DNSAI project
A New Phase of Measuring DNS Abuse

June 8, 2023 · Rowena Schoo

Today the DNS Abuse Institute ("DNSAI" or the "Institute") adds a new level of reporting for our measurement project: DNSAI Compass™ ("Compass"). With his new level of reporting we intend to show the spectrum of how malicious phishing and malware is distributed across the DNS registration ecosystem.

Read more
Source Address Validation
SAV: Why Is Source Address Validation Still a Problem?

May 2, 2023 · Qasim Lone, Yevheniya Nosyk, and Maciej Korczyński

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification, and anonymity. In this post, we provide an introduction / refresher on what SAV is and discuss methods to detect non-compliant networks and the incentives that the industry must enact to make the deployment of SAV attractive.

Read more
Intercept and Inject
Intercept and Inject: DNS Response Manipulation in the Wild

April 7, 2023 · Yevheniya Nosyk, Qasim Lone, Yury Zhauniarovich, Carlos H. Gañán, Emile Aben, Giovane Moura, Samaneh Tajalizadehkhoob, Andrzej Duda, and Maciej Korczyński

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we look at the extent to which queries to DNS root servers get manipulated.

Read more
Measuring DNS Abuse
Measuring DNS Abuse: Our first report

Sep 16, 2022 · Rowena Schoo, Graeme Bunton, and Maciej Korczyński

In May 2022, we wrote about kicking off our work to measure DNS Abuse. We are proud to announce today that we have launched our first report and gone live with our measurement initiative: DNSAI Intelligence.

Read more
Measuring Inbound SAV
Are you filtering for inbound spoofed packets? Chances are you're not

Feb 15, 2021 · Yevheniya Nosyk, Maciej Korczyński, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, and Andrzej Duda

Source Address Validation (SAV) is the best current practice (BCP 38 / RFC 2827) aimed at filtering packets based on source IP addresses at the network edge. In this article, we show how to identify networks that do not deploy SAV for incoming traffic.

Read more