Enumerating Privacy Leaks in DNS Data Collected Above the Recursive. Imana, B., Korolova, A., & Heidemann, J. In Proceedings of the ISOC NDSS Workshop on DNS Privacy , San Diego, California, USA, February, 2018. The Internet Society. Paper abstract bibtex As with any information system consisting of data derived from people’s actions, DNS data is vulnerable to privacy risks. In DNS, users make queries through recursive resolvers to authoritative servers. Data collected below (or in) the recursive resolver directly exposes users, so most prior DNS data sharing focuses on queries above the recursive resolver. Data collected above a recursive resolver has largely been seen as posing a minimal privacy risk since recursive resolvers typically aggregate traffic for many users, thereby hiding their identity and mixing their traffic. Although this assumption is widely made, to our knowledge it has not been verified. In this paper we re-examine this assumption for DNS traffic above the recursive resolver. First, we show that two kinds of information appear in query names above the recursive resolver: IP addresses and sensitive domain names, such as those pertaining to health, politics, or personal or lifestyle information. Second, we examine how often these classes of potentially sensitive names appear in Root DNS traffic, using 48 hours of B-Root data from April 2017.
@InProceedings{Imana18a,
author = "Basileal Imana and Aleksandra Korolova and John Heidemann",
title = "Enumerating Privacy Leaks in {DNS} Data
Collected Above the Recursive",
booktitle = "Proceedings of the " # " {ISOC} {NDSS} Workshop on {DNS} Privacy ",
year = 2018,
myorganization = "USC/Information Sciences Institute",
sortdate = "2018-02-18",
project = "ant, earr, retrofuturebridge, lacrend, researchroot, nipet",
month = feb,
address = "San Diego, California, USA",
publisher = "The Internet Society",
jlocation = "johnh: pafile",
keywords = "dns, privacy, data leak, PII",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.pdf",
talkurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a_talk.pdf",
dataseturl = "https://ant.isi.edu/datasets/readmes/DITL_B_Root-20170411.README.txt",
blogurl = "https://ant.isi.edu/blog/?p=1158",
icon = "Imana18a_icon.png",
abstract = "As with any information system consisting of data derived from
people’s actions, DNS data is vulnerable to privacy risks. In DNS,
users make queries through recursive resolvers to authoritative
servers. Data collected below (or in) the recursive resolver directly
exposes users, so most prior DNS data sharing focuses on queries above
the recursive resolver. Data collected above a recursive resolver has
largely been seen as posing a minimal privacy risk since recursive
resolvers typically aggregate traffic for many users, thereby hiding
their identity and mixing their traffic. Although this assumption is
widely made, to our knowledge it has not been verified. In this paper
we re-examine this assumption for DNS traffic above the recursive
resolver. First, we show that two kinds of information appear in query
names above the recursive resolver: IP addresses and sensitive domain
names, such as those pertaining to health, politics, or personal or
lifestyle information. Second, we examine how often these classes of
potentially sensitive names appear in Root DNS traffic, using 48 hours
of B-Root data from April 2017.",
}
Downloads: 0
{"_id":"mzEov8sAdg8ZnDtRw","bibbaseid":"imana-korolova-heidemann-enumeratingprivacyleaksindnsdatacollectedabovetherecursive-2018","author_short":["Imana, B.","Korolova, A.","Heidemann, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Basileal"],"propositions":[],"lastnames":["Imana"],"suffixes":[]},{"firstnames":["Aleksandra"],"propositions":[],"lastnames":["Korolova"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Heidemann"],"suffixes":[]}],"title":"Enumerating Privacy Leaks in DNS Data Collected Above the Recursive","booktitle":"Proceedings of the ISOC NDSS Workshop on DNS Privacy ","year":"2018","myorganization":"USC/Information Sciences Institute","sortdate":"2018-02-18","project":"ant, earr, retrofuturebridge, lacrend, researchroot, nipet","month":"February","address":"San Diego, California, USA","publisher":"The Internet Society","jlocation":"johnh: pafile","keywords":"dns, privacy, data leak, PII","url":"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.html","pdfurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.pdf","talkurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a_talk.pdf","dataseturl":"https://ant.isi.edu/datasets/readmes/DITL_B_Root-20170411.README.txt","blogurl":"https://ant.isi.edu/blog/?p=1158","icon":"Imana18a_icon.png","abstract":"As with any information system consisting of data derived from people’s actions, DNS data is vulnerable to privacy risks. In DNS, users make queries through recursive resolvers to authoritative servers. Data collected below (or in) the recursive resolver directly exposes users, so most prior DNS data sharing focuses on queries above the recursive resolver. Data collected above a recursive resolver has largely been seen as posing a minimal privacy risk since recursive resolvers typically aggregate traffic for many users, thereby hiding their identity and mixing their traffic. Although this assumption is widely made, to our knowledge it has not been verified. In this paper we re-examine this assumption for DNS traffic above the recursive resolver. First, we show that two kinds of information appear in query names above the recursive resolver: IP addresses and sensitive domain names, such as those pertaining to health, politics, or personal or lifestyle information. Second, we examine how often these classes of potentially sensitive names appear in Root DNS traffic, using 48 hours of B-Root data from April 2017.","bibtex":"@InProceedings{Imana18a,\n author = \"Basileal Imana and Aleksandra Korolova and John Heidemann\",\n title = \"Enumerating Privacy Leaks in {DNS} Data\n Collected Above the Recursive\",\n booktitle = \"Proceedings of the \" # \" {ISOC} {NDSS} Workshop on {DNS} Privacy \",\n year = 2018,\n\tmyorganization =\t\"USC/Information Sciences Institute\",\n\tsortdate = \t\"2018-02-18\", \n\tproject = \"ant, earr, retrofuturebridge, lacrend, researchroot, nipet\",\n month = feb,\n address = \"San Diego, California, USA\",\n publisher = \"The Internet Society\",\n\tjlocation = \t\"johnh: pafile\",\n\tkeywords = \t\"dns, privacy, data leak, PII\",\n\turl =\t\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.html\",\n\tpdfurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.pdf\",\n\ttalkurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a_talk.pdf\",\n\tdataseturl =\t\"https://ant.isi.edu/datasets/readmes/DITL_B_Root-20170411.README.txt\",\n\tblogurl = \"https://ant.isi.edu/blog/?p=1158\",\n\ticon = \"Imana18a_icon.png\",\n\tabstract = \"As with any information system consisting of data derived from\npeople’s actions, DNS data is vulnerable to privacy risks. In DNS,\nusers make queries through recursive resolvers to authoritative\nservers. Data collected below (or in) the recursive resolver directly\nexposes users, so most prior DNS data sharing focuses on queries above\nthe recursive resolver. Data collected above a recursive resolver has\nlargely been seen as posing a minimal privacy risk since recursive\nresolvers typically aggregate traffic for many users, thereby hiding\ntheir identity and mixing their traffic. Although this assumption is\nwidely made, to our knowledge it has not been verified. In this paper\nwe re-examine this assumption for DNS traffic above the recursive\nresolver. First, we show that two kinds of information appear in query\nnames above the recursive resolver: IP addresses and sensitive domain\nnames, such as those pertaining to health, politics, or personal or\nlifestyle information. Second, we examine how often these classes of\npotentially sensitive names appear in Root DNS traffic, using 48 hours\nof B-Root data from April 2017.\",\n}\n\n","author_short":["Imana, B.","Korolova, A.","Heidemann, J."],"bibbaseid":"imana-korolova-heidemann-enumeratingprivacyleaksindnsdatacollectedabovetherecursive-2018","role":"author","urls":{"Paper":"https://ant.isi.edu/%7ejohnh/PAPERS/Imana18a.html"},"keyword":["dns","privacy","data leak","PII"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","7nuQvtHTqKrLmgu99"],"keywords":["dns","privacy","data leak","pii"],"search_terms":["enumerating","privacy","leaks","dns","data","collected","above","recursive","imana","korolova","heidemann"],"title":"Enumerating Privacy Leaks in DNS Data Collected Above the Recursive","year":2018}