Changes

Jump to navigation Jump to search
adding more internal links
Line 22: Line 22:       −
'''Vulnerability:'''  As with any case, the old saying of “The chain is only as strong as its weakest link” applies here.  Also, the more links there are in the chain the greater opportunity, or opportunities for failure.  In this case the vulnerability rests with people trying to hijack unsuspected users by redirecting them to a site for criminal activity.  For example, you wish to conduct an online transaction at a site you are familiar with, whether your bank or an online retail site.  Criminals will want to hijack your session so that you wind up on their site instead of the one you originally intended to visit.  Such hijacking could result in you innocently handing over your bank login or credit card information to criminals.  From a national security perspective criminals could attempt to hijack the code of a given country, such as anything destined with the .na, or Namibia, TLD.
+
'''Vulnerability:'''  As with any case, the old saying of “The chain is only as strong as its weakest link” applies here.  Also, the more links there are in the chain the greater opportunity, or opportunities for failure.  In this case the vulnerability rests with people trying to hijack unsuspected users by redirecting them to a site for criminal activity.  For example, you wish to conduct an online transaction at a site you are familiar with, whether your bank or an online retail site.  Criminals will want to hijack your session so that you wind up on their site instead of the one you originally intended to visit.  Such hijacking could result in you innocently handing over your bank login or credit card information to criminals.  From a national security perspective criminals could attempt to hijack the code of a given country, such as anything destined with the .na, or Namibia, [[TLD]].
       
'''Exploiting the vulnerability:'''  Criminals hijack sessions by targeting recursive, or non-authoritative name servers and poisoning the cache that resides within a specific recursive name server.  In the earlier example eight distinct steps were identified from when a user first enters a destination in their browser to when the browser actually connects to the destination site.  Four of the seven steps deal with redirecting, or bouncing your browser from one recursive name server to another, all narrowing in on the desired destination.  In this case the name servers that redirected queries were:
 
'''Exploiting the vulnerability:'''  Criminals hijack sessions by targeting recursive, or non-authoritative name servers and poisoning the cache that resides within a specific recursive name server.  In the earlier example eight distinct steps were identified from when a user first enters a destination in their browser to when the browser actually connects to the destination site.  Four of the seven steps deal with redirecting, or bouncing your browser from one recursive name server to another, all narrowing in on the desired destination.  In this case the name servers that redirected queries were:
   −
1). Your ISP’s name server<br>
+
1). Your [[ISP]]’s name server<br>
2). The root servers<br>
+
2). The [[Root Server|root servers]]<br>
3). The TLD name servers<br>
+
3). The [[TLD]] name servers<br>
 
4). The name servers of the destination server’s network provider<br>
 
4). The name servers of the destination server’s network provider<br>
   Line 36: Line 36:       −
'''Mitigating vulnerability:'''  To mitigate vulnerability, thus ensuring resilience to such attacks there are technologies in place, such as [[CommunityDNS]]’ AnyCast network, that not only helps mitigate vulnerabilities due to attacks to the DNS structure, it serves to isolate and identify the source of such attacks.  AnyCast servers, if placed within ISPs, within registries, within hosting providers, or within the primary path for specific country TLDs, will not only cache all destination addresses that have been added to the AnyCast service, the servers will also detect initial attempts of attacks to various name servers with the goal of cache poisoning.  The AnyCast network will identify such attack attempts allowing itself to “ACT” as the newly affected name server, thus saving attacks from hitting the desired name server.  While the AnyCast server under attack limits access to the Internet and begins searching for the actual violator, the intended targeted name server, along with the rest of the name servers around the globe are spared the affects of this attack.
+
'''Mitigating vulnerability:'''  To mitigate vulnerability, thus ensuring resilience to such attacks there are technologies in place, such as [[CommunityDNS]]’ AnyCast network, that not only helps mitigate vulnerabilities due to attacks to the DNS structure, it serves to isolate and identify the source of such attacks.  AnyCast servers, if placed within [[ISP]]s, within registries, within hosting providers, or within the primary path for specific country [[TLD]]s, will not only cache all destination addresses that have been added to the AnyCast service, the servers will also detect initial attempts of attacks to various name servers with the goal of cache poisoning.  The AnyCast network will identify such attack attempts allowing itself to “ACT” as the newly affected name server, thus saving attacks from hitting the desired name server.  While the AnyCast server under attack limits access to the Internet and begins searching for the actual violator, the intended targeted name server, along with the rest of the name servers around the globe are spared the affects of this attack.
      −
So while the global DNS hierarchy is designed for a logical method for navigating the Internet, vulnerabilities exist that can impact your firm’s brand, business stability as well as the global economic presence countries are building by using the Internet.  Having a strong business resiliency plan will help mitigate threats posed to your customers, your company and your country.
+
So while the global [[DNS]] hierarchy is designed for a logical method for navigating the Internet, vulnerabilities exist that can impact your firm’s brand, business stability as well as the global economic presence countries are building by using the Internet.  Having a strong business resiliency plan will help mitigate threats posed to your customers, your company and your country.
    
__NOTOC__
 
__NOTOC__
 
__NOEDITSECTION__
 
__NOEDITSECTION__
3,007

edits

Navigation menu