A method for authenticating communication traffic includes receiving a
first request, such as a DNS request, sent over a network from a source
address, to provide network information regarding a given domain name. A
response is sent to the source address in reply to the first request.
When a second request is from the source address in reply to the
response, the authenticity of the first request is assessed based on the
second request.