DNS attacks cannot be prevented.

Source: Internet
Author: User
Tags domain name server

DNS is the foundation for network interconnection. Through this domain name resolution system, users can easily find what they want on the all-encompassing Internet. But what users do not know is that this DNS system is often used as the object of network attacks. What kind of surging dark stream is behind the invisible network? The following describes the six common DNS attack methods.

 

Method 1: Use the DNS server for DDoS attacks

 

Ddns attacks refer to the combination of multiple computers as an attack platform by means of customer/server technology to launch DoS attacks against one or more targets, thus exponentially increasing the power of DoS attacks. This is currently the most common DNS attack, and is also the most influential. According to anti-DDoS pro experts, currently the effective method to resist such attacks is to use anti-DDoS pro DNS for defense.

 

Method 2: DNS Cache Infection 

 

Attackers use DNS requests to store data in the cache of a vulnerable DNS server. The cache information will be returned to the user when the customer accesses the DNS, so that the user's access to the normal domain name is directed to the page on which the Hacker sets Trojans and phishing, you can also obtain user password information through forged emails and other server services, resulting in further attacks to the customer.

 

Method 3: DNS information hijacking

 

Attackers send false responses to users before the DNS server, thus deceiving clients to access malicious websites. Assume that the data packet for the domain name resolution request submitted to a Domain Name Server is intercepted, and then a false IP address is returned as the response information to the requester according to the intention of the interceptor. At this time, the original requester will connect the fake IP address as the domain name it wants to request. Obviously, it is spoofed elsewhere and cannot connect to the domain name it wants to connect.

 

Method 4: DNS redirection

 

DNS redirection instructs the configured domain name to directly access the IP address corresponding to the domain name without resolving the domain name through the DNS server. Attackers can redirect DNS name queries to malicious DNS servers. The resolution of the hijacked domain name is completely under the control of attackers.

 

Method 5: ARP Spoofing

 

ARP attacks implement ARP spoofing by forging IP addresses and MAC addresses, which can generate a large amount of ARP traffic in the network to block the network, attackers can change the IP-MAC entries in the ARP cache of the target host as long as they continuously generate forged ARP response packets, resulting in network interruptions or man-in-the-middle attacks.

 

Method 6: Local hijacking

 

After a computer system is infected with Trojans or rogue software, access to some domain names may be abnormal, such as access to Trojans or phishing sites, or access failures, hosts file tampering, DNS hijacking, SPI link injection, and BHO plug-in hijacking are not completed through DNS, however, this will result in failure to obtain the correct address or content according to the user's wishes.

 

In short, the attack on DNS is nothing new and cannot be prevented. In 2006, the occurrence of Baidu's hacking incident once again revealed the vulnerability of the global DNS system, it also shows that Internet vendors cannot quickly respond to comprehensive and complex threats if they only have security plans for their own information systems. Currently, the effective way to deal with such DNS attacks is to use anti-DDoS pro as the domain name resolution service for your website. The anti-DDOS service provided by the dnsdun domain name resolution service system can defend against large-volume network attacks. It is one of the best anti-DDoS pro DNS Systems in China and a trustworthy defensive DNS. Therefore, for website security, we recommend that you select a trustworthy domain name resolution service system.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.