NordVPN Promotion

Home / Industry

DNS-Based Threats: DNS Reflection and Amplification Attacks

The Domain Name System (DNS), if not properly secured, may be susceptible to abuse by malicious actors. Cybercriminals recognize the value of DNS availability and look for ways to compromise DNS uptime and the DNS servers that support it. As such, DNS becomes an important point of security enforcement and a potential point in the Cyber Kill Chain® [1] for many cyber-attacks.

This blog discusses one such threat, DNS reflection, and amplification attacks.

A DNS reflection and amplification attack is a popular form of a distributed denial of service (DDoS) attack. Attackers use publicly accessible open DNS servers on the internet to act as unwitting accomplices. The attackers send spoofed requests to these servers. The requests are designed to elicit a very large response, like asking for large DNS records. The spoofed requests use the victim’s address instead of the attacker’s, so without a security countermeasure, all the DNS servers’ responses go to the victim. The size of the response from these hijacked servers is considerably larger than the spoofed request, thereby amplifying the amount of traffic going to the victim compared to the bandwidth available to the attacker.

Buried under the overwhelming volume of large unsolicited DNS answers, the attack traffic can consume available resources, cripple systems and prevent legitimate traffic from reaching the organization. In addition, if an organization’s external servers are leveraged to launch an amplification/reflection attack against another entity, the organization can suffer reputational damage and loss of customer confidence.

Framework for Resilient DNS Security – Download PDFAs DNS attacks grow in frequency and impact, organizations can no longer afford to overlook DNS security as part of their overall defense-in-depth strategy. As with IT security in general, no single tactic can address the entire DNS threat landscape or secure the complete DNS ecosystem. The key is to assess risks, identify security gaps, and develop a plan to strengthen the security of both your inbound and outbound DNS.

For more information on the importance of DNS in the security ecosystem, and considerations for securing DNS in your organization, please download our free white paper, “Framework for Resilient DNS Security,” available here.

Verisign Security Services offers cloud-based DDoS protection and DNS solutions to protect your online services from today’s security threats. Click here for more information about Verisign Security Services.

[1] Hutchins, E. M., Cloppert, M. J., and Amin, R. M., Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, in 6th International Conference on Information Warfare and Security (2011). https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf. Retrieved October 12, 2017.

By Verisign, A Global Provider of Critical Internet Infrastructure and Domain Name Registry Services

Verisign, a global provider of domain name registry services and internet infrastructure, enables internet navigation for many of the world’s most recognized domain names. Verisign enables the security, stability, and resiliency of key internet infrastructure and services, including providing root zone maintainer services, operating two of the 13 global internet root servers, and providing registration services and authoritative resolution for the .com and .net top-level domains, which support the majority of global e-commerce. To learn more about what it means to be Powered by Verisign, please visit Verisign.com.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

NordVPN Promotion