References

  1. DNS Checker Tool. Available at http://www.dnschecker.org/.
  2. Working Group 4 (2012): FINAL Report: DNS Best Practices. Technical Report. The Communications Security, Reliability and Interoperability Council III. Available at http://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRICIII_9-12-12_WG4-FINAL-Report-DNS-Best-Practices.pdf.
  3. E.-H. Alikacem & H.A. Sahraoui (2009): A Metric Extraction Framework Based on a High-Level Description Language. In: Source Code Analysis and Manipulation, 2009. SCAM '09. Ninth IEEE International Working Conference on, pp. 159–167, doi:10.1109/SCAM.2009.27.
  4. Thorsten Arendt, Enrico Biermann, Stefan Jurack, Christian Krause & Gabriele Taentzer (2010): Henshin: advanced concepts and tools for in-place EMF model transformations. In: Model Driven Engineering Languages and Systems. Springer, pp. 121–135, doi:10.1007/978-3-642-16145-2_9.
  5. D. Barr (1996): RFC 1912: Common DNS operational and configuration errors. International Engineering Task Force, Status: Standard. Available at http://www.ietf.org/rfc/rfc1912.txt.
  6. Enrico Biermann, Karsten Ehrig, Christian Köhler, Günter Kuhns, Gabriele Taentzer & Eduard Weiss (2006): EMF Model Refactoring based on Graph Transformation Concepts. ECEASST 3. Available at http://eceasst.cs.tu-berlin.de/index.php/eceasst/article/view/34.
  7. Dénes Bisztray, Reiko Heckel & Hartmut Ehrig (2008): Verification of Architectural Refactorings by Rule Extraction. In: Fundamental Approaches to Software Engineering, Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp. 347–361, doi:10.1007/978-3-540-78743-3_26.
  8. Emiliano Casalicchio, Marco Caselli, Alessio Coletta, Salvatore Di Blasi & IgorNai Fovino (2012): Measuring Name System Health. In: Jonathan Butts & Sujeet Shenoi: Critical Infrastructure Protection VI, IFIP Advances in Information and Communication Technology 390. Springer Berlin Heidelberg, pp. 155–169, doi:10.1007/978-3-642-35764-0_12.
  9. R. Chandramouli & S. Rose (2005): An integrity verification scheme for DNS zone file based on security impact analysis. In: Computer Security Applications Conference, 21st Annual, pp. 10 pp.–321, doi:10.1109/CSAC.2005.9.
  10. Microsoft Corporation (2001): Microsoft Responds to DNS Issues. Technical Report. Microsoft Corporation. Available at http://www.microsoft.com/en-us/news/press/2001/jan01/01-24dnspr.aspx.
  11. C. Deccio, J. Sedayao, K. Kant & P. Mohapatra (2010): Measuring Availability in the Domain Name System. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–5, doi:10.1109/INFCOM.2010.5462270.
  12. Casey Deccio (2010): Visual DNSSEC Troubleshooting with DNSViz. Technical Report. Sandia National Laboratories. Available at http://dnsviz.net/.
  13. Elvsoft: INTODNS, DNS Troubleshooting Tool. Available at http://www.intodns.com/.
  14. Martin Fowler (1999): Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston, MA, USA.
  15. A. Herzberg & H. Shulman (2013): DNSSEC: Security and availability challenges. In: Communications and Network Security (CNS), 2013 IEEE Conference on, pp. 365–366, doi:10.1109/CNS.2013.6682730.
  16. Andrew J. Kalafut, Craig A. Shue & Minaxi Gupta (2008): Understanding Implications of DNS Zone Provisioning. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC '08. ACM, New York, NY, USA, pp. 211–216, doi:10.1145/1452520.1452546.
  17. Verisign Labs (2012): Trabnsitive Trust Portal. Technical Report. Verisign Company. Available at http://trans-trust.verisignlabs.com.
  18. M. Lotter (1987): Rfc 1033: Domain Administrators Operations Guide. Work in Progress. Available at http://www.ietf.org/rfc/rfc1033.txt.
  19. Keyu Lu, Kaikun Dong, Cuihua Wang & Haiyan Xu (2014): DNS configuration detection model. In: Systems and Informatics (ICSAI), 2014 2nd International Conference on. IEEE, pp. 613–618, doi:10.1109/ICSAI.2014.7009359.
  20. R. Marinescu (2004): Detection strategies: metrics-based rules for detecting design flaws. In: Software Maintenance, 2004. Proceedings. 20th IEEE International Conference on, pp. 350–359, doi:10.1109/ICSM.2004.1357820.
  21. T. Mens & T. Tourwe (2004): A survey of software refactoring. Software Engineering, IEEE Transactions on 30(2), pp. 126–139, doi:10.1109/TSE.2004.1265817.
  22. Paul Mockapetris (1987): RFC 1034: Domain names: concepts and facilities. Work in Progress. Available at http://www.ietf.org/rfc/rfc1034.txt.
  23. Paul Mockapetris (1987): RFC 1035: Domain names—implementation and specification. Work in Progress. Available at http://www.ietf.org/rfc/rfc1035.txt.
  24. William F. Opdyke (1992): Refactoring Object-oriented Frameworks. University of Illinois at Urbana-Champaign, Champaign, IL, USA. UMI Order No. GAX93-05645.
  25. Eric Osterweil, Danny McPherson & Lixia Zhang (2011): Operational implications of the DNS control plane. IEEE Reliability Society Newsletter. Available at http://rs.ieee.org/images/files/newsletters/2011/2_2011/Operational Implications of the DNS Control Plane.pdf.
  26. Vasileios Pappas, Patrik Fältström, Daniel Massey & Lixia Zhang (2004): Distributed DNS troubleshooting. In: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality. ACM, pp. 265–270, doi:10.1145/1016687.1016694.
  27. Vasileios Pappas, D. Wessels, D. Massey, Songwu Lu, A. Terzis & Lixia Zhang (2009): Impact of configuration errors on DNS robustness. Selected Areas in Communications, IEEE Journal on 27(3), pp. 275–290, doi:10.1109/JSAC.2009.090404.
  28. Venugopalan Ramasubramanian & Emin Gün Sirer (2005): Perils of Transitive Trust in the Domain Name System. In: Proceedings of the 5th Conference on Internet Measurement 2005, Berkeley, California, USA, October 19-21, 2005. USENIX Association, pp. 379–384. Available at http://www.usenix.org/events/imc05/tech/ramasubramanian.html.
  29. Elz Robert, Bush Randy, Bradner Scott & Patton Michael (1997): RFC 2182: Selection and Operation of Secondary DNS Servers. International Engineering Task Force, Status: Standard. Available at http://www.ietf.org/rfc/rfc2182.txt.
  30. SE & AFNIC: ZoneMaster Tool. Available at http://www.zonemaster.net/.
  31. Duane Wessels, Marina Fomenkov, Nevil Brownlee & kc claffy (2004): Measurements and Laboratory Simulations of the Upper DNS Hierarchy. In: Chadi Barakat & Ian Pratt: Passive and Active Network Measurement, Lecture Notes in Computer Science 3015. Springer Berlin Heidelberg, pp. 147–157, doi:10.1007/978-3-540-24668-8_15.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org