Domain Name Service (DNS) is a foundational backbone for internet communications. Think of DNS as the Internet’s phone book or contact list.
Domain Name Service allows users, devices, and applications to find and communicate with each other by entering user-friendly URLs (ex., splunk.com) instead of using hard to remember IP addresses such as 192.168.1.1. DNS simplifies the process of finding other internet resources.
Let’s look at the simple yet complicated world of DNS, its functions, types of uses, and its role in enabling and securing digital communications.
The DNS protocol simplifies and enables communication between internet devices (hosts) and clients. For example, I can type this URL into my client browser when I want to visit the Splunk Blogs website.
https://www.splunk.com/en_us/blog
Here’s what happens next:
My browser sends this URL to a DNS server. The DNS server resolves the URL to its underlying IP V4 or V6 address (52.1.114.19, in this case) and sends the IP address back to my browser. My browser client submits my https request to that address. The destination host processes the request and sends a response back to the client. If the host doesn’t exist, the DNS server sends back a 404 or “Page Not Found” error which my browser will display.
Depending on your device addressing scheme, IP addresses can be formatted in one of two ways:
DNS servers contain internet-wide comprehensive lists of top-level URL domains and their corresponding IP addresses. DNS is a decentralized service that is available on many different internet hosts.
Client and host devices are usually configured with the IP addresses for one primary and one secondary DNS service to be used for client address resolution (sometimes referred to as Preferred and Alternate DNS settings, as seen in the image below).
Although some devices may come pre-configured from a vendor to use the same DNS service for their primary and secondary servers, it is recommended to use two different DNS service providers for IP address resolution, in case one of the providers is not available.
Also note that different operating systems may treat primary and secondary DNS resolution settings differently:
Clients can use any available servers as their primary and secondary DNS servers. DNS servers can be assigned to specific Wi-Fi or network connections, and selected servers must be open to client requests. Some of the more popular DNS server choices include:
DNS connection settings can be assigned for Wi-Fi or network connections
Whenever your device sends an URL-to-IP Address resolution request to a DNS server, the resulting address is returned and stored in the local device’s DNS cache. If the same address is requested a second time, it is retrieved from the DNS cache rather than resubmitting the request.
DNS caching reduces network/Internet traffic and improves retrieval speed and efficiency. Cached DNS records are retained according to a DNS time to live (TTL) setting. After a DNS record reaches its DNS TTL setting, any new requests for that information must be received again from a primary or secondary DNS server.
Because of its simple design, DNS servers and requests are frequent targets for cyberattacks and exploitation. DNS attacks can be used to enable:
Here are some of the more common service and request attacks that threaten DNS servers and clients, including:
The more common DNS attacks
DNS tunneling: Cybercriminals covertly encode non-DNS data — including executable commands — into a DNS query.
DNS spoofing & cache poisoning: Hackers spoof DNS information and insert fraudulent IP addresses into a DNS cache, to redirect users to a malicious website.
Distributed Detail of Service (DDoS) & DNS amplification: DNS amplification — where many small requests are sent through a DNS resolver at the same time — overwhelms the Web service, creating a DDoS attack that renders website access inaccessible.
DNS fast flux: Cybercriminals exploit the DNS resolution mechanism to prevent search services and businesses from denylisting malicious IP addresses. DNS fast flux seeks to ensure malicious content remains available by continuously changing the content’s host IP address.
Vendors such as Splunk can provide tools and machine learning models to help monitor and inspect DNS traffic for traffic patterns and anomalies that may signify a security breach, DNS attack, misconfigured DNS endpoints, and more.
Explore these articles for more information on DNS monitoring, inspection, analysis, and security.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.