Different Types of Major DNS Attacks

shivam
0

What is DNS?

The job of the Domain Name System, or DNS, is to convert IP addresses into domain names and vice versa. It enables computers to communicate with each other over the Internet and other networks, making it a critical infrastructure. DNS is a fundamental component of modern computer networks that helps users access websites and other online services by name rather than having to remember complex numerical IP addresses.

DNS Attacks

DNS attacks refer to various malicious activities aimed at exploiting vulnerabilities in the Domain Name System (DNS). These attacks target the DNS infrastructure, compromising its integrity, availability, and security. Here are some common types of DNS attacks:

1.      DoS Attack

A simple DoS (Denial of Service) attack takes one device and one internet connection to attack a remote server. However, they are not very effective at overloading modern global networks.

2.    DDoS Attack

Attackers utilize multiple servers and internet services to launch a DDoS (Distributed Denial of Service) attack against a website. DDoS attacks establish a botnet of compromised devices that execute malicious queries in the DNS system. Attackers can use the computational power of devices worldwide to query the target network continuously. DDoS attacks are classified into three types:

       Protocol attack: This attack cripples existing server resources or other network equipment like firewalls and load balancers.

       Application layer attack: The attacker makes queries that appear legitimate but exploits the target's weaknesses to crash the web server.

       Flood attack: Floods attempt to render a server unreachable to legitimate traffic by 'flooding' its resources.

Related Articles

    How to prevent DDoS attacks?

    DDoS Attacks: How They Are Evolving

3.    DNS Spoofing or DNS Cache Poisoning

DNS spoofing or DNS cache poisoning diverts internet traffic to malicious websites by leveraging security vulnerabilities in the DNS protocol. These are known as man-in-the-middle attacks.

Related article - All About DNS Spoofing 

4.   Fast Flux

During an attack, an attacker usually spoofs his IP address. Fast flux is a method for continuously updating location-based data to conceal the source of an attack. This will hide the attacker's true location, giving them the time they need to carry out the attack.

5.    DNS Hijacking

There are three types of DNS hijacking:

       The attacker gains access to a domain registrar account and modifies the DNS name server settings to point to a server under their control.

       Malicious users can modify your domain's IP address record to point to another address.

       Attackers can compromise a company's router and manipulate the DNS server settings, which are automatically distributed to each device when connecting to the network.

About InfosecTrain

InfosecTrain is a renowned global company specializing in cybersecurity training and consulting services. We offer a CompTIA Network+ online course to help professionals gain network security knowledge.

Post a Comment

0Comments

Post a Comment (0)