How to defend your business against Domain Name Server attacks

DNS attack image
Traditional endpoint security won't cut it against them

EfficientIP, a developer of DDI solutions, recently launched the industry's first hybrid DNS engine in response to the growing number of DNS cyber attacks such as Denial of Service (DoS) and cache poisoning.

Whereas most DNS servers run a single DNS engine, EfficientIP's SOLIDServer Hybrid DNS Engine (HDE) combines three DNS engines, managed in a single appliance.

David Williamson, CEO, EfficientIP explains what's behind Domain Name Server attacks and why different approaches are needed to DNS security.

TechRadar Pro: Why are DNS servers particularly vulnerable to attack? What's all the fuss about?

As a result, today's hackers are very familiar with the security holes and vulnerabilities of DNS servers and their software, which makes them targets for Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

TRP: What are the potential outcomes of a DNS attack, and what does it really mean for today's Internet-dependent businesses?

TRP: Can't DNS attacks be avoided with traditional endpoint security and if not, why not?

They don't, however, protect the DNS server itself. This means that businesses need to protect themselves from cyber criminals that try to abuse and manipulate the DNS server software so that it contains bogus or fraudulent IP addresses.

TRP: What are the advantages of using multiple DNS engines in the same server appliance and why won't they be affected by a full on DoS attack?

The alternative engine can remain in place while DNS programmers patch, test and validate a security upgrade for the first engine. The other key benefit is that with multiple DNS engines in place, hackers will never be sure which name server software is running and so the task of analysing DNS network packet footprints to discover its vulnerabilities is complex and virtually impossible.

TRP: Why is separating authoritative and recursive functions in the name server code important in defending against DNS attacks?

DW: The most popular and widely deployed name server is the Berkley Internet Name Domain (BIND). It's regarded as an excellent compromise between speed and security, ease of administration and robustness and RFC standards integration and universal applicability.

However, its very popularity means it is potentially at greater risk as its vulnerabilities are well known to hackers and its key authoritative and recursive functions are contained within the same code. By incorporating a second DNS engine in the same appliance with separate authoritative and recursive functions the security and reliability of critical DNS services are significantly increased.

By using an alternative DNS engine that is based on two different name server products such as Unbound and NSD, not only is performance significantly improved over using BIND alone, but also a more robust environment is created.

Unbound, for example, is a validating, recursive and caching DNS resolver that is designed for high performance while NSD is an authoritative only, high performance name server. At any moment, one DNS engine is active and the other is on standby, waiting to be activated to restore the service when it is needed.

TRP: Is name server software performance important when it comes to handling DoS attacks?

DW: Performance speed is vital to ensure a fast response and significantly reduce the risk of attack. NSD, for example, is around twice as fast as BIND, which means that NSD offers a significantly more robust environment in the case of a DoS attack. This is particularly important for telcos, ISP's and other Managed Service Providers whose businesses rely on delivering fast and reliable Internet connectivity.

TRP: How well are organisations currently able to defend themselves against these attacks and what steps should they be taking now?

DW: To date organisations have not been able to out manoeuvre cyber criminals in this way, as a hybrid solution has not been available. They have only been able to analyse the severity of the attack once it has occurred, by which time it is too late, as the damage will have been done.

One of the most secure approaches to protecting name servers against vulnerability is the use of multiple name server engines so that when an attack occurs, management software can automatically switch to a different standby name server.

As businesses require IT to deliver more in even shorter timeframes, the risk of error dramatically increases. Manual processes increasingly need to be automated to maintain both quality of service and availability of the network to the business.

Desire Athow
Managing Editor, TechRadar Pro

Désiré has been musing and writing about technology during a career spanning four decades. He dabbled in website builders and web hosting when DHTML and frames were in vogue and started narrating about the impact of technology on society just before the start of the Y2K hysteria at the turn of the last millennium.