Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

DNS spoofing

Known as: Cache poisoning, Dns cache poisoning, Dns poisoning 
DNS spoofing, also referred to as DNS cache poisoning, is a form of computer hacking in which corrupt Domain Name System data is introduced into a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2013
2013
We present a new technique, which we call socket overloading, that we apply for off-path attacks on DNS. Socket overloading… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
  • S. Kumar, S. Tapaswi
  • Proceedings Title: International Conference on…
  • 2012
  • Corpus ID: 18264926
The Man-in-the-Middle (MITM) attack on ARP is presently a common attack and nuisance to the typical LAN environment. This type of… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
2011
2011
The field of academic security education today is dominated by defensive techniques. However, recently, offensive techniques… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We describe a novel, practical and simple technique to make DNS queries more resistant to poisoning attacks: mix the upper and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The address resolution protocol (ARP) is used by computers to map network addresses (IP) to physical addresses (MAC). The… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2007
2007
In this paper, we consider the problem of reducing the number of false positives generated by cooperative intrusion detection… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
DNS is a critical component of the operation of Internet applications.The Internet is greatly affected if DNS is attacked.DNS… Expand
Is this relevant?
2006
2006
The mapping service provided by the Domain Name System (DNS) is fundamental not only to the health of the Internet but also to… Expand
  • figure 5
Is this relevant?