{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T01:15:05Z","timestamp":1722906905906},"reference-count":17,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1049\/iet-ifs.2014.0386","type":"journal-article","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T12:49:46Z","timestamp":1436964586000},"page":"37-44","source":"Crossref","is-referenced-by-count":7,"title":["Information fusion\u2010based method for distributed domain name system cache poisoning attack detection and identification"],"prefix":"10.1049","volume":"10","author":[{"given":"Hao","family":"Wu","sequence":"first","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC)BeijingPeople's Republic of China"}]},{"given":"Xianglei","family":"Dang","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC)BeijingPeople's Republic of China"}]},{"given":"Lidong","family":"Wang","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC)BeijingPeople's Republic of China"}]},{"given":"Longtao","family":"He","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC)BeijingPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2016,1]]},"reference":[{"key":"e_1_2_9_2_2","unstructured":"Fetzer C. Pfeifer G. Jim T.: \u2018Enhancing DNS security using the SSL trust infrastructure\u2019.The Tenth Int. Workshop on Object\u2010Oriented Real\u2010Time Dependable Systems 2005 pp.21\u201327"},{"key":"e_1_2_9_3_2","unstructured":"Afonso J. Veiga P.: \u2018Enhancing DNS security using dynamic firewalling with network agents\u2019.Federated Conf. on Computer Science and Information Systems 2011 pp.777\u2013782"},{"issue":"5","key":"e_1_2_9_4_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MSP.2009.129","article-title":"Open issues in secure DNS deployment","volume":"7","author":"Chandramouli R.","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","first-page":"510","DOI":"10.4028\/www.scientific.net\/AMM.378.510","article-title":"Research on design and security strategy of DNS","volume":"378","author":"Ji H.","year":"2013","journal-title":"Appl. Mech. Mater."},{"issue":"3","key":"e_1_2_9_6_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2461321.2461324","article-title":"A proxy view of quality of domain name service, poisoning attacks and survival strategies","volume":"12","author":"Yuan L.","year":"2011","journal-title":"ACM Trans. Internet Technol."},{"key":"e_1_2_9_7_2","unstructured":"Kaminsky D.: \u2018Its the end of the cache as we know it\u2019.Black Hat Conf. 2008"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"Hubert A. vanMook R.: \u2018Measures for making DNS more resilient against forged answers\u2019 RFC 5452 2009","DOI":"10.17487\/rfc5452"},{"key":"e_1_2_9_9_2","unstructured":"CERT: \u2018Multiple DNS implementations vulnerable to cache poisoning\u2019. Technical Report Vulnerability Note 800113 2008"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"Dagon D.: \u2018Increased DNS forgery resistance through 0 \u00d7 20 bit encoding: security via leet queries\u2019.ACM Conf. on Computer and Communications Security 2008 pp.211\u2013222","DOI":"10.1145\/1455770.1455798"},{"key":"e_1_2_9_11_2","first-page":"3","article-title":"WSEC DNS: protecting recursive DNS resolvers from poisoning attacks","author":"Perdisci R.","year":"2009","journal-title":"DSN"},{"key":"e_1_2_9_12_2","first-page":"271","volume-title":"Security of patched DNS, lecture notes in computer science","author":"Herzberg A.","year":"2012"},{"key":"e_1_2_9_13_2","unstructured":"Herzberg A. Shulman H.: \u2018Fragmentation considered poisonous\u2019.IEEE Conf. on Communications and Network Security 2013"},{"key":"e_1_2_9_14_2","unstructured":"Herzberg A. Shulman H.: \u2018Towards adoption of DNSSEC: availability and security challenges\u2019.IEEE Conf. on Communications and Network Security 2013"},{"key":"e_1_2_9_15_2","unstructured":"Bau J. Mitchell J.C.: \u2018A security evaluation of DNSSEC with NSEC3\u2019.Network and Distributed Systems Security Symp. 2010"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"Musashi Y.: \u2018Detection of Kaminsky DNS cache poisoning attack\u2019.The Fourth Int. Conf. on Intelligent Networks and Intelligent Systems (ICINIS) 2011","DOI":"10.1109\/ICINIS.2011.18"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"Zdrnja B. Brownlee N. Wessels D.: \u2018Passive monitoring of DNS anomalies\u2019.The Fourth Int. Conf. DIMVA 2007\u00a0Lucerne Switzerland 2007","DOI":"10.1007\/978-3-540-73614-1_8"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"Herzberg A. Shulman H.: \u2018Unilateral antidotes to DNS poisoning\u2019.The Seventh Int. ICST Conf. SecureComm London 2011","DOI":"10.1007\/978-3-642-31909-9_18"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2014.0386","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2014.0386","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2014.0386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T03:04:06Z","timestamp":1610593446000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2014.0386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1049\/iet-ifs.2014.0386"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2014.0386","archive":["Portico"],"relation":{},"ISSN":["1751-8717","1751-8717"],"issn-type":[{"value":"1751-8717","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}