Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,287,018 papers from all fields of science
Search
Sign In
Create Free Account
DNS hijacking
Known as:
DNS redirection
, Rogue DNS server
DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Add-ons for Firefox
Browser security
Captive portal
Communications protocol
Expand
Broader (2)
Internet privacy
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Service-based Fog architecture without DNS redirection
Mays F. Al-Naday
,
M. Reed
,
Janne Riihijärvi
,
D. Trossen
,
N. Thomos
,
Mohammed Q. S. Al-Khalidi
arXiv.org
2018
Corpus ID: 3666909
The heterogeneous and distributed nature of the Internet of Things (IoT) is driving the need for extremely fast and fine-grained…
Expand
2018
2018
fCDN: A Flexible and Efficient CDN Infrastructure without DNS Redirection or Content Reflection
Mays F. Al-Naday
,
M. Reed
,
Janne Riihijärvi
,
D. Trossen
,
N. Thomos
,
Mohammed Q. S. Al-Khalidi
arXiv.org
2018
Corpus ID: 3677745
Flexible and efficient CDNs are critical to facilitate content distribution in 5G+ architectures. Current CDNs suffer from…
Expand
2016
2016
DNS hijacking detection method
陈剑
2016
Corpus ID: 201133693
The invention discloses a DNS (Domain Name System) hijacking detection method. The DNS hijacking detection method includes the…
Expand
2016
2016
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment
Aziz Mohaisen
,
Ah Reum Kang
,
K. Ren
Web Information System and Application Conference
2016
Corpus ID: 5240170
DNS leakage happens when queries for names within a private namespace spread out to the public DNS infrastructure (Internet…
Expand
2015
2015
DNS-IDS: Securing DNS in the Cloud Era
Pratik Satam
,
H. Alipour
,
Y. Al-Nashif
,
S. Hariri
International Conference on Cloud and Autonomic…
2015
Corpus ID: 24503849
Recently, there has been a rapid growth in cloud computing due to their ability to offer computing and storage on demand, its…
Expand
Review
2015
Review
2015
Transport layer DDoS attack types and mitigation methods in networks
R. Zudin
2015
Corpus ID: 55990695
Zudin, Rodion Transport Layer DDoS Attack Types and Mitigation Methods In Networks Jyvaskyla: University of Jyvaskyla, 2015, 70p…
Expand
2011
2011
Network caching dns redirection methods and systems and subsystems
杨长盛
2011
Corpus ID: 108328427
The present invention provides a method and a system for network caching, a Domain Name System (DNS) redirection sub-system…
Expand
2011
2011
Analysis on the current and the future Internet structure regarding multi-homed and multi-path routing
H. Fujinoki
,
Andrew G. Hauck
Journal of Internet Services and Applications
2011
Corpus ID: 40260820
We analyzed how reliability will be improved by adopting inter-domain multi-path and multi-homing routing when the structure in…
Expand
2009
2009
Method for blocking bypass by combining DNS redirection with Http redirection
蔡暮章
,
贾大智
2009
Corpus ID: 195961574
A method for blocking bypass by combining DNS redirection with Http redirection comprises the following steps of: arranging…
Expand
2005
2005
Java Application's Packet Eavesdropper for content delivery network
Tzu-Chi Huang
,
C. Shieh
,
Yu-Ben Miao
19th International Conference on Advanced…
2005
Corpus ID: 2830749
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE