D-mystifying the D-root address change

14Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

On January 3, 2013, the D-root DNS server hosted at the University of Maryland changed IP address. To avoid service disruption, the old address continues to answer queries. In this paper, we perform an initial investigation of the traffic at both the new and old addresses before, during, and since the flag day. The data we collected show non-obvious behavior: the overall query volume to the D-roots increases by roughly 50%, the old address continues to receive a high volume of queries months after the changeover, and far more queries to the old address succeed than those to the new one. Our analysis provides a window into how compliant resolvers change over and how non-standard and seemingly malicious re-solvers react (or not) to the IP address change. We provide evidence that a relatively small number of implementation errors account for nearly all discrepancies that are not misconfigurations or attacks. Copyright 2013 ACM.

Cite

CITATION STYLE

APA

Lentz, M., Levin, D., Castonguay, J., Spring, N., & Bhattacharjee, B. (2013). D-mystifying the D-root address change. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 57–62). https://doi.org/10.1145/2504730.2504772

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free