Addressing Weaknesses in the Domain Name System Protocol

: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x

[1]  Jörgen Bo Madsen The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers , 1992, USENIX Summer.

[2]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[5]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[6]  Craig Hunt TCP/IP Network Administration , 1992 .

[7]  Ronald Paans,et al.  Auditing the SNA/SNI environment , 1991, Comput. Secur..

[8]  Stephen T. Kent,et al.  Internet Privacy Enhanced Mail , 1993, CACM.

[9]  Robert T. Braden,et al.  Requirements for Internet Hosts - Application and Support , 1989, RFC.

[10]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[11]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Denis Johnson In Palo Alto , 1982 .

[14]  W. Richard Stevens,et al.  Unix network programming , 1990, CCRV.

[15]  A. Fleischmann Distributed Systems , 1994, Springer Berlin Heidelberg.

[16]  Steven M. Bellovin,et al.  There Be Dragons , 1992, USENIX Summer.

[17]  Steven M. Bellovin Pseudo-Network Drivers and Virtual Networks , 1990 .

[18]  Steven M. Bellovin,et al.  Using the Domain Name System for System Break-ins , 1995, USENIX Security Symposium.

[19]  Paul Albitz,et al.  DNS and BIND , 1994 .