[1] |
Mockapetris P, Dunlap K J. Development of the domain name system[C]// Symposium proceedings on Communi-cations architectures and protocols. 1988: 123-133.
|
[2] |
孔宁. 物联网资源寻址关键技术研究[D]. 中国科学院研究生院(计算机网络信息中心), 2008.
|
[3] |
Mockapetris P V. Rfc1035: Domain names-implemen-tation and specification[S]. 1987.
|
[4] |
Z Hu, L Zhu, J Heidemann, A Mankin, D Wessels, P Hoffman. Specification for DNS over transport layer security (TLS)[S]. Internet Requests for Comments, IETF, RFC 7858, May 2016.
|
[5] |
P Hoffman and P McManus. DNS queries over HTTPS (DoH)[S]. Internet Requests for Comments, IETF, RFC 8484, October 2018.
|
[6] |
Yan Z, Lee J H. The road to DNS privacy[J]. Future Gen-eration Computer Systems, 2020, 112(1):604-611.
|
[7] |
胡宁, 邓文平, 姚苏. 互联网安全研究现状与挑战[J]. 网络与信息安全学报, 2017, 3(3):13-21
|
[8] |
Selena Deckelmann. Firefox continues push to bring DNS over HTTPS by default for US users[EB/OL].https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/, 2020.
|
[9] |
Lu C, Liu B, Li Z, et al. An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?[C]// Proceedings of the Internet Measurement Conference, 2019: 22-35.
|
[10] |
Atkins D, Austein R. Threat analysis of the domain name system (DNS)[R]. RFC 3833, August, 2004.
|
[11] |
ROSSEBO J, CADZOW S, SIJBEN P, et al. A threat, vulnerability and risk assessment method and tool for europe[C]// The International Conference on Availability, Reliability and Security. 2007:925-933.
|
[12] |
KONINGS B, BACHMAIER C, SCHAUB F, et al. Device names in the wild: Investigating privacy risks of zero configuration net- working[C]// The International Conference on Mobile Data Management, 2013:51-56.
|
[13] |
BANSE C, Herrmann D, FEDERRATH H. Tracking users on the Internet wi th behavioral patterns: evaluation of its practical feasibility[M]// Information Security and Privacy Research. Berlin Heidelberg: Springer, 2012:235-248.
|
[14] |
Deccio C, Davis J. DNS privacy in practice and prepara tion[C]// Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019: 138-143.
|
[15] |
Böttger T, Cuadrado F, Antichi G, et al. An Empirical Study of the Cost of DNS-over-HTTPS[C]// Proceedings of the Internet Measurement Conference, 2019: 15-21.
|
[16] |
Lu C, Liu B, Li Z, et al. An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?[C]// Proceedings of the Internet Measurement Conference, 2019: 22-35.
|
[17] |
SHULMAN H. Pretty bad privacy: pitfalls of DNS encryp- tion[C]// The Workshop on Privacy in the Elec-tronic Society, 2014:191-200.
|
[18] |
Schmitt P, Edmundson A, Feamster N. Oblivious DNS: Practical privacy for DNS queries[J]. arXiv preprint arXiv:1806.00276, 2018.
|
[19] |
Singanamalla S, Chunhapanya S, Vavruša M, et al. Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS[J]. arXiv preprint arXiv: 2011. 10121, 2020.
|
[20] |
Zhao F, Hori Y, Sakurai K. Analysis of privacy disclosure in DNS query[C]// 2007 International Conference on Multi-media and Ubiquitous Engineering (MUE’07). IEEE, 2007: 952-957.
|
[21] |
Hoang N P, Lin I, Ghavamnia S, et al. K-resolver: towards decentralizing encrypted DNS resolution[J]. arXiv preprint arXiv: 2001. 08901, 2020.
|
[22] |
Hounsel A, Schmitt P, Borgolte K, et al. Designing for Tussle in (Encrypted) DNS[J]. arXiv preprint arXiv: 2002. 09055, 2020.
|
[23] |
Pochat V L, Van Goethem T, Tajalizadehkhoob S, et al. Tranco: A research-oriented top sites ranking hardened against manipulation[J]. arXiv preprint arXiv: 1806. 01156, 2018.
|
[24] |
Daniel Stenberg. Publicly available servers[EB/OL]. https://github.com/curl/curl/wiki/DNS-over-HTTPS, 2021.
|