2US-CERT. Multiple DNS Implementations Vulnerable to Cache Poisoning[EB/OL]. (2008-07-08). http://www.kb.cert.org/vuls/id/ 800113.
3Eastlake D. Domain Name System Security Extensions[S]. RFC 2535, 1999.
4Stewart J. DNS Cache Poisoning The Next Generation[EB/OL]. (2003-01-27). http://www.secureworks.com/research/articles/cache poisoning.
5US-CERT. Various DNS Service Implementations Generate Multiple Simultaneous Queries for the Same Resource Record[EB/OL]. (2002-11-19). http://www.kb.cert.org/vuls/id/457875.
7[3]ICANN.Root Server Attack on 6 February 2007[EB/OL].http:// www.icann.org/announcements/faetsheet-dns-attack-08mar07.pdf,2007-03.
8[4]Eastlake D.Domain name system security extensions[S].RFC2535,IETF,1999-03.
9[5]The Measurement Factory.Domain name servers:Pervasive and critical,yet often overlooked[EB/OL],http://dns.measurement-factory.com/surveys/suml.html,2006-06-14.
10[7]Athins D.Threat analysis of the domain name system[EB/OL].http://www.ietf.org/interne t-drafts/draft-ietf-dnsext-dns-threats-01,2002.