
CoNEXT ’19, December 9-12, 2019, Orlando, Florida, USA Rebekah Houser, Zhou Li, Chase Cotton, and Haining Wang
zero for some individual websites. Since the security vulnerability
of DoT has not yet been fully investigated, we expect that our re-
sults represent a baseline for the classification of DoT traffic. More
importantly, our findings will help future research to develop more
effective defense mechanisms against traffic analysis of DoT, and
help public DNS resolvers to use DoT for DNS communications in
a more secure manner.
9 ACKNOWLEDGMENTS
This material is based upon work supported by the National Science
Foundation Graduate Research Fellowship Program under Grant
No. 1247394. This work was also partially supported by the National
Science Foundation Grants CNS-1618117 and DGE-1821744. Any
opinions, findings, and conclusions or recommendations expressed
in this material are those of the authors and do not necessarily
reflect the views of the National Science Foundation.
REFERENCES
[1]
[n.d.]. Inferring the source of encrypted HTTP connections. In Proceedings of
the 13th ACM Conference on Computer and Communications Security, publisher
= ACM, author = Liberatore, Marc and Levine, Brian N., year = 2006,. Alexandria,
Virginia, USA.
[2]
[n.d.]. Mass XS-Search using Cache Attack. https://terjanq.github.io/Bug-
Bounty/Google/cache-attack- 06jd2d2mz2r0/index.html
[3]
[n.d.]. Optionally partition cache to prevent using cache for tracking.
Optionallypartitioncachetopreventusingcachefortracking
[4] [n.d.]. VIRUSTOTAL. https://www.virustotal.com/gui/home/upload
[5]
2017. Alexa Top Sites. https://docs.aws.amazon.com/AlexaTopSites/latest/index.
html
[6] 2018. About Stubby. https://github.com/getdnsapi/stubby
[7] 2019. DNSSEC Validation Rate by country. https://stats.labs.apnic.net/dnssec
[8]
2019. Estimating IPv6 & DNSSEC Deployment SnapShots. https://fedv6-
deployment.antd.nist.gov/snap-all.html
[9]
2019. Firefox Extended Support Release. https://www.mozilla.org/en-US/firefox/
organizations/
[10]
2019. Headless mode. https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/
Headless_mode
[11]
2019. Master Database URL Categories. https://www.forcepoint.com/product/
feature/master-database- url-categories
[12] 2019. TCPDUMP and LIBPCAP. https://www.tcpdump.org
[13] 2019. The top 500 sites on the web. https://www.alexa.com/topsites/category
[14] 2019. What’s going on with my Alexa Rank? https://support.alexa.com/hc/en-
us/articles/200449614-What- s-going- on-with- my-Alexa-Rank-
[15]
A. Bianco, G. Mardente, M. Mellia, M. Munafo, and L. Muscariello. 2009. Web User-
Session Inference by Means of Clustering Techniques. IEEE/ACM Transactions
on Networking 17, 2 (April 2009), 405–416.
[16]
S Bortzmeyer. 2015. DNS Privacy Considerations. RFC 7626. RFC Editor. 1–17
pages. https://tools.ietf.org/html/rfc7626
[17]
Michael Butkiewicz, Harsha V. Madhyastha, and Vyas Sekar. 2011. Understanding
Website Complexity: Measurements, Metrics, and Implications. In Proceedings of
the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC
’11). ACM, 313–328.
[18]
Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014. CS-BuFLO: A Congestion
Sensitive Website Fingerprinting Defense. In Proceedings of the 13th Workshop on
Privacy in the Electronic Society (WPES ’14). ACM, 121–130.
[19]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching
from a distance: website fingerprinting attacks and defenses. In Proceedings of
the 2012 ACM Conference on Computer and Communications Security (CCS ’12).
Raleigh, North Carolina, USA.
[20]
Sergio Castillo-Perez and Joaquin Garcia-Alfaro. 2008. Anonymous Resolution
of DNS Queries. In On the Move to Meaningful Internet Systems: OTM 2008.
987–1000.
[21]
Manu Chantra. 2018. DNS over TLS_ Encrypting DNS end-to-end - Facebook
Code.pdf.
[22]
Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel. 2003. Towards
Measuring Anonymity. In Privacy Enhancing Technologies (PET’03). 54–68.
[23]
John Dickinson and Sara Dickinson. 2019. DNS Privacy Implementation Status.
https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status
[24]
Sara Dickinson. 2019. Windows installer for Stubby. https://dnsprivacy.org/
wiki/display/DP/Windows+installer+for+Stubby
[25]
Chris Duckett. 2019. Google Public DNS gets DNS-over-TLS treatment. https:
//www.zdnet.com/article/google-public-dns-gets- dns-over- tls-treatment/
[26]
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012.
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
In 2012 IEEE Symposium on Security and Privacy. IEEE, San Francisco, CA, USA,
332–346.
[27]
S. Farrel and H. Tschofenig. 2014. Pervasive Monitoring Is an Attack. RFC 7258.
RFC Editor. 1–6 pages. https://tools.ietf.org/pdf/rfc7258.pdf
[28]
Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recognition Letters
27, 8 (June 2006), 861–874.
[29]
Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, and Christopher
Piosecny. 2011. Privacy-Preserving DNS: Analysis of Broadcast, Range Queries
and Mix-Based Protection Methods. In ESORICS 2011. 665–683.
[30]
M. Galar, A. Fernandez, E. Barrenechea, H. Bustince, and F. Herrera. 2012. A
Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and
Hybrid-Based Approaches. IEEE Transactions on Systems, Man, and Cybernetics,
Part C (Applications and Reviews) 42, 4 (July 2012), 463–484.
[31]
Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis. 2009. Evaluation
of Anonymized ONS Queries. arXiv:0911.4313 [cs] (Nov. 2009). arXiv: 0911.4313.
[32]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable
Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX
Security 16). USENIX Association, Austin, TX, 1187–1203.
[33]
Dominik Herrmann, Rolf Wendolsky, and Hannes Federrath. 2009. Website
fingerprinting: attacking popular privacy enhancing technologies with the multi-
nomial naïve-bayes classifier. In Proceedings of the 2009 ACM Workshop on Cloud
Computing Security (CCSW ’09). Chicago, Illinois, USA.
[34]
P. Hoffman and P. McManus. 2018. DNS Queries over HT TPS (DoH). Technical
Report RFC8484. RFC Editor. RFC8484 pages. https://www.rfc-editor.org/info/
rfc8484
[35]
Z. Hu, L. Zhu, J. Heidemann, A. Mankin, D. Wessels, and P. Hoffman. 2016.
Specification for DNS over Transport Layer Security (TLS). RFC 7858. RFC Editor.
1–19 pages. https://tools.ietf.org/html/rfc7858
[36]
Jaeyeon Jung, E. Sit, H. Balakrishnan, and R. Morris. 2002. DNS performance and
the effectiveness of caching. IEEE/ACM Transactions on Networking 10, 5 (Oct
2002), 589–603.
[37]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. 2014.
A Critical Evaluation of Website Fingerprinting Attacks. In Proceedings of the
2014 ACM SIGSAC Conference on Computer and Communications Security (CCS
’14). ACM, 263–274.
[38]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016.
Toward an Efficient Website Fingerprinting Defense. In ESORICS 2016. 27–46.
[39]
Shuai Li, Huajun Guo, and Nicholas Hopper. 2018. Measuring Information
Leakage in Website Fingerprinting Attacks and Defenses. In Proceedings of the
2018 ACM SIGSAC Conference on Computer and Communications Security (CCS
’18). ACM, 1977–1992.
[40]
Yanbin Lu and Gene Tsudik. 2009. Towards Plugging Privacy Leaks in Domain
Name System. arXiv:0910.2472 [cs] (Oct. 2009). arXiv: 0910.2472.
[41]
A. Mayrhofer. 2016. The EDNS(0) Padding Option. Technical Report RFC7830.
RFC Editor. RFC7830 pages. https://www.rfc-editor.org/info/rfc7830
[42]
A. Mayrhofer. 2018. Padding Policies for Extension Mechanisms for DNS (EDNS(0)).
RFC 8467. RFC Editor. 1–9 pages. https://tools.ietf.org/pdf/rfc8467
[43]
P Mockapetris. 1987. Domain Names - Concepts and Facilities. Technical Report
RFC 1034. RFC Editor. 1– 55 pages. https://w ww.rfc-editor.org/rfc/pdfrfc/rfc1034.
txt.pdf
[44]
P.V. Mockapetris. 1987. Domain names - implementation and specification. Tech-
nical Report RFC1035. RFC Editor. 1–55 pages. https://www.rfc-editor.org/info/
rfc1035
[45]
Giovane C. M. Moura, John Heidemann, Ricardo de O. Schmidt, and Wes Hardaker.
2019. Cache Me If You Can: Effects of DNS Time-to-Live (extended). In Proceedings
of the ACM Internet Measurement Conference. ACM, Amsterdam, theNetherlands.
[46]
Baiju Muthukadan. 2018. Selenium with Python. https://selenium-python.
readthedocs.io/#
[47]
B. Newton, K. Jeffay, and J. Aikat. 2013. The Continued Evolution of Web Traffic.
In 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation
of Computer and Telecommunication Systems. 80–89.
[48]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp,
Klaus Wehrle, and Thomas Engel. 2016. Website Fingerprinting at Internet Scale.
In Proceedings 2016 Network and Distributed System Security Symposium. Internet
Society, San Diego, CA.
[49]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. 2011.
Website fingerprinting in onion routing based anonymization networks. In Pro-
ceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society
(WPES ’11). Chicago, Illinois, USA.
[50]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M.
Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cour-
napeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine
Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.