What is DNS Security? - Check Point Software (2024)

How DNS is Used in Attacks

Some threats include attacks against the DNS infrastructure:

  • Distributed Denial of Service (DDoS): DNS infrastructure is essential to the functioning of the Internet. DDoS attacks against DNS can make websites unreachable by making the DNS servers that serve them unavailable by saturating the networks with what looks like legitimate traffic. A classic example of this is the 2016 DDoS attack against Dyn, where an army of bots hosted on Internet connected cameras caused outages to many major websites, including Amazon, Netflix, Spotify, and Twitter.
  • DNS DDoS Amplification: DNS uses UDP, a connection-less protocol, for transport which means that an attacker can spoof the source address of a DNS request and have the response sent to an IP address of their choosing. Additionally, DNS responses can be much larger than the corresponding requests. DDoS attackers take advantage of these factors to amplify their attacks by sending a small request to a DNS server and having a massive response transmitted back to the target. This results in a DoS of the target host.
  • Other Denial of Service (DoS) Attacks: In addition to network-based DDoS attacks, the applications that run on DNS servers can also be targeted by DoS attacks. These attacks are designed to exploit vulnerabilities in the DNS server applications, making them unable to respond to legitimate requests.

DNS can also be abused and used in cyberattacks. Examples of the abuse of DNS include:

  • DNS Hijacking: DNS Hijacking refers to any attack that tricks a user into thinking they are connecting to a legitimate domain while they are actually connected to a malicious domain. This can be accomplished using a compromised or malicious DNS server or by tricking a DNS server into storing incorrect DNS data (an attack called cache poisoning).
  • DNS Tunneling: As DNS is a trusted protocol, most organizations allow it to freely enter and leave their networks. Cybercriminals take advantage of DNS for data exfiltration with malware whose DNS requests contain the data being exfiltrated. Since the target DNS server is typically controlled by the owner of the target website, the attackers ensure that the data reaches a server where it can be processed by them, and a response sent in the DNS response packet.
  • Security Evasion using Random Domain Names (DGA): Threat actors use sophisticated algorithms to generate hundreds of thousands of brand-new domain names using a Domain Generation Algorithm (DGA). Malware sitting on an infected computer will then use these brand-new domain names to evade detection and connect to the hacker’s external Command and Control server. Traditional security solutions are not fast enough to determine whether these domains are malicious or not, so they simply default to letting them pass through.

The Importance of DNS Security

DNS is an old protocol, and it was built without any integrated security. Several solutions have been developed to help secure DNS, including:

  • Reputation Filtering: Like any other Internet user, most malware needs to make DNS requests to find the IP addresses of the sites that it is visiting. Organizations can block or redirect DNS requests to known malicious domains.
  • DNS Inspection: The use of DNS for data exfiltration via DNS tunneling or security evasion using Domain Generation Algorithms can also be detected and blocked in real-time by next-generation firewalls (NGFW) that leverage threat intelligence powered by AI Deep Learning engines. This helps to block even sophisticated malware that uses DNS for malware command and control (C2) communications and other attacks.
  • Secure the Protocol: DNSSEC is a protocol that includes authentication for DNS responses. Since the authenticated response cannot be spoofed or modified, attackers cannot use DNS to send users to malicious sites.
  • Secure the Channel: DNS over TLS (DoT) and DoH (DNS over HTTPS) adds a secure layer to an insecure protocol. This ensures that the requests are encrypted and authenticated, unlike traditional DNS. By using DoH and DoT, a user can ensure the privacy of DNS responses and block eavesdropping on their DNS requests (which reveals the sites that they are visiting).

Analytics, Threat Intelligence and Threat Hunting

Monitoring your DNS traffic can be a rich source of data to your Security Operations Center (SOC) teams as they monitor and analyze your company’s security posture. In addition to monitoring firewalls for DNS Indicators of Compromise (IoC), SOC teams can also be on the lookout for lookalike domains.

Preventing the Malicious Use of the DNS Protocol

Check Point Quantum Next Generation Firewalls detect malicious traffic and DNS tunneling attacks via ThreatCloud AI, its global threat intelligence system. ThreatCloud AI analyzes DNS requests and sends a verdict back to firewalls – to drop or allow the DNS request in real time. This prevents data theft via DNS tunneling and Command and Control communications between an internal infected host and an external C2 server.

We encourage you to ask for a demo of new DNS Security capabilities in Quantum release R81.20 and learn more about the threat analytics and threat hunting capabilities of Check Point Infinity SOC.

What is DNS Security? - Check Point Software (2024)
Top Articles
How to create a calendar that’ll get noticed and generate revenue
Long-Term vs. Short-Term Asset Investment: Pros and Cons - Cold Harbor Financial
Uworld Cost
Pflege beantragen: Die Module des Pflegegrads
Eternal Sunshine Of The Spotless Mind Parents Guide
When His Eyes Opened 3001
Studentvue Ccboe Login
Choose the antonym of the given word- Rarely a) Hardly b) Frequentlyc) Definitelyd) Absolutely
Iwu Directory
Marcus Samuelsson Daughter Zoe
50 Shades Of Grey Movies123
Holy Unblocker Links 2022
Ultimate Wizard101 Beginner Guide - Final Bastion
Jeffrey Buley Obituary
Mrh Forum
The Creator Showtimes Near Baxter Avenue Theatres
Patriots, Loyalists, and Neutrals Before the American Revolution
Cookie Run Kingdom Wiki Characters
Sabrina Scharf Net Worth
Atrium Attorney Portal
Jailer Showtimes Near Regal Ua Galaxy - Indianapolis
Math-Aids.com Answers
Bad Moms 123Movies
¿Cuándo se regalan flores amarillas y por qué se realiza este ritual en septiembre?
Ikemaru19
Hot Fuzz Putlocker
Kiss Cartoon Fionna And Cake
Uncensored Wisconsin Volleyball Photos
Tuscaloosa Mugshots Arrests
Kytty_Keeet
Matlab Bar Graph Labels
Directions To 401 East Chestnut Street Louisville Kentucky
20.000 Euro Kredit: Online und unkompliziert beantragen | Santander
On a testé : une brosse visage nettoyante qui n'a aucun défaut
Cities 20 Miles From Me
Lesson 6 Becoming Familiar With Blueprint Systems Integration
Joy Ride 2023 Showtimes Near Marcus Oakdale Cinema
Cities An Hour And A Half Away From Me
Texas Gov Ecommdirect Con
Bòlèt Florida Midi
Minooka Channahon Patch
Tiger Island Hunting Club
Craigslist Kalispell Montana Personals
24Hrs Mcdonalds Near Me
Cargurus Ram Trx
Csulb Atlas
Craigslist Room For Rent
Dutchess Cleaners Boardman Ohio
Results & Winning Numbers for Last Year - Pick 3 Midday
Can Guppies Live in a Pond? Breeding, Care guides and More!
Water Displacement Worksheet Answer Key Pdf
Latest Posts
Article information

Author: Golda Nolan II

Last Updated:

Views: 5448

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.