Abstract
Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of open resolvers to gauge their potentially negative impact on the security and stability of the Internet. In this study, we conducted a comprehensive probing over the entire IPv4 address space and found that more than 3 million open resolvers still exist in the wild. More importantly, we found that many open resolvers answer queries with the incorrect, even malicious, responses. Contrasting to results obtained in 2013, we found that the number of open resolvers has decreased significantly, while the number of open resolvers providing malicious responses has increased.
Original language | English |
---|---|
Title of host publication | CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019 |
Publisher | Association for Computing Machinery, Inc |
Pages | 45-46 |
Number of pages | 2 |
ISBN (Electronic) | 9781450370066 |
DOIs | |
Publication status | Published - 9 Dec 2019 |
Event | 15th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2019 - Part of CoNEXT 2019 - Orlando, United States Duration: 9 Dec 2019 → 12 Dec 2019 |
Publication series
Name | CoNEXT 2019 Companion - Proceedings of the 15th International Conference on Emerging Networking EXperiments and Technologies, Part of CoNEXT 2019 |
---|
Conference
Conference | 15th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2019 - Part of CoNEXT 2019 |
---|---|
Country/Territory | United States |
City | Orlando |
Period | 9/12/19 → 12/12/19 |
Bibliographical note
Publisher Copyright:© 2019 held by the owner/author(s).