Child Account:

How to Mitigate & Prevent DDoS (Distributed Denial of Service) Attacks on the DNS

What are the Implications of DDoS Attacks on the DNS Infrastructure?

The Domain Name System (DNS) is part of the functional infrastructure of the Internet and part of the Internet’s “trust” framework. Without these nameservers, the huge investments in hardware, software and applications that organizations make cannot be found and accessed by customers. Unfortunately, because the DNS is a key piece of infrastructure, it is a piece is targeted by malicious players.

Distributed Denial of Service (DDoS) attacks targeting the DNS is a specific type of DDoS attack that exposes vulnerabilities in the DNS system. This solution brief provides an explanation for this specific type of attack.

A distributed denial of service (DDoS) attack is used to bring down a system without leveraging the attackers own system. This helps the attacker to avoid discovery. While this form of attack, on its own, doesn’t attempt to gain access to an organizations data, it can be used maliciously by bad actors to deny resources or inhibit services to a targeted system. Moreover, DDoS attacks in general have been on the rise globally for years and 2016 was no exception. One of the largest ever targeting the DNS occurred against Dyn DNS servers in October 2016 and used IoT devices to generate up to 1 TB of traffic. Fully one-third of DNS operators have reported a customer-impacting attack of this type (source: Arbor 2016 Worldwide Infrastructure Security Report). For service providers, this number jumps to 50%!

How a DNS DDoS Attack Works

The DNS DDoS attack uses three elements:

  1. Spoofing
  2. Reflection
  3. Amplification

Since the attacker’s goal is to saturate a nameserver, these elements of the attack are typically distributed across many open DNS resolvers by using botnets.

Spoofing & Reflection - Spoofing and reflecting go hand-in-hand. Through spoofing, the attacker sends a large number of queries to tens of thousands of DNS servers where the source IP address is spoofed to the DNS server(s) of the target organization. These servers then reflect the attack from the source to the target.

Amplification - The amplification comes in when the reflecting server answers the relatively small query with a much larger response. In the case of the DNS, the problem is compounded because a very small query (<100 bytes) can be amplified (to 50X and up) to generate thousands of bytes in response.

How DNSSEC can be used to amplify a DDoS DNS attack

DNSSEC is a secure handshake protocol for domain names that is used to validate that the website the user expects to be accessing is the one that they are accessing. It helps to address a problem that has been around since the dawn of the Internet, and helps to prevent man in the middle type of attacks. This is distinct from SSL which uses a similar set of protocols to secure the actual communications once they have been initiated. DNSSEC has rapidly gained adoption by top-level domain registries and as of 2014 is beginning to gain more rapid traction across the rest of the Internet with players like Microsoft and Google actively promoting its benefits. However, as it does, it has the potential to further amplify a DDoS attack because the additional bytes for sending keys can further increase the amplification.

How an Anycast DNS Infrastructure – such as Webnames Anycast - Can Help to Mitigate the Problem

Several players in the industry are trying to get the (tens of millions of) open recursive DNS resolvers cleaned-up by focusing on the networks that allow them and getting them to shut them down. However, this is an extremely challenging global problem that is caused by the inadvertent behaviour of both individuals and corporations. The rapid growth in IoT devices is likely to compound the matter further. Rather than trying to solve the global issue, there is a more immediate and active response to the problem for an IT department.

For application-layer DDoS attacks IT departments focus on their server infrastructure by, for example, limiting responses to packets that are too large, dropping responses altogether, rate limiting traffic, or blocking traffic from certain servers entirely. These types of tactics are an important part of the solution, but one that does not solve the problem against the DNS. For the DNS a tactic which has been successfully deployed by domain name registries and many large organizations is the use of Anycast technology.

Anycast DNS servers enable organizations to deploy a set of DNS servers across the globe that can all resolve the address. Since one of the features of Anycast DNS is that queries are responded to by the geographically closest server, attacks against one node will only impact customers in that region. Maintaining two or more Anycast clouds on different infrastructure and network connectivity provides for even more in-region redundancy to help mitigate the impact of an attack.

In addition to solving the global risk, if a business has a large domestic component then locating a few high bandwidth local nodes can help to protect your local traffic from an attack that originates off-shore. Why? Because the global attack will be soaked-up by the geographically closest off-shore server leaving your domestic ones unaffected.

Even if a global DNS server is brought down, by the time the attack moves to a new node the old one can be back online. In effect it becomes a world-wide game of whacka- mole on the DNS servers that aren’t delivering content to your most important market or region anyway.

Additional Benefits of an Anycast DNS Infrastructure in Protecting Business Critical Online Operations

Given that Unicast doesn’t provide the redundancy of anycast, a global company may elect to run several distinct Anycast clouds each serving a different market.

To do this we recommend using one or more dedicated DNS solution providers that have services to help them geo-focus their DNS traffic. The other benefit of using redundant suppliers is that your overall network can be more resilient and faster.

Alternatively, if an organization prefers to in-source their authoritative DNS infrastructure then it can be built and managed in organizational data centers. Even in this scenario, using a 3rd party backup via Anycast is a cost-effective way to help protect the network.

And finally, because of the way anycast is architected, there is the option to combine some in-house infrastructure with one or more best-of-breed secondary solutions. This provides redundancy and capacity for organizations where access to the website is critical.

For the data behind the increasing threat that DDos Attacks on the DNS pose to businesses, refer to Webnames DDoS Attacks by the Numbers Fact Sheet.

Learn More about Webnames Anycast DNS

More Information

If you have specific questions about Anycast's features that are not addressed here, or require help determining which plan is right for your organization, contact our Customer Support team by calling 1-866-976-9835 and one of our DNS experts would be happy to assist you.

Sign In to Your Account
Don't have an account? Sign up now
Forgot password
or sign in with