Relevance and protection regarding dns attacks, Computer Networking

Assignment Help:

Relevance and Protection regarding DNS Attacks

While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may of the issues be able to be addressed with the new updated version or can say the new release of bind.  But according to menandmice.com, the threat is still real:

“A lot of other alarming surveys are available on this website “

Another suitable solution can be the DNS SEC, which is a proposition for secure DNS transactions. Although, this approach generally solves almost all the protocol problems. But because of backward compatibility reason, sometimes, this is not implemented and hence the other alternatives are needed to be discovered by the current network administrator. In order to save or can say to secure the group of servers or simple the DNS; there are many alternatives which can be opted.

Following are measures can be taken in order to escape form the above stated problems of can say the issues

  • In order to prevent spoofing, recursive queries need to be controlled and hence should be forbidden.
  • Maximum updating of that BIND is good hence this process hold be incremented as many as possible.
  • Managing  all the servers in the single and same subnet not only increase the effort for hard management but it also results in the single point failure problem, which need to be overcome by dividing the server in to different subnets. This happens same in the case of routers as well as leased lines.
  • Restrict the possible queries and the possible hosts who are allowed to query to the minimum.

 

While discussing about the processing of the DNS, there is one specific service which is used to synchronize with the primary server is the request (AXFR).  In real since, this services can be hacked in order to get the required information regarding zone transfer and hence all the data of the current DNS can be accessed. This will allow the hacked to gather or can say collect all the associated information regarding the victim’s network. In order to protect this kind of hacking, the good way is to put this feature off in order to restrict it to specific host.

There is another best alternative which can be adopted in order to protect the DNs is the mechanism of Divide and conquer strategy used in the DNS architecture.  The main principal of this strategy is generally contains two major process. The initial one divides or can say diverges the Domain name System (DNS system in order to result in to two parts, out of which the one perform the function of mapping which will be from name to address and the other that is the second part will perform the process for the requesting the incoming which are generally from the internal or can say from the host which are trusted. This is the reason, in the case of external Domain Name System, if the hacked process is applied to external DNS, to the internal hosts,the service provider won’tbe affected at least.


Related Discussions:- Relevance and protection regarding dns attacks

What is the multicast routing, Sending a message to a group multicast addre...

Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.

What are the types of transmission media, What are the types of Transmissio...

What are the types of Transmission media? Signals are usually transmitted over some transmission media that are broadly divided in to two categories:- Guided Media: Th

Explain functions and protocols and services of each layer, Describe in pro...

Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?

Tunnelling - point to point, Tunnelling To guarantee privacy for the  o...

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Who initiates the ‘trap'' message, Question 1 Who initiates the ‘Trap' mes...

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

What is virtual channel, What is virtual channel? Virtual channel is no...

What is virtual channel? Virtual channel is normally a connection from single source to one destination, although multicast connections are also allowed. The other name for vir

What is domain name, Domain Name A domain name is a way to recognize an...

Domain Name A domain name is a way to recognize and locate computers connected to the Internet.  This is a text name of a computer in network or Internet. Domain names are chan

Cdma gsm back haul network, S t d "B" 6.4 m Ku-BAND EARTH STATION (2004) ...

S t d "B" 6.4 m Ku-BAND EARTH STATION (2004)   D-Sat (District Satellite Project) circuits for rural connectivity via satellite are in operation. Purpose of this project i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd