Bassil, Ramzi. dkk. 2008. Security Analysis and Solution for Thwarting Cache
Poisoning Attack in the Domain Name System, (Online),
(http://www.researchgate.net, diakses 28 Desember 2013).
Bellovin, S. M. 1995. Using the Domain Name System fo System Brea-ins. UENIX
UNIX Security Symposium tahun 1995.
Cheung, Steven. 2005. Denial of Service Agains the Domain Name System: Threats
and Countermeasures. (Online), (www.csl.sri.com, diakses 28 Desember
2013).
Dwiyanto, Philip dkk. 2010. Studi Kasus Perancangan Intrusion Prevention System
Terhadap Serangan Man-in-the-Middle pada Jaringan Lokal. (Online),
(http://eprints.binus.ac.id/, diakses 21 Agustus 2014).
Hubert, A. dan R. Van Mook. 2009. Measures for Making DNS More Resilent
Againts Forged Answer. (Online), (http://tools.ietf.org/html/rfc5452,
diakses 28 Desember 2013).
Kak, Avi. 2013. DNS and DNS Cache Poisoning Attack. (Online),
(https://engineering.purdue.edu, diakses 28 Desember 2013).
79
Klein, Amit. 2007. BIND 8 DNS Cache Poisoning. (Online),
(http://packetstorm.wowhacker.com, diakses 13 Januari 2014).
Laboratory For Computer Security Education. 2009. DNS Pharming Attack Lab.
(Online), (http://discovery.csc.ncsu.edu, diakses 13 Januari 2014).
Mockapetris, P. 1983. Domain Names Concept and Facilities. RFC 882. (Online),
(http://tools.ietf.org/html/rfc882, diakses 19 September 2014).
Osterweil, Eric. dkk. 2009. Deploying dan Monitoring DNS Security (DNSSEC),
(Online), (http://secspider.verisignlabs.com, diakses 20 Desember 2013).
Pathak, Dhrubajyoti dan Kaushik Baruah. 2013. An Intrution Detection System for
Kaminsky DNS Cache Poisoning. International Journal of Enginering
Research. (Online), Jilid 2, Nomor 5, Halaman : 357 361, (www.ijer.in,
diakses 28 Desember 2013).
Permatasari, W.D. 2008. Kerawanan Kemanan Jaringan Komputer pada DNS dan
BIND (BERKELEY INTERNET NAME DOMAIN). Bandung: Universitas
Sriwijaya.
Petr, Emanuel. 2009. An analysis of the DNS cache poisoning attack, (Online),
(www.nic.cz, diakses 16 Desember 2013).
80
Prais, A. dkk. 2008. Detecting Attacks Involving DNS Servers. (Online),
(http://essay.utwente.nl, diakses 28 Desember 2013).
Rash, Michael. 2007. Linux Firewall: Attack Detection and Response with iptables,
psad and fwsnort. (Online), (http://www.cipherdyne.org/fwsnort/, diakses
24 Agustus 2014).
Sainstitute.org. 2003. Attacking the DNS Protocol Security Paper v2. Expert
Security Associate (ESA) Certification.
Sinha, Sachin Kumar. dkk. 2013. Security System for DNS using Cryptography.
International Journal of Engineering & Technology, Jilid 2.
Stewart, Joe. 2003. DNS Cache Poisoning The Next Generation, (Online),
(http://www.ida.liu.se, diakses 28 Desember 2013).
81
Tzur-David, Shimrit. dkk. 2012. Delay Fast Packet (DPF): Prevention of DNS
Cache Poisoning. (Online), (http://www.cs.huji.ac.il, diakses 13 Januari
2014).
Utami, Ema. dkk. 2007. Metodologi Penelitian Pada Ilmu Komputer. Yogyakarta:
Seminar Nasional Teknologi 2007.
Wijaya, Sandi. 2004. Mekanisme dan Implementasi Cache Poisoning pada DNS
Server. Discussion List., (Online), (budi.insan.co.id, diakse 13 Januari
2014).
Yuan, Lihua. dkk. 2013. A Proxy View of Quality of Domain Name Service,
Poisoning Attacks an Survival Strategies. ACM Transaction on Internet
Tecnology, Jilid 12, Nomor 3, Artikel 9.
82