{"id":"https://openalex.org/W4389705298","doi":"https://doi.org/10.1109/tnsm.2023.3277880","title":"Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack","display_name":"Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack","publication_year":2023,"publication_date":"2023-05-19","ids":{"openalex":"https://openalex.org/W4389705298","doi":"https://doi.org/10.1109/tnsm.2023.3277880"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2023.3277880","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tnsm.2023.3277880","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112247192","display_name":"Keita Hasegawa","orcid":null},"institutions":[{"id":"https://openalex.org/I15807432","display_name":"Osaka Prefecture University","ror":"https://ror.org/02cf1je33","country_code":"JP","type":"education","lineage":["https://openalex.org/I15807432"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Keita Hasegawa","raw_affiliation_strings":["Department of Computer Science and Intelligent Systems, Osaka Prefecture University, Osaka, Sakai, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Intelligent Systems, Osaka Prefecture University, Osaka, Sakai, Japan","institution_ids":["https://openalex.org/I15807432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031244755","display_name":"Daishi Kondo","orcid":"https://orcid.org/0000-0003-1482-6148"},"institutions":[{"id":"https://openalex.org/I4387152983","display_name":"Osaka Metropolitan University","ror":"https://ror.org/01hvx5h04","country_code":"JP","type":"education","lineage":["https://openalex.org/I4387152983"]},{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daishi Kondo","raw_affiliation_strings":["Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan","institution_ids":["https://openalex.org/I69740276","https://openalex.org/I4387152983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093486730","display_name":"Masato Osumi","orcid":null},"institutions":[{"id":"https://openalex.org/I4387152983","display_name":"Osaka Metropolitan University","ror":"https://ror.org/01hvx5h04","country_code":"JP","type":"education","lineage":["https://openalex.org/I4387152983"]},{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masato Osumi","raw_affiliation_strings":["Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan","institution_ids":["https://openalex.org/I69740276","https://openalex.org/I4387152983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079881704","display_name":"Hideki Tode","orcid":"https://orcid.org/0000-0001-9443-7446"},"institutions":[{"id":"https://openalex.org/I4387152983","display_name":"Osaka Metropolitan University","ror":"https://ror.org/01hvx5h04","country_code":"JP","type":"education","lineage":["https://openalex.org/I4387152983"]},{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Tode","raw_affiliation_strings":["Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Core Informatics, Osaka Metropolitan University, Osaka, Japan","institution_ids":["https://openalex.org/I69740276","https://openalex.org/I4387152983"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112247192"],"corresponding_institution_ids":["https://openalex.org/I15807432"],"apc_list":null,"apc_paid":null,"fwci":0.8003,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74986917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"20","issue":"4","first_page":"3968","last_page":"3983"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.9254035353660583},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8100811839103699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7780817747116089},{"id":"https://openalex.org/keywords/name-server","display_name":"Name server","score":0.7238792181015015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.67545086145401},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5720000863075256},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.520112156867981},{"id":"https://openalex.org/keywords/round-robin-dns","display_name":"Round-robin DNS","score":0.5034691691398621},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.48895180225372314},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21952587366104126},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15877479314804077}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.9254035353660583},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8100811839103699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7780817747116089},{"id":"https://openalex.org/C105320234","wikidata":"https://www.wikidata.org/wiki/Q41494","display_name":"Name server","level":3,"score":0.7238792181015015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.67545086145401},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5720000863075256},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.520112156867981},{"id":"https://openalex.org/C102359118","wikidata":"https://www.wikidata.org/wiki/Q178163","display_name":"Round-robin DNS","level":4,"score":0.5034691691398621},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.48895180225372314},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21952587366104126},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15877479314804077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2023.3277880","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tnsm.2023.3277880","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1584130918","display_name":null,"funder_award_id":"JP21K17741","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1732614553","https://openalex.org/W1912248131","https://openalex.org/W1994926493","https://openalex.org/W1998458784","https://openalex.org/W2064675550","https://openalex.org/W2070364554","https://openalex.org/W2104692292","https://openalex.org/W2123845384","https://openalex.org/W2162969618","https://openalex.org/W2170280226","https://openalex.org/W2270641094","https://openalex.org/W2548640435","https://openalex.org/W2572255719","https://openalex.org/W2736920849","https://openalex.org/W2754471018","https://openalex.org/W2762020989","https://openalex.org/W2765188251","https://openalex.org/W2806616617","https://openalex.org/W2886805663","https://openalex.org/W2903228053","https://openalex.org/W2915352631","https://openalex.org/W2919984289","https://openalex.org/W2958882612","https://openalex.org/W2967412211","https://openalex.org/W2974311386","https://openalex.org/W2981762112","https://openalex.org/W3002314550","https://openalex.org/W3003933175","https://openalex.org/W3016083982","https://openalex.org/W3039182164","https://openalex.org/W3040590365","https://openalex.org/W3040837407","https://openalex.org/W3042735637","https://openalex.org/W3046467528","https://openalex.org/W3049187805","https://openalex.org/W3057691552","https://openalex.org/W3094011683","https://openalex.org/W3161297440","https://openalex.org/W3196285162","https://openalex.org/W4211029693","https://openalex.org/W4212794862","https://openalex.org/W4213362721","https://openalex.org/W4240908132","https://openalex.org/W4300559383","https://openalex.org/W6743493502","https://openalex.org/W6769916213","https://openalex.org/W6798822701","https://openalex.org/W6963499953"],"related_works":["https://openalex.org/W1598490273","https://openalex.org/W2183899684","https://openalex.org/W2384391311","https://openalex.org/W2073523380","https://openalex.org/W4299443900","https://openalex.org/W1542874264","https://openalex.org/W1569990158","https://openalex.org/W2065991182","https://openalex.org/W2054545906","https://openalex.org/W596534943"],"abstract_inverted_index":{"In":[0,87],"2016,":[1],"Dyn":[2],"Inc.,":[3],"a":[4,13,60,112,180],"managed":[5],"Domain":[6],"Name":[7],"System":[8],"(DNS)":[9],"service":[10],"provider,":[11],"experienced":[12],"DNS":[14,36,41,44,53,91,103,108,155,159],"water":[15],"torture":[16],"attack.":[17,169],"The":[18],"attackers":[19],"created":[20,166],"several":[21],"unique":[22],"and":[23,33,77,131],"unresolvable":[24],"fully":[25],"qualified":[26],"domain":[27],"names":[28],"(FQDNs)":[29],"with":[30],"random":[31],"labels":[32],"sent":[34],"malicious":[35,102],"queries":[37],"to":[38,55,100,114,151,157,164,178,183],"the":[39,51,66,71,74,83,90,105,126,168,171],"authoritative":[40,52,107,158],"server":[42,54,109],"via":[43],"cache":[45,92,118],"servers.":[46],"This":[47],"attack":[48,72,84],"eventually":[49],"caused":[50],"become":[56],"unserviceable.":[57],"We":[58],"propose":[59],"collaborative":[61],"defense":[62],"framework":[63,128],"that":[64,125,142],"minimizes":[65],"damage":[67],"by":[68],"quickly":[69],"detecting":[70],"on":[73,82,117],"victim":[75],"side":[76],"effectively":[78,129],"defending":[79],"against":[80,133],"it":[81],"source":[85],"side.":[86],"this":[88],"framework,":[89],"servers":[93,119],"(attack":[94],"source)":[95],"create":[96],"FQDN-based":[97],"allowlist":[98],"filters":[99,116],"eliminate":[101],"queries;":[104],"attacked":[106],"(victim)":[110],"sends":[111],"signal":[113],"activate":[115],"upon":[120],"detection.":[121],"Trace-driven":[122],"simulations":[123],"show":[124],"proposed":[127],"detects":[130],"protects":[132],"stealthy":[134],"attacks":[135],"circumventing":[136],"conventional":[137],"countermeasures.":[138],"Further,":[139],"we":[140],"find":[141],"disposable":[143,174],"domains,":[144],"which":[145],"are":[146],"designed":[147],"for":[148,167],"one-time":[149],"use":[150],"send":[152],"signals":[153],"from":[154],"clients":[156],"servers,":[160],"have":[161],"similar":[162],"characteristics":[163],"FQDNs":[165],"Moreover,":[170],"operation":[172],"of":[173],"domains":[175],"is":[176],"found":[177],"be":[179],"key":[181],"vulnerability":[182],"such":[184],"attacks.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
