Prerequisite – Domain Name Server
Before Discussing DNS Spoofing, First, discuss what is DNS.
A Domain Name System (DNS) converts a human-readable name (such as www.geeksforgeeks.org) to Numeric IP-address. The DNS system response one or more IP-address by which your computer connects to a website (such as geeksforgeeks.org) by using one of the IP-address.
There is not only one DNS server. There are series of DNS server used to resolve the domain name. DNS uses cache to work efficiently so that it can quickly refer to DNS lookups it’s already performed rather than performing a DNS lookup over and over again.
Although DNS caching increase the speed for domain name resolution process But the major change in the domain then it takes a day to reflect worldwide.
DNS Spoofing means getting a wrong entry or IP-address of the requested site from DNS server. Attackers find out the flaws in DNS system and take control and will redirect to a malicious website.
- Request to Real Website: User hit a request for paticular website it goes to DNS server to resolve the ip-address of that website.
- Inject Fake DNS entry: Hackers already take control over the DNS server by detecting the flaws and now they add false entry in DNS server.
- Resolve to Fake Website: Since fake entry in DNS server redirect user to wrong website.
To Prevent From DNS Spoofing –
DNS Security Extensions (DNSSEC) is used to add an additional layer of security in DNS resolution process to prevent security threats such as DNS Spoofing or DNS cache poisoning.
DNSSEC protects against such attacks by digitally ‘signing’ data so you can be assured it is valid.
- Locality of Reference and Cache Operation in Cache Memory
- Difference between Spoofing and Phishing
- Route Poisoning and Count to infinity problem in Routing
- LRU Cache Implementation
- Cache Memory Design
- Difference between Cache and Cookies
- Multilevel Cache Organisation
- Cache Memory in Computer Organization
- Computer Organization | Locality and Cache friendly code
- Difference between Virtual memory and Cache memory
- Interactive Connectivity Establishment (ICE)
- Message Digest in Information security
- Difference between DDL and DML in DBMS
- Reliable Data Transfer (RDT) 1.0
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.