How does DNS works and Cyber Attacks

How does DNS works and Cyber Attacks

Rate this post
As we communicate with each other in the real world the machines accessing the internet communicate with one another. Communication between two persons is reciprocal and is known as addressing each other and if at one point of time there is an audio or video conference then the communication is with one another and there may be interruptions if more than two individuals start taking part in the communication. Computers can handle lot of information instantly and DNS is the communication system for addressing the Internet. Every Machine (like computers, mobiles, laptops, ATMs, and POS terminals), accesses the internet depends upon DNS Services for exchanging the information.
DNS uses recursive, hosting and root servers to translate the domain names such as www.webquestionanswers.com into IP addresses denoted by numerical values allowing the machines to reach the proper destination. Every internet application including websites, emails, social networking, online banking or VoIP (Voice over Internet Protocol, sharing, videos rely on the integrity of the communications in between the servers involved. Had there been no DNS, it would have been difficult to operate and search the internet as numerical IP address can not be memorized by the internet users whereas the specific names can be easily remembered by the users and the conversion of Domain Names into actual IP addressed is taken care of by the translating servers throughout the world. DNS has far reaching consequences to facilitate national infrastructure, online commerce operations and above all the financial transactions. The domain name space is virtually a tree of domain names, subdivided into zones. The top level or root zone is taken care of by the U.S. Department of Commerce (DoC) and is jointly managed by Verisignand the Internet Assigned Numbers Authority (IANA) functions operator, who maintain the data in the root name servers. Every domain name ends with top level domain (TLD) such as .com and to ensure that there is no duplication of domain names so that the internet operates properly without any conflict, there must be one and only one authority to register a domain names in root servers which also manage the domains for domain name registrars all over the world.
The process of translating a domain name into an IP address is called DNS resolution and when users pin in domain name, such as www.webquestionanswers.com, in web browser, the browser contacts a name server to obtain the corresponding IP address. All such queries interact with recursive servers operated by ISP or wireless carriers. Recursive resolver knocks at any of the 13 root servers and thousands of servers positioned globally to support root servers. TLD server like .com domain name server then redirects to second level domain server and then TLD answers the query of hosting domain name server. Recursive server sends query to the identified domain name server and domain name servers return the answer in the shape of IP address standard IPv4 with further translation to next generation internet protocol IPv6 (as IPv5 could not take off) and when the recursive resolver knows the IP address, the website appears as the browser will request the website to show the content which gets uploaded to the browser. In normal course query gets resolved within 1/10th of a second that is time less than the blinking of eye. In future IPv6 may change to IPv7 or Smart Internet Protocol version (IPvSmart – Name and Version is suggested by the Author and will not be searchable on the internet when the unique IP addresses may increase from the present strength of 10 multiplied by 36 times to 10 multiplied by say 250 times with the increasing usage of internet as every mail ID, website, blog, ATM machine, Point of Sales Machines and other machines accessing internet have unique IP addresses). IPv6 has more security vulnerabilities as compared to IPv4 due to more and more transiting machines, servers and these security threats can multiply more rapidly then the solutions which are found only after taking off new versions and solving the issues relating to security threats there after.However in the middle of the transition queries are vulnerable to man in the middle attacks by cyber criminals in the shape of hacking or hijacking so as to lead the queries to land at impersonated sites or look alike site and due to such attacks in the middle of transition the cyber criminals can :
  1. Hijack emails
  2. Tap Voice over IP (VoIP)
  3. Impersonate websites
  4. Steal passwords and login information
  5. Extract credit card data and other confidential information
All this poisoning takes place in the cache of recursive name servers when fraudulent and fictitious DNS data gets inserted in place of data requisitioned. Recursive name servers temporarily store, or cache, information gathered during the query or name resolution process, but without DNSSec and the Recursive servers can not ensure the validity and accuracy of the stored information. Due to the malicious information getting stored on the recursive name server, the server is termed as having been “poisoned” which further facilitates an attacker to redirect traffic to fraudulent sites. MITM (or as it called man in the middle) attack intercepts and changes the communications between two system server. The attacker can significantly change the machine communications so as to redirect traffic to an illegal address or fraudulent website. Internet users can not detect the “man in the middle” and assuming that they are communicating with the correct IP Address or destination they sign in to the website with their user id and password to be trapped by the Key Loggers active on the illegal site.Note : Domain names are registered for a minimum period of one and maximum period of ten years by any individual or an organization. A domain name allows your fans, customers to find your site through easy to remember domain name instead of the numerical IP address, difficult to remember.

Ashok Goyal

Hi members, I am Ashok Goyal from Rajpura - Punjab, a town near Chandigarh. I am a retired Chief Manager from a Top Nationalized Bank in India with 35 years of experience. I am the CEO-cum-Founder of this site made for Young and Old, Technical and Non Technical members to spread their knowledge across the Globe. I am a Science Graduate with an M.A. in Economics and C.A.I.I.B. (Certified Associate Life Member of Indian Institute of Banking and Finance since 1980 and a Social Worker authoring many Blogs for the benefit of the Public in General. I Graduated from Patel Memorial National College, Rajpura - 140401 and secured a Master's Degree in Economics from Punjabi University, Patiala - 147001 Punjab, India. Expert in Legal and Money Matters, may it be Banking, Investments, and Insurance or Fraud investigations. My Hobby is to share Knowledge and alarm the younger generations about the practical implications of transacting online. I am available at many Social Networking Sites. I am health conscious and like reading deeply about anything related to health and nutrition. In the case of any violation of objectionable content, the images on my authored links or on this site, you can either report me directly or you can file a DMCA complaint about the removal of the content. I do not like spammers and never hesitate to report the abuse of my profile information. I am the owner of the WQAINDIA Brand hosting self-hosted Question Answers Site at Web Question Answers. In Jan 2016, I founded Samadhan Kender at Rajpura - which is now talk of the down. In January 2017, keeping in view the Identity Crisis in India I found that the Public was facing difficulties in their CIBIL Reports - I started my best ever venture at CIBIL Consultants to solve the CIBIL Problems of the Public online. CIBIL Consultants is having its client base in all 17 states in India. © Copyright - Ashok Goyal – ALL RIGHTS RESERVED: This is my original work and I do not like any content to be copied or posted anywhere on the web or elsewhere. All the articles available on my social profiles are exclusively owned by me. If you like my articles then you can visit my articles and provide the URL as a link, without any copyright infringement, on the website or blogs which are not having any adult content related to sex, violence, hate-redness, or religious fundamentalism as per Google or Facebook TOC. DISCLAIMER: The information on this site or elsewhere - under my Profile Name is for general information purposes only. The information provided by me is simply educative to the best of my knowledge and belief. We make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability about the information, products, and services being displayed on this website for any purpose. Any reliance you place on such information is therefore strictly at your own risk. In no event will we be liable for any loss or damage including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising out of or in connection with the use of this website or my profile anywhere on the web. We welcome feedback, comments or healthy criticism on any article or content on this site or my own work anywhere on the web. I owe my success on the web to IndiaStudyChannel to Tony John, Webmaster at ISC. I am also a featured author at HubPages, Global Site for writers and Authors. This site is dedicated to my countrymen to sharpen their online skills to compete for the world. The public can also get their CIBIL Reports rectified professionally at very low prices – when big corporations are charging as much as Rs.25000 per person per Credit Report.

You may also like...

Leave a Reply