Wed, 20 Oct 2021
22.7 C
Durban

Tactics for DNS infrastructure defense

Home Engineering ICT Tactics for DNS infrastructure defense

FOR something so important, many businesses take a lot of the services provided by Domain Name System (DNS) for granted. But DNS availability is critical for anyone providing services or content across the internet.

That’s according to testing and measurement specialists Comtest, which cited a number of high-profile, high-impact attacks against DNS over the years.

“For example, the 2016 Mirai attacks against DNS service provider DYN impacted millions of users of services such as Netflix,” the company said in a statement.

There are several types of common DNS attacks. The Mirai attackers used a distributed denial-of-service (DDoS) attack to make DNS unavailable. Using a technique known as Water Torture, the attackers used a botnet to generate DNS queries for millions of random hosts, putting a huge load on the DNS infrastructure and rendering it unavailable for genuine user queries.

“Bad actors can also leverage DNS to attack third-party targets by using reflection or amplification attacks to generate large-scale volumetric attacks,” the company warned.

A DNS reflection/amplification attack uses a botnet to generate DNS queries using the source IP address of the intended DDoS victim.

The DNS servers innocently send their large volume of responses back to the victim, creating traffic volume as much as 10 to 100 times higher than that generated by the original botnet. Once the limits on bandwidth for the network, server, or application are reached, the circuit becomes unavailable.

Comtest recommends the following tactics to build a holistic defense strategy for defending against DNS DDoS attacks:

  • Current threat intelligence. Threat intelligence is a crucial tool for DDoS detection and mitigation. Security personnel and DNS administrators must not only be aware of the latest DNS exploits but also understand how the exploit works, and what it does to fully understand the impact on DNS infrastructure.
  • Regular audits.  Proper maintenance is critical. Organizations must include DNS infrastructure in periodic, realistic tests of the organization’s DDoS mitigation plan, as well as regularly audit and properly configure DNS servers.
  • Network visibility. Companies must be able to quickly detect abnormal DNS traffic, including both application-layer and volumetric reflection/amplification DNS vector attacks. To accomplish this, you will need visibility and fast detection at Layer-3/4 and Layer-7 of the network.
  • Orchestrated mitigation.  Companies can orchestrate multiple methods of mitigation, including their own network infrastructure, dedicated DDoS migration products, and for network operators, information sharing with other operators. By implementing such an orchestrated mitigation strategy, companies can strategically assign different methods of mitigation to different attack vectors.

Click here to find out more about NETSCOUT – bit.ly/3nCVlX7

Most Popular

Reaching for Africa’s true potential: Five principles for realistic technology adoption in Africa

By Canninah Mapena, Rockwell Automation AFRICA is undoubtedly a land of abundance and potential. From our mineral resources to our rich agriculture to our youthful...

Wanted: ‘experienced’ developer for Ngqura manganese terminal project

THE port of Ngqura is a step closer to getting a new manganese terminal. This is after the Coega Development Corporation (CDC) announced on...

Bus line doubles down on telematics tech

CONNECTED fleet management provider MiX Telematics has renewed its contract with Intercape for an additional five years. Intercape, a customer of MiX Telematics since 2015,...

Africa is SEW ripe for investment

THE South African Department of Trade and Industry recently met with drive and control technologies specialist SEW-EURODRIVE to discuss its R200-million investment into the...