May 16, 2023, 1:10 a.m. | Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi

cs.CR updates on arXiv.org arxiv.org

DNS manipulation is an increasingly common technique used by censors and
other network adversaries to prevent users from accessing restricted Internet
resources and hijack their connections. Prior work in detecting DNS
manipulation relies largely on comparing DNS resolutions with trusted control
results to identify inconsistencies. However, the emergence of CDNs and other
cloud providers practicing content localization and load balancing leads to
these heuristics being inaccurate, paving the need for more verifiable signals
of DNS manipulation. In this paper, we …

adversaries certificates connections control dns hijack identify internet manipulation network resolutions resources restricted results scale tls tls certificates work

Sr. Cloud Security Engineer

@ BLOCKCHAINS | USA - Remote

Network Security (SDWAN: Velocloud) Infrastructure Lead

@ Sopra Steria | Noida, Uttar Pradesh, India

Senior Python Engineer, Cloud Security

@ Darktrace | Cambridge

Senior Security Consultant

@ Nokia | United States

Manager, Threat Operations

@ Ivanti | United States, Remote

Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security

@ JPMorgan Chase & Co. | Columbus, OH, United States