DNS Security 1705660927
DNS Security 1705660927
DNS Security 1705660927
LMACS
communication with
prevent access to secure DNS,
known botnet
adult sites and other reducing unwanted
servers, reducing
unwanted content, ads and improving
the risk of cyber-
reducing the risk of employee
attacks and
potential productivity and
protecting sensitive
cyberattacks. efficiency.
information.
LMACS
communicate with
to a malicious malicious resolver resources,
command and
website instead destinations, causing a
control servers or
of the intended launching various degradation of
exfiltrate sensitive
website attacks service
information
NXDOMAIN attacks
Botnet-based CPE
flood DNS servers Phantom domain
attacks exploit DNS cache
with requests attacks overwhelm
vulnerabilities in poisoning redirects
for non-existent DNS, causing
modems and traffic from a
records, resulting degraded
routers to create legitimate website
in a denial of performance and
a botnet and to a malicious one
access to service disruption
disrupt services
legitimate traffic
DNS reflection
DNS volumetric DNS amplification
attacks Random
attacks flood DNS attacks use publicly
overwhelm subdomain
servers with high accessible DNS
victims' network attacks generate
traffic volumes, servers to amplify
resources by subdomains to
causing traffic and cause a
exploiting overwhelm the
unavailability to denial of service
vulnerable DNS server
legitimate users attack
servers
Implement DNSSEC to prevent DNS spoofing
attacks and ensure the authenticity of DNS
responses.
LMACS
Best practices
for securing Consider implementing intrusion detection
the DNS layer and prevention systems in order to identify
and prevent DNS attacks.
LMACS
DNSSEC is a security protocol that digitally
signs DNS records to ensure their
authenticity and prevent unauthorized
modifications or tampering of DNS data
from malicious attacks.
It incorporates cryptographic
mechanisms that add an extra layer
of protection to the DNS.
It encrypts DNS queries in DNS over TLS (DoT) is a
LMACS
an HTTPS session security protocol for
DoH conceals DNS queries protecting against DNS
from unauthorized access tampering and on-path
This enhances data privacy attacks.
and security DNS queries and responses
Major web browsers like are encrypted by DoT to
Chrome, Edge, and Firefox prevent attackers from
have adopted DoH intercepting and modifying
DoH prioritizes user privacy DNS traffic.
by concealing DNS queries Implementing DoT can
within HTTPS traffic. significantly improve
overall DNS security.
DoT allows for effective
monitoring and blocking of
DNS queries.
Article by
Praveen Singh
Infographics by
Netpoleon India
LMACS
Techtalk Series-An initiative by
Mohan Kumar T L