DNS Security
Defending the Domain Name System
- 1st Edition - June 10, 2016
- Authors: Allan Liska, Geoffrey Stowe
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 8 0 3 3 0 6 - 7
- eBook ISBN:9 7 8 - 0 - 1 2 - 8 0 3 3 3 9 - 5
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteDNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
- Presents a multi-platform approach, covering Linux and Windows DNS security tips
- Demonstrates how to implement DNS Security tools, including numerous screen shots and configuration examples
- Provides a timely reference on DNS security, an integral part of the Internet
- Includes information of interest to those working in DNS: Securing Microsoft DNS and BIND servers, understanding buffer overflows and cache poisoning, DDoS Attacks, pen-testing DNS infrastructure, DNS firewalls, Response Policy Zones, and DNS Outsourcing, amongst other topics
Information security professionals and consultants, network administrators, and other information systems managers, specialists, and analysts
- Dedication
- About the Authors
- Acknowledgments
- Chapter 1. Understanding DNS
- Abstract
- Introduction
- DNS History
- The Root
- Recursive and Authoritative Servers
- Zone Files
- Resource Records
- Conclusions
- Notes
- Chapter 2. Issues in DNS security
- Abstract
- Introduction
- A Brief History of DNS Security Breaches
- Why is DNS Security Important?
- Common DNS Security Problems
- Developing a DNS Security Plan
- Notes
- Chapter 3. DNS configuration errors
- Abstract
- Introduction
- DNS Server Vulnerabilities
- Fingerprinting DNS Servers
- Buffer Overflows, Race Conditions, and Execution with Unnecessary Privileges
- Human Errors
- Conclusions
- Chapter 4. External DNS exploits
- Abstract
- Introduction
- Cache Poisoning
- DNS Spoofing
- DDoS Attacks Using DNS
- Using DNS as a Command and Control or Exfil Channel
- Conclusions
- Notes
- Chapter 5. DNS reconnaissance
- Abstract
- Introduction
- WHOIS
- Mapping DNS Infrastructure
- DNS Fingerprinting
- Reverse DNS
- DNS Cache Snooping
- Passive DNS
- Collection of Query Data
- Conclusions
- Notes
- Chapter 6. DNS network security
- Abstract
- Introduction
- Locating DNS Servers
- Public and Private DNS Infrastructure
- Logging and Monitoring DNS Traffic
- Flagging Bad Domains
- Passive DNS
- DNS Firewalls and RPZ
- Blacklists, Whitelists, and Other DNS Threat Intelligence
- Conclusions
- Notes
- Chapter 7. BIND security
- Abstract
- Introduction
- Running BIND in a Chroot Jail
- Fingerprint Evasion Techniques
- Response Rate Limiting
- Queries and Transfers
- Response Policy Zones
- Logging
- Conclusions
- Notes
- Chapter 8. Windows DNS security
- Abstract
- Introduction
- Securing Windows DNS Files
- Dynamic DNS Control
- Queries and Transfers
- Windows and DDoS
- Windows Caching Servers
- Windows DNS and High Availability
- Logging
- Conclusions
- Notes
- Chapter 9. DNS outsourcing
- Abstract
- Introduction
- DNS Outsourcing
- Deciding How Much to Outsource
- Working Securely with a DNS Provider
- Monitoring DNS Infrastructure
- DNS Outsourcing and DDoS
- Conclusions
- Notes
- Chapter 10. DNSSEC
- Abstract
- Introduction
- Background
- Cryptography Overview and TLS
- DNSSEC Protocol
- NXDOMAIN Responses
- Implementing DNSSEC on Linux
- Implementing DNSSEC on Windows
- Operating a DNSSEC Zone
- DNSSEC Criticisms
- Conclusions
- Notes
- Chapter 11. Anycast and other DNS protocols
- Abstract
- Introduction
- Anycast Motivation
- Anycast
- Implementing Anycast
- Anycast and DDoS
- Multicast DNS
- DNS Service Discovery
- Tor Hidden Services
- Conclusions
- Notes
- Index
- No. of pages: 226
- Language: English
- Edition: 1
- Published: June 10, 2016
- Imprint: Syngress
- Paperback ISBN: 9780128033067
- eBook ISBN: 9780128033395
AL
Allan Liska
In addition to security experience, Mr. Liska also authored the book The Practice of Network Security and contributed the security-focused chapters to The Apache Administrators Handbook.
GS