Prerequisite – Domain Name Server
Before Discussing DNS Spoofing, First, discuss what is DNS.
A Domain Name System (DNS) converts a human-readable name (such as www.geeksforgeeks.org) to Numeric IP-address. The DNS system response one or more IP-address by which your computer connects to a website (such as geeksforgeeks.org) by using one of the IP-address.
There is not only one DNS server. There are series of DNS server used to resolve the domain name. DNS uses cache to work efficiently so that it can quickly refer to DNS lookups it’s already performed rather than performing a DNS lookup over and over again.
Although DNS caching increase the speed for domain name resolution process But the major change in the domain then it takes a day to reflect worldwide.
DNS Spoofing means getting a wrong entry or IP-address of the requested site from DNS server. Attackers find out the flaws in DNS system and take control and will redirect to a malicious website.
- Request to Real Website: User hit a request for paticular website it goes to DNS server to resolve the ip-address of that website.
- Inject Fake DNS entry: Hackers already take control over the DNS server by detecting the flaws and now they add false entry in DNS server.
- Resolve to Fake Website: Since fake entry in DNS server redirect user to wrong website.
To Prevent From DNS Spoofing –
DNS Security Extensions (DNSSEC) is used to add an additional layer of security in DNS resolution process to prevent security threats such as DNS Spoofing or DNS cache poisoning.
DNSSEC protects against such attacks by digitally ‘signing’ data so you can be assured it is valid.
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
- Why does DNS use UDP and not TCP?
- Computer Network | Difference between Byte stuffing and Bit stuffing
- Practice Set for Recurrence Relations
- Automata Theory | Set 2
- Mathematics | Matrix Introduction
- Differences between TCP and UDP
- Asynchronous serial data transfer
- Computer Network | Bit Stuffing
- Bit stuffing using Java | Computer Networks
- Computer Network | Difference between layer-2 and layer-3 switches