<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decentralised DNS Resolution Based on Distributed Ledger Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>George Giamouridis</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>BooJoong Kang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Leonardo Aniello</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Electronics and Computer Science, University of Southampton</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The Domain Name System (DNS) is the backbone of the Internet, but remains highly centralised, creating risks related to censorship, surveillance, and single points of failure. While much of the focus has been on securing and decentralising DNS as a whole, recursive resolvers continue to rely on central infrastructure. This paper proposes a decentralised DNS resolver architecture that replaces traditional recursive resolvers with a decentralised alternative. The system uses the Chord protocol and distributed ledger technology (DLT) to distribute DNS resolution across a network of cooperating nodes, without altering existing zone authority structures. We present the key components of the architecture, including peer discovery, query routing, caching, updating and trust handling, and we analyse how this architecture overcomes the previously mentioned limitations.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Blockchain</kwd>
        <kwd>Domain Name System</kwd>
        <kwd>Decentralisation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The DNS is a distributed, hierarchical system responsible for mapping domain names to IP
addresses on the Internet. Despite its distributed design, much of its infrastructure relies on
centralised components, especially recursive resolvers. These resolvers handle most DNS trafic
by acting as intermediaries between clients and authoritative servers. NS1’s 2023 Global DNS
Trafic Report [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] shows public resolvers handle nearly 60% of recursive DNS trafic, with Google
at over 30% and AWS at 16%. ISP resolvers, such as those run by Xfinity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and T-Mobile [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
account for 9%, but they’re regionally concentrated and subject to similar central controls. The
rest includes private, enterprise, and smaller caching resolvers. Despite DNS’s design, query
resolution remains largely centralised.
      </p>
      <p>
        This centralisation introduces critical vulnerabilities, including single points of failure,
exposure of user queries to potential surveillance, and censorship through manipulated resolver
responses [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Notably, the 2016 Dyn DDoS attack [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] disrupted major websites, like Twitter,
Spotify, and Reddit, showing how resolver-level failures can impact large parts of the Internet.
Centralised resolvers also enable surveillance, as seen in the NSA’s PRISM program [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which
intercepted DNS queries without user consent. Additionally, censorship practices like China’s
Great Firewall [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] systematically alters DNS responses at the resolver level to block access to
specific websites. These cases highlight the security, privacy, and censorship risks of centralised
DNS, underscoring the need for an alternative resolution system.
      </p>
      <p>To address these issues, this paper proposes a decentralised DNS resolver architecture. Unlike
traditional DNS resolvers that rely on centralised authorities, the proposed architecture uses a
Chord DHT and distributed ledger technology (DLT) to decentralise both DNS query resolution
and record updates across a network of nodes. The DHT assigns DNS records to nodes, and it
handles lookup, routing, and replication, while a permissioned blockchain-based DLT ensures
consistency during updates, even if some nodes are malicious. The primary objectives of this
architecture are to improve availability, reduce reliance on trusted third parties, strengthen
resistance to censorship and tampering and address security threats related to the DNS resolver
itself. Threats originating from or targeting the DNS Root, TLD, and Authoritative Name Servers
are considered out of scope. This paper outlines the system’s architecture and the mechanisms
enabling secure cooperation between nodes.</p>
      <p>The rest of the paper is structured in four sections. The background section provides the
foundational context, followed by related work that highlights existing solutions. The
architecture section provides a high-level overview of the proposed system, and describes the design
principles and processes. Finally, the discussion section reflects on the implications of the
traditional DNS architecture and explains how the proposed design overcomes those limitations.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. The Domain Name System (DNS)</title>
        <p>
          DNS operates on a client-server model with a hierarchical and distributed protocol [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. When a
stub resolver (integrated into the end user’s device) requests a domain name, it first contacts
a recursive DNS resolver as shown in Figure 1. If the resolver has the requested information
cached, it returns the IP address directly.
        </p>
        <p>
          If the information is not in the cache or has expired, the resolver queries root DNS servers
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] to identify the authoritative DNS server for the top-level domain (TLD) (e.g., ".com", ".org").
It then queries the TLD server [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] for the authoritative name server (ANS) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] of the domain.
Once the resolver obtains the IP address of the ANS, it queries the authoritative server for the
domain’s IP address. After receiving the IP address, the resolver caches it for future use [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ],
and the result is returned to the user’s device, allowing it to connect to the Web server.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. The Chord Protocol</title>
        <p>
          Chord is a structured peer-to-peer (P2P) protocol for scalable, decentralized key-based lookup
in distributed systems [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. It uses consistent hashing to assign data keys and node identifiers
to a circular space of size 2, where  is the number of bits in the hash function (e.g., SHA-1).
Each key is stored at its successor node, the first node whose ID is equal to or greater than the
key. For eficient routing, each node maintains a finger table [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] with up to  entries. The
-th entry points to the node responsible for key ( + 2− 1) mod 2, where  is the node’s ID.
This design enables (log  ) lookup time, with  being the number of nodes (peers). Chord
includes stabilisation mechanisms to handle node joins and leaves, ensuring consistent key
assignment and correct routing.
        </p>
        <p>A DHT is a decentralized storage system that maps keys to values and distributes this
mapping across a network of nodes without requiring central coordination. In Chord, the DHT
is implemented by storing key-value pairs at the node responsible for each key, as determined
by the consistent hashing scheme. This enables eficient insertion, lookup, and replication of
data in a fully decentralized manner.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>
        Several studies have explored decentralised DNS approaches and their potential benefits and
limitations. Blockchain-based DNS (BDNS) is one of the most popular ones, with Namecoin [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]
being the first attempt to decentralise DNS and provide a blockchain alternative to traditional
systems. Giamouridis et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] provide a comprehensive review of existing BDNS systems and
evaluates their potential to transform the domain name landscape.
      </p>
      <p>
        Liu et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] propose a transitional architecture that integrates legacy DNS with a
peer-topeer network, improving data availability and query eficiency while retaining DNS elements.
Danielis and Altmann [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] introduce P-DONAS, a DHT-based P2P DNS for ISP access nodes that
reduces DNS trafic load and operational cost while maintaining compatibility with traditional
DNS. Sancho and Pereira [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] present an open, censorship-resistant DNS using a P2P network
and distributed, user-verifiable zone files, enabling users to bypass censorship with selective
trust. Cox and Muthitacharoen [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] explore using DHash over Chord for DNS record storage,
aiming to decouple domain ownership from hosting responsibilities and simplify administration.
Song and Koyanagi [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] propose a hybrid DNS model combining DHT robustness with the
eficiency of traditional DNS to mitigate latency issues in purely P2P-based systems. The work
by Berners-Lee et al [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] discusses OpenNIC in the context of alternative Internet governance
models, discusses OpenNIC in the context of alternative Internet governance models, focusing
on its role as a decentralised DNS solution.
      </p>
      <p>Contrary to existing decentralised DNS solutions, that focus on modifying the traditional
DNS infrastructure, this paper proposes a distinct approach by introducing an alternative
architecture at the recursive resolver level. While prior systems aim to replace the root and the
authoritative name servers, this architecture shifts the focus to replacing the recursive resolver
with a decentralised network. By distributing resolver functionality through this network
in combination with consensus-based updates, the system improves availability, censorship
resistance, and trust without interfering with existing DNS hierarchies.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Constructing the Resolver: A High-Level Overview</title>
      <p>Our decentralised DNS resolver is designed to address the limitations of traditional centralised
DNS resolution systems. The goal is to eliminate reliance on centralised recursive resolvers,
which introduce privacy risks, single points of failure, and potential censorship, by distributing
the resolution process across independent nodes.</p>
      <p>
        As shown in Figure 2, in our model each node  ∈  is placed on a Chord ring and stores a
subset  ⊂  called a chunk, where  is the initial global dataset of DNS records. The peers
responsible for handling the same chunk  form a permissioned blockchain [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], which is
used solely for updating the chunk. The service is only accessible to nodes that have joined the
network as peers. When a DNS request is initiated, the node uses the Chord DHT to locate the
node responsible for the relevant chunk and extracts the full domain record. This resolution
process operates in a decentralised manner, with the DHT providing an up-to-date list of peers
with their corresponding chunks.
      </p>
      <p>DNS records are time sensitive, meaning that entries expire based on time-to-live (TTL)
values, and new records are frequently added or updated. As a result, many queries may fail if
the necessary data is unavailable locally or in the relevant peer set. In this situation, when a
node cannot resolve a query from local or peer stored data, it initiates the resolution process
from the root servers, traversing the DNS hierarchy as needed (root → TLD → authoritative
servers). This approach removes the dependency on any external recursive resolver, retains
decentralisation, and guarantees completeness in query resolution.</p>
      <sec id="sec-4-1">
        <title>4.1. Storage Model and Node Initialisation</title>
        <p>The global dataset of DNS records is partitioned into  chunks and distributed using the
Chordbased DHT. Each chunk  contains a subset of domain name to IP mappings (DNS records),
corresponds to the -th partition where  ∈ {1, 2, . . . ,  }, and is stored by a set of peers. A
unique key  = () is assigned to each chunk by applying a cryptographic hash function 
(e.g., SHA-1) to its content. These keys are mapped onto the Chord identifier ring. Each chunk
is assigned to the first node in the ring whose identifier is equal to or greater than , known
as the successor node. To improve consistency (as explained in Section 4.2), replicas of each
chunk are also stored at the next  successors in the ring, where 1 ≤  ≪  . This assignment
ensures uniform distribution of chunks across the network, supports eficient query routing
with (log  ) hops, and maintains resilience to node joins and leaves. The DHT manages both
the placement and retrieval of chunks in , enabling dynamic membership and reliable access
to DNS data.</p>
        <p>
          To join the network, a node connects to one or more known bootstrap peers [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ], which
serve as initial contact points. After verifying the connection and protocol compatibility, the
node uses the DHT’s routing mechanism to discover existing peers. The new node checks for
which key it should take responsibility based on its position in the identifier space and requests
the relevant chunk from the current responsible nodes. Replication is updated to reflect the new
topology. The new node and its successors now share responsibility for storing the afected
chunks, ensuring availability and redundancy.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Processing DNS Queries</title>
        <p>To resolve a domain , the node applies the function ℳ, which hashes  using a cryptographic
hash function  (e.g., SHA-1), producing the key  for the corresponding chunk , so ℳ() =
() = . If the node does not store the relevant , it uses the Chord DHT to locate the set
of peers responsible for that chunk (lookup). The DHT enables eficient routing to the correct
nodes based on the chunk’s key. The node queries these peers and collects their responses.
Each response is checked for structural validity, ensuring it contains required DNS fields such
as name, type, TTL, and value. Invalid or abnormal responses are discarded. From the valid
responses, the node evaluates majority agreement. If a majority return matching records, the
result is accepted; otherwise is rejected.</p>
        <p>Let  = {1, 2, . . . , } be the set of replies.</p>
        <p>If ∃ such that |{ ∈  |  = }| &gt; 2</p>
        <p>Otherwise, reject the response.</p>
        <p>, then accept .</p>
        <p>If the requested DNS record  is not found within any chunk  ( ∈/ ) stored in the
network, the node initiates a fallback procedure, performing recursive resolution via the standard
DNS hierarchy as explained in Section 2.1. Once the record is retrieved, the node completes the
DNS request and shares the new record to be added to the network, as explained in Section 4.3.</p>
        <p>If the record is not returned by the traditional DNS, the protocol responds with an NXDOMAIN
message, indicating the non existence of the requested domain. This process ensures that any
domain resolution can be traced back through the authoritative DNS chain, providing a fallback
mechanism while maintaining the decentralised nature of the system.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Updating DNS Records</title>
        <p>Updating the network involves two main scenarios: updating an existing DNS record due to
expiration, and adding a new DNS record that comes from the fallback request to the traditional
DNS. Records in the network are updated based on their TTL values, as is the case with
traditional DNS resolvers. When a record expires, it is automatically updated by querying
the traditional DNS and going through the consensus process as will be explained further
below. In both cases, the network must ensure that the records remain consistent, accurate,
and available across more nodes (expired or modified records need to be replaced, while new
records must be introduced into the network). To achieve consistency and tolerate malicious
nodes, a permissioned blockchain is used to manage DNS record updates. A permissioned
blockchain is chosen over a permissionless one to avoid transaction fees and reduce overhead
(e.g., computational and storage). This blockchain operates at the chunk level, meaning that
peers managing the same chunk of DNS records act as a permissioned blockchain to validate
and record updates. When serving DNS requests, however, these peers operate as part of the
Chord DHT for eficient lookups.</p>
        <p>DNS Record Update When a record expires (based on its TTL value), the nodes storing it
are responsible for fetching an updated copy from the traditional DNS and updating their
local version. When the record old is updated, the responsible nodes submit a transaction
update(old, new) to their blockchain. The consensus mechanism of the blockchain ensures
that only valid updates are accepted based on rules such as record format and TTL validity. All
peers storing the chunk  containing old participate in the consensus process cons, which
validates the update:
cons(update) =
{︃valid,</p>
        <p>Once the update is validated, the updated record new is stored locally by all nodes responsible
for chunk .</p>
        <p>Update(IP, new())
∀ IP ∈</p>
        <p>This process guarantees that all nodes storing the chunk agree on the update, ensuring the
integrity and consistency of the record across the network.</p>
        <p>Adding a New Record When a requested record is not stored in a chunk, the nodes managing
that chunk are responsible for retrieving and storing the record. The nodes perform a fallback
to the traditional DNS to retrieve it and insert it into their chunk. The requesting node uses the
DHT to determine which chunk the retrieved record belongs to as explained in Section 4.2. If
the node stores the relevant chunk, it notifies the other nodes on its blockchain about the new
record insertion. All nodes are responsible for falling back to the traditional DNS to retrieve the
record. They then submit a transaction new(new()) to the blockchain, following the DNS
record update process described above. The same consensus process cons is used for validation.
cons(new) =
{︃valid,</p>
        <p>if consensus is reached
invalid, if consensus fails</p>
        <p>Once validated, the new record new() is added to the corresponding chunk and stored by
the responsible peers.</p>
        <p>Add(IP, new())</p>
        <p>If the requested record is in a chunk managed by other nodes, the node uses the DHT to
identify them and forwards the request. Those nodes then retrieve the record via fallback
to traditional DNS, submit the transaction to the blockchain, and follow the record insertion
process.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>In this section, we analyse the strengths of the proposed architecture compared to traditional
DNS, highlighting its advantages in terms of decentralisation, security, and transparency. By
addressing key weaknesses in the traditional DNS architecture, the system ensures greater
resilience against failures, tampering, and censorship, and shows how the proposed design
overcomes those limitations. Below, we explore these improvements in detail.
Centralisation and Single Points of Failure As discussed in Section 2, traditional DNS
resolvers depend on centralised infrastructure, making them vulnerable to outages,
misconifgurations, and targeted attacks. The proposed model distributes DNS records across a P2P
network with each chunk replicated across multiple nodes for availability and balance. If a
node fails or a partition occurs, the DHT-based routing layer redirects queries to other
replicas. This decentralised design removes single points of failure and improves resilience against
denial-of-service (DoS) attacks. By replacing static trust in centralised resolvers with verifiable,
distributed replication, the system ensures reliable resolution even under adverse conditions.
Censorship and Tampering Traditional DNS queries are vulnerable to censorship and
tampering, as shown in real-world cases in Section 1. The proposed resolver mitigates these threats
by decentralising resolution and validating responses from multiple independent peers. A
query is only accepted if more than 2 out of  responses agree, making isolated manipulation
inefective and coordinated tampering detectable unless most peers in a chunk are compromised.
Since nodes are independently operated without central oversight, large-scale manipulation is
significantly harder. Inconsistencies trigger retries or conflict resolution, preserving response
integrity.</p>
      <p>Security Considerations Traditional DNS is vulnerable to threats like cache poisoning and
forged responses due to its reliance on individual resolvers and limited validation. The proposed
system counters this by decentralising trust and requiring consensus for every DNS record
update. Whether from record changes or fallback to traditional DNS, each update must pass a
consensus protocol cons among the responsible blockchain peers. An update is only accepted
if enough peers validate it; otherwise, it is discarded. This prevents a single compromised node
from corrupting data and protects against injection or replay attacks. By requiring agreement
before any change, the system secures DNS integrity and reduces attack surfaces.
Lack of Transparency and Control. Traditional DNS lacks transparency, leaving clients
unaware of the resolution path or the DNS servers involved, which can lead to vulnerabilities
like incorrect or outdated responses due to misconfigurations or compromised servers. Clients
also cannot verify server liveness, making it dificult to detect unresponsive or compromised
resolvers. In contrast, our model ensures full transparency. Each node independently handles
resolution, selects peers, and verifies the data they return using consensus. This reduces the risk
of outdated or incorrect responses, as nodes do not rely on potentially compromised third-party
resolvers.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we proposed a decentralised DNS resolution system architecture that addresses
the vulnerabilities and limitations of traditional DNS, including centralisation, single points
of failure, and lack of transparency. By distributing query resolution and using consensus for
updates, the system improves availability, security, and resilience. It defends against cache
poisoning and forged responses by validating updates and responses through multiple peers.
Nodes maintain full control over resolution, making tampering detectable. The replication
mechanism improves fault tolerance and resists censorship. This approach ofers a secure,
censorship-resistant alternative to traditional resolvers. Future work includes evaluating the
system’s performance and security through real-world simulations.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Acknowledgments</title>
      <p>This work was partially supported by the UK Research and Innovation (DTP Scholarship under
grant EP/T517859/1); and the Academic Centre of Excellence in Cyber Security Research
University of Southampton (EP/R007268/1).</p>
    </sec>
    <sec id="sec-8">
      <title>8. Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used ChatGPT and LanguageTool in order to:
Grammar and spelling check, Paraphrase and reword. After using this tool/service, the author(s)
reviewed and edited the content as needed and take(s) full responsibility for the publication’s
content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <issue>NS1</issue>
          ,
          <article-title>Analysis of 7.5 trillion dns queries reveals public resolvers dominate the internet</article-title>
          ,
          <year>2023</year>
          . URL: https://circleid.com/posts/20230316
          <source>-analysis-of-7</source>
          . 5
          <article-title>-trillion-dns-queries-reveals-public-resolvers-dominate-the-internet#:~:text=</article-title>
          <source>It% 20reveals%20that%20public%20resolvers,Amazon%20Web%20Services%20at%</source>
          <year>2016</year>
          %
          <fpage>25</fpage>
          ., accessed:
          <fpage>2025</fpage>
          -04-17.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Xfinity</surname>
          </string-name>
          , Xfinity by comcast,
          <year>2023</year>
          . URL: https://www.xfinity.com, accessed:
          <fpage>2025</fpage>
          -04-17.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>T-Mobile</surname>
          </string-name>
          , T-mobile usa,
          <year>2023</year>
          . URL: https://www.t-mobile.com, accessed:
          <fpage>2025</fpage>
          -04-17.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Cotton, Understanding the impact of encrypted dns on internet censorship</article-title>
          ,
          <source>in: Proceedings of the Web Conference</source>
          <year>2021</year>
          ,
          <year>2021</year>
          , pp.
          <fpage>484</fpage>
          -
          <lpage>495</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>MacMillan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schafner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Feamster</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Chetty, Measuring the consolidation of dns and web hosting providers</article-title>
          ,
          <source>arXiv preprint arXiv:2110.15345</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mimoso</surname>
          </string-name>
          ,
          <article-title>Dyn ddos attack: What we know so far</article-title>
          , Dark Reading (
          <year>2016</year>
          ). URL: https: //www.darkreading.com/news/dyn-ddos
          <article-title>-attack-what-we-</article-title>
          <string-name>
            <surname>know-</surname>
          </string-name>
          so-far/d/d-id/1326357.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Greenwald</surname>
          </string-name>
          , E. MacAskill,
          <article-title>Nsa prism program taps in to user data of apple, google and others, The Guardian (</article-title>
          <year>2013</year>
          ). URL: https://www.theguardian.com/world/2013/jun/06/ us-tech
          <article-title>-giants-nsa-data.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <surname>X. Wu,</surname>
          </string-name>
          <article-title>The great firewall of china: A study of dns filtering</article-title>
          ,
          <source>International Journal of Computer Applications</source>
          <volume>96</volume>
          (
          <year>2014</year>
          )
          <fpage>28</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .5120/
          <fpage>16913</fpage>
          -
          <lpage>3154</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yegneswaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Porras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Duan</surname>
          </string-name>
          ,
          <article-title>An empirical reexamination of global dns behavior</article-title>
          ,
          <source>in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>278</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Conrad</surname>
          </string-name>
          ,
          <article-title>Brief overview of the root server system (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Paul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Dunlap</surname>
          </string-name>
          ,
          <article-title>Development of the domain name system</article-title>
          ,
          <source>ACM</source>
          <volume>18</volume>
          (
          <year>1988</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Adiwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rajendran</surname>
          </string-name>
          , et al.,
          <article-title>A quantitative method for measuring health of authoritative name servers</article-title>
          ,
          <source>International Journal of Information Security and Privacy (IJISP) 16</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jung</surname>
          </string-name>
          , E. Sit,
          <string-name>
            <given-names>H.</given-names>
            <surname>Balakrishnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Morris</surname>
          </string-name>
          ,
          <article-title>Dns performance and the efectiveness of caching</article-title>
          ,
          <source>in: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>I. Stoica</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Morris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Liben-Nowell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Karger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Kaashoek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dabek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Balakrishnan</surname>
          </string-name>
          ,
          <article-title>Chord: a scalable peer-to-peer lookup protocol for internet applications</article-title>
          ,
          <source>IEEE/ACM Transactions on networking 11</source>
          (
          <year>2003</year>
          )
          <fpage>17</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Chiola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Cordasco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gargano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Negro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Scarano</surname>
          </string-name>
          ,
          <article-title>Optimizing the finger tables in chord-like dhts</article-title>
          ,
          <source>Concurrency and Computation: Practice and experience 20</source>
          (
          <year>2008</year>
          )
          <fpage>643</fpage>
          -
          <lpage>657</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Kalodner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Carlsten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Ellenbogen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonneau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Narayanan</surname>
          </string-name>
          ,
          <article-title>An empirical study of namecoin and lessons for decentralized namespace design</article-title>
          .,
          <source>in: WEIS</source>
          , volume
          <volume>1</volume>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Giamouridis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kang</surname>
          </string-name>
          , L. Aniello,
          <article-title>Blockchain-based dns: Current solutions and challenges to adoption (</article-title>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>A scheme of integrating dns into p2p service network</article-title>
          ,
          <source>in: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology</source>
          , IEEE,
          <year>2011</year>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Danielis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Altmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Skodzik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Wegner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koerner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Timmermann</surname>
          </string-name>
          ,
          <article-title>P-donas: a p2p-based domain name system in access networks</article-title>
          ,
          <source>ACM Transactions on Internet Technology (TOIT) 15</source>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sancho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Pereira</surname>
          </string-name>
          ,
          <article-title>Hybrid peer-to-peer dns</article-title>
          ,
          <source>in: 2014 International Conference on Computing, Networking and Communications (ICNC)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>977</fpage>
          -
          <lpage>981</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Muthitacharoen</surname>
          </string-name>
          , R. T. Morris,
          <article-title>Serving dns using a peer-to-peer lookup service, in: Peer-to-Peer Systems: First InternationalWorkshop</article-title>
          , IPTPS 2002 Cambridge, MA, USA, March 7-
          <issue>8</issue>
          ,
          <source>2002 Revised Papers 1</source>
          , Springer,
          <year>2002</year>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>165</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Koyanagi</surname>
          </string-name>
          ,
          <article-title>Study on a hybrid p2p based dns</article-title>
          ,
          <source>in: 2011 IEEE International Conference on Computer Science and Automation Engineering</source>
          , volume
          <volume>4</volume>
          , IEEE,
          <year>2011</year>
          , pp.
          <fpage>152</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kohler</surname>
          </string-name>
          ,
          <article-title>One, Two, or Two Hundred Internets?: The Politics of Future Internet Architectures</article-title>
          ,
          <source>Technical Report, ETH Zurich</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>C. V.</given-names>
            <surname>Helliar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Crawford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rocca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Teodori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Veneziani</surname>
          </string-name>
          , Permissionless and permissioned blockchain difusion,
          <source>International Journal of Information Management</source>
          <volume>54</volume>
          (
          <year>2020</year>
          )
          <fpage>102136</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>C. G.</given-names>
            <surname>Dickey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Grothof</surname>
          </string-name>
          ,
          <article-title>Bootstrapping of peer-to-peer networks</article-title>
          ,
          <source>in: 2008 International Symposium on Applications and the Internet</source>
          , IEEE,
          <year>2008</year>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>