preview

DNS Domain Research Paper

Decent Essays

V.ZONING & SIGNATURES
All the domains , part of DNS system will possess several settings which are named as DNS Records. For an organized structure of these records , Zone is assigned
At the point when another DNS server is added to the system and it is arranged as another optional server for a current zone, it plays out a full introductory exchange of the zone to get and repeat a full duplicate of resource records for the zone. Most prior DNS server usage utilize this same technique for full exchange for a zone when the zone requires updating after changes made to the zone. For DNS servers running Windows Server 2003 and Windows Server 2008, the DNS Server benefit bolsters incremental zone exchange, a modified DNS zone exchange process …show more content…

In the recent times, hackers or attackers, because of technological advances, are trying to mislead the user by various attacks. As we discussed some of the attacks in the above mentioned “Type of Attacks”, now we shall look into a common process of DNS Hijacking where DNS Zoning along with signatures and keys can be more helpful.
In the following figure , it shows the basic outline of how the domain name system acts and how information is being exchanged in the normal conditions. Arrows indicate exchange between systems in bi direction.

Figure 2: DNS working
When attackers enter into open WiFi or Public accessed networks, they bypass all the Proxy configurations and steal the information from the main computer after making multiple harmful queries and spoofing the DNS. By doing this, the whole DNS system can be cloned. After cloning or replicating the DNS, attackers can try to create a malicious or harmful information into the user’s computer or host device.

Figure 3: Replicated DNS attacking the host.
When a user is trying to access a website, like www.cnexample2017bank.com to check the accounts, the replicated DNS will give the phishing page or replicated page of original website into the Host device. When the user enters his/her credentials, those credentials can be stolen and website fake DNS returns an error message.. After reaching the replicated page, then the request is

Get Access