • 陈剑
  • 2016
  • Corpus ID: 201133693
The invention discloses a DNS (Domain Name System) hijacking detection method. The DNS hijacking detection method includes the… Expand
2016
2016
Targeted security threats from resourceful adversaries have become a constant phenomenon on the Internet. One particularly… Expand
2015
2015
Abstract Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2015
2015
Recently, there has been a rapid growth in cloud computing due to their ability to offer computing and storage on demand, its… Expand
2012
2012
A multi-interfaced node is connected to multiple networks, some of which might be utilizing private DNS namespaces. A node… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2011
2011
An important pursuit by a body of criminological research is its endeavor to determine whether interventions or policy changes… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2005
2005
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2003
Highly Cited
2003
We collected data on the methods, scope, and depth of selective barriers to Internet usage through networks in China. Tests… Expand
  • figure 1