{"id":"https://openalex.org/W2013260300","doi":"https://doi.org/10.1109/pdcat.2011.69","title":"Prevent DNS Cache Poisoning Using Security Proxy","display_name":"Prevent DNS Cache Poisoning Using Security Proxy","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W2013260300","doi":"https://doi.org/10.1109/pdcat.2011.69","mag":"2013260300"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pdcat.2011.69","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001401297","display_name":"Lejun Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lejun Fan","raw_affiliation_strings":["Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057538607","display_name":"Yuanzhuo Wang","orcid":"https://orcid.org/0000-0002-6799-1756"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanzhuo Wang","raw_affiliation_strings":["Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029998682","display_name":"Xueqi Cheng","orcid":"https://orcid.org/0000-0002-5201-8195"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueqi Cheng","raw_affiliation_strings":["Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100679106","display_name":"Jinming Li","orcid":"https://orcid.org/0009-0001-4654-7445"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinming Li","raw_affiliation_strings":["Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.092,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":14,"citation_normalized_percentile":{"value":0.903078,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"393"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.45927578}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8244264},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.79078317},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.57943946},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5624837},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5587771},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5341669},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.47463903},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.45927578},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23365754},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1748386},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16741067}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pdcat.2011.69","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W1927311981","https://openalex.org/W1996201018","https://openalex.org/W2011587600","https://openalex.org/W2079569045","https://openalex.org/W2097981871","https://openalex.org/W2123659539","https://openalex.org/W2135195977","https://openalex.org/W2149553186","https://openalex.org/W2167370920","https://openalex.org/W4232820472"],"related_works":["https://openalex.org/W4246205831","https://openalex.org/W3004039032","https://openalex.org/W2782172150","https://openalex.org/W2768042414","https://openalex.org/W2611421239","https://openalex.org/W2581250286","https://openalex.org/W2358152254","https://openalex.org/W2183899684","https://openalex.org/W2073523380","https://openalex.org/W2012920909"],"abstract_inverted_index":{"DNS":[0,16,36,88,139,144],"has":[1,84,183],"been":[2,73],"suffering":[3],"from":[4,170],"cache":[5,163],"poisoning":[6,164],"attack":[7],"for":[8],"a":[9,123],"long":[10],"time.":[11,93],"The":[12,129,147],"attacker":[13,82],"sends":[14],"camouflaged":[15],"response":[17,47],"to":[18,44,52,75,86,109],"trick":[19],"the":[20,30,34,46,56,69,77,81,119,162,172,187,191],"domain":[21],"name":[22],"server,":[23],"and":[24,68,111,135,153,159,174,195],"inserts":[25],"malicious":[26],"resource":[27],"record":[28],"into":[29],"cached":[31],"database.":[32],"Because":[33],"original":[35,188],"protocol":[37],"only":[38],"depends":[39],"on":[40,137],"16-bit":[41],"transaction":[42,63,189],"ID":[43],"verify":[45],"packet,":[48],"it":[49],"is":[50,106,112],"prone":[51],"be":[53,132],"guessed":[54],"by":[55],"attacker.":[57],"Although":[58],"many":[59],"strategies":[60],"such":[61,98],"as":[62,99],"randomizing,":[64],"source":[65,192],"port":[66,193],"randomizing":[67,194],"0\u00d720":[70,196],"technique":[71],"have":[72],"applied":[74],"improve":[76],"resistance":[78],"of":[79,143],"DNS,":[80],"still":[83],"chance":[85],"poison":[87],"server":[89,140,145],"in":[90],"an":[91],"acceptable":[92],"Other":[94],"more":[95],"complicated":[96],"strategy":[97,125,169],"DNSSEC":[100],"which":[101],"provides":[102],"stricter":[103],"prevention":[104],"mechanism":[105],"not":[107,113],"easy":[108],"deploy":[110],"widely":[114],"adopted":[115],"yet.":[116],"To":[117],"address":[118],"problem,":[120],"we":[121,177],"present":[122],"novel":[124],"called":[126],"Security":[127,154,181],"Proxy.":[128],"architecture":[130],"can":[131,157],"easily":[133],"implemented":[134],"deployed":[136],"existing":[138],"without":[141],"modification":[142],"itself.":[146],"embedded":[148],"two":[149],"schemes":[150],"Selective":[151],"Re-Query":[152],"Label":[155],"Communication":[156],"cooperate":[158],"effectively":[160],"prevent":[161],"attack.":[165],"We":[166],"analyze":[167],"our":[168,180],"both":[171],"capability":[173],"efficiency.":[175],"Then":[176],"find":[178],"that":[179],"Proxy":[182],"obvious":[184],"advantage":[185],"over":[186],"ID,":[190],"techniques.":[197]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2013260300","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-03-19T08:43:41.528478","created_date":"2016-06-24"}