
5 CONCLUSION
This paper describes a secure resolution scheme for
SLD. Our scheme requires the domain administra-
tor of SLD to generate a self-signed certificate to
run the secure resolution service and make a com-
pact DNSSEC configuration. The compact DNSSEC
is shrinking from full zone DNSSEC, which can ease
the operation burden of DNSSEC deployment. We
focus on making the recursive resolver gain the trust-
worthy authoritative server addresses of SLD, set up a
secure resolution channel by TLS, and finally defend
against domain hijack and privacy leakage. The eval-
uation result shows that our scheme has a low DDoS
amplification power, which can mitigate the DDoS
amplification attack caused by full zone DNSSEC, es-
pecially when many bots send vast amounts of queries
on critical SLD. Our future work is to do more impact
evaluation on our scheme and deploy it on the DNS
system.
REFERENCES
Bernstein, D. J. (2009). Dnscurve: Usable security for dns.
https://dnscurve.org/.
Contavalli, C., van der Gaast, W., Lawrence, D., and Ku-
mari, W. (2016). Rfc 7871: Client subnet in dns
queries.
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley,
R., and Polk, W. (2008). Internet x. 509 public key
infrastructure certificate and certificate revocation list
(crl) profile. Technical report.
Dukhovni, V., Huque, S., Toorop, W., Wouters, P., and
Shore, M. (2021). Rfc 9102 tls dnssec chain exten-
sion.
Elliott, A. and Moxley, J. (2023). The sad story of dnssec.
Gillmor, D., Salazar, J., and Hoffman, P. (2024). Rfc
9539: Unilateral opportunistic deployment of en-
crypted recursive-to-authoritative dns.
Hoffman, P. (2023). Rfc 9364: Dns security extensions
(dnssec).
Hoffman, P. and McManus, P. (2018). Rfc 8484: Dns
queries over https (doh).
Hoffman, P. and Schlyter, J. (2012). The dns-based authen-
tication of named entities (dane) transport layer secu-
rity (tls) protocol: Tlsa. Technical report.
Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
and Hoffman, P. (2016). Rfc 7858: Specification for
dns over transport layer security (tls).
Huitema, C., Dickinson, S., and Mankin, A. (2022). Rfc
9250: Dns over dedicated quic connections.
ICANN (2024). M11: Dnssec deployment in tld and
sld. https://usgv6-deploymon.antd.nist.gov/
snap-all.html.
ISC (2024). Cve-2023-50868: Preparing an nsec3 closest
encloser proof can exhaust cpu resources. https://
kb.isc.org/v1/docs/cve-2023-50868.
Kaplan, A. and Feibish, S. L. (2021). Dns water torture
detection in the data plane. In Proceedings of the SIG-
COMM’21 Poster and Demo Sessions, pages 24–26.
Kintis, P., Nadji, Y., Dagon, D., Farrell, M., and Anton-
akakis, M. (2016). Understanding the privacy im-
plications of ecs. In Detection of Intrusions and
Malware, and Vulnerability Assessment: 13th Inter-
national Conference, DIMVA 2016, San Sebasti
´
an,
Spain, July 7-8, 2016, Proceedings 13, pages 343–
353. Springer.
Laurie, B., Sisson, G., Arends, R., and Blacka, D. Rfc
5155-dns security (dnssec) hashed authenticated de-
nial of existence (2008). URL https://tools. ietf.
org/html/rfc5155.
Miek, G. (2014). Rfc 7129: Authenticated denial of exis-
tence in the dns.
Mockapetris, P. (1987). Domain names-concepts and facil-
ities. Technical report.
Murakami, T., Shimabukuro, K., Sato, N., Nakagawa, R.,
Jin, Y., and Yamai, N. (2023). Trustworthy name res-
olution using tls certificates with dot-enabled authori-
tative dns servers. In 2023 IEEE 47th Annual Comput-
ers, Software, and Applications Conference (COMP-
SAC), pages 1121–1126. IEEE.
Nawrocki, M., Jonker, M., Schmidt, T. C., and W
¨
ahlisch,
M. (2021). The far side of dns amplification: tracing
the ddos attack ecosystem from the internet core. In
Proceedings of the 21st ACM Internet Measurement
Conference, pages 419–434.
Nexusguard (2019). Dnssec fuels new wave of dns am-
plification. https://www.nexusguard.com/blog/
dnssec-fuels-new-wave-of-dns-amplification.
Pan, L. (2024). Compact dnssec for sld. https://github.
com/abbypan/compact_dnssec_dot_sld.
Pan, L., Qiu, R., and Yang, M. (2024). Asdwl: Mitigating
dns random subdomain attacks for second level do-
main. In 2024 International Conference on Smart Ap-
plications, Communications and Networking (Smart-
Nets), pages 1–4. IEEE.
Pub, F. (2012). Secure hash standard (shs). Fips pub,
180(4).
Ramdas, A. and Muthukrishnan, R. (2019). A survey on dns
security issues and mitigation techniques. In 2019 In-
ternational Conference on Intelligent Computing and
Control Systems (ICCS), pages 781–784.
Recursive, D. Nxnsattack: Recursive dns inefficiencies and
vulnerabilities.
Reddy, T., Wing, D., and Patil, P. (2017). Rfc 8094: Dns
over datagram transport layer security (dtls).
Rescorla, E. (2018). The transport layer security (tls) pro-
tocol version 1.3. Technical report.
Schlyter, J. (2004). Rfc 3845: Dns security (dnssec) nextse-
cure (nsec) rdata format.
Schmid, G. (2021a). Thirty years of dns insecurity: Cur-
rent issues and perspectives. IEEE Communications
Surveys & Tutorials, 23(4):2429–2459.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
622