A method for authenticating communication traffic includes receiving a first
request,
such as a DNS request, sent over a network from a source address, to provide network
information regarding a given domain name. A response is sent to the source address
in reply to the first request. When a second request is from the source address
in reply to the response, the authenticity of the first request is assessed based
on the second request.