ccTLD phishing characterization
Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.
Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.
Guest Post: How does the NTP Pool map clients to NTP servers and how can it be improved?
Guest Post: Documenting ethical considerations, potential consequences, and lessons learned from public disclosure.
Guest Post: Measuring the structure of e-gov domain names.
Guest Post: RFC 9199 presents considerations to improve the security, resilience, and performance for large authoritative DNS server operators.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
Guest Post: How much of a problem are large DNS responses over UDP, in the wild?
Guest Post: The open-source DNS tool Anteater allows real time monitoring of operator infrastructure, using their own traffic.
Guest Post: Study shows big five content providers are at various stages of DNSSEC, IPv6 and TCP adoption.
Guest Post: Study shows that even the use of anycast with a short TTL on the authoritative server-side cannot match the gains of longer TTLs.