{"id":"https://openalex.org/W4200222642","doi":"https://doi.org/10.1109/iscc53001.2021.9631522","title":"Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection","display_name":"Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W4200222642","doi":"https://doi.org/10.1109/iscc53001.2021.9631522"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631522","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631522","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100682051","display_name":"Chaoqun Li","orcid":"https://orcid.org/0000-0002-1340-4990"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chaoqun Li","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103997045","display_name":"Qian Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Tan","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083915362","display_name":"Zhen Xu","orcid":"https://orcid.org/0000-0001-7011-3236"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101981613","display_name":"Xi Luo","orcid":"https://orcid.org/0000-0003-2478-1529"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xi Luo","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guanezhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guanezhou University, Guangzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101652359","display_name":"Liang Dai","orcid":"https://orcid.org/0000-0003-3944-754X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Dai","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100682051"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17739585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resolver","display_name":"Resolver","score":0.815375566482544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7516257166862488},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5443952679634094},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5067394375801086},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48781564831733704},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47824302315711975},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4641358256340027},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4638376832008362},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2169140875339508},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08853834867477417},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.0819425880908966}],"concepts":[{"id":"https://openalex.org/C80156102","wikidata":"https://www.wikidata.org/wiki/Q788036","display_name":"Resolver","level":3,"score":0.815375566482544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7516257166862488},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5443952679634094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5067394375801086},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48781564831733704},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47824302315711975},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4641358256340027},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4638376832008362},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2169140875339508},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08853834867477417},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.0819425880908966}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631522","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631522","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W358480618","https://openalex.org/W1513626637","https://openalex.org/W1528365302","https://openalex.org/W1581184532","https://openalex.org/W1828150029","https://openalex.org/W2028060714","https://openalex.org/W2070831748","https://openalex.org/W2111427271","https://openalex.org/W2114398364","https://openalex.org/W2116696275","https://openalex.org/W2763340581","https://openalex.org/W2969457648","https://openalex.org/W2994419048","https://openalex.org/W3023762229","https://openalex.org/W3037828815","https://openalex.org/W3081583844","https://openalex.org/W3093651667","https://openalex.org/W4232445383","https://openalex.org/W6630865316","https://openalex.org/W6634965539","https://openalex.org/W6677217071","https://openalex.org/W6677547120","https://openalex.org/W6778638949","https://openalex.org/W6782097390"],"related_works":["https://openalex.org/W1526923327","https://openalex.org/W2121484818","https://openalex.org/W2142531896","https://openalex.org/W2804343227","https://openalex.org/W2158159993","https://openalex.org/W2369328568","https://openalex.org/W2377847262","https://openalex.org/W4210337026","https://openalex.org/W1485337887","https://openalex.org/W2039540146"],"abstract_inverted_index":{"DNS":[0,45],"open":[1,24,74],"resolvers":[2,25,75,101],"represent":[3],"key":[4],"components":[5],"of":[6,22,38,91,117],"Internet":[7],"networks,":[8],"providing":[9],"recursive":[10],"resolution":[11],"services":[12],"for":[13,64],"all":[14],"users":[15,43],"across":[16],"the":[17,23,36,65,77,84,115],"Internet.":[18],"Monitoring":[19],"operational":[20],"profiles":[21],"is":[26],"crucial":[27],"in":[28,95],"analyzing":[29],"cyber":[30],"security":[31],"threats.":[32],"However,":[33],"due":[34],"to":[35,103],"lack":[37],"authentication":[39],"or":[40],"authorization":[41],"between":[42],"and":[44,70],"servers,":[46],"malicious":[47],"attackers":[48],"can":[49],"exploit":[50],"these":[51],"vulnerabilities":[52],"potentially.":[53],"In":[54,111],"this":[55],"paper,":[56],"we":[57,87,113],"design":[58],"an":[59],"efficient":[60],"long-term":[61],"scanning":[62],"scheme":[63],"entire":[66],"IPv4":[67],"address":[68],"space,":[69],"approximately":[71],"1.8":[72],"million":[73],"on":[76],"network":[78],"come":[79],"into":[80],"light.":[81],"By":[82],"investigating":[83],"response":[85],"packets,":[86],"observe":[88],"that":[89,124],"some":[90],"them":[92],"are":[93],"working":[94],"a":[96],"non-standard":[97],"way.":[98],"Moreover,":[99],"many":[100],"respond":[102],"user":[104],"requests":[105],"with":[106],"incorrect":[107],"(even":[108],"malicious)":[109],"information.":[110],"addition,":[112],"discover":[114],"existence":[116],"ghost":[118],"resolvers,":[119],"which":[120],"cache":[121],"domain":[122],"names":[123],"have":[125],"been":[126],"cleared.":[127]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
