Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
- Presents a multi-platform approach, covering Linux and Windows DNS security tips
- Demonstrates how to implement DNS Security tools, including numerous screen shots and configuration examples
- Provides a timely reference on DNS security, an integral part of the Internet
- Includes information of interest to those working in DNS: Securing Microsoft DNS and BIND servers, understanding buffer overflows and cache poisoning, DDoS Attacks, pen-testing DNS infrastructure, DNS firewalls, Response Policy Zones, and DNS Outsourcing, amongst other topics
Information security professionals and consultants, network administrators, and other information systems managers, specialists, and analysts
- About the Authors
- Chapter 1. Understanding DNS
- DNS History
- The Root
- Recursive and Authoritative Servers
- Zone Files
- Resource Records
- Chapter 2. Issues in DNS security
- A Brief History of DNS Security Breaches
- Why is DNS Security Important?
- Common DNS Security Problems
- Developing a DNS Security Plan
- Chapter 3. DNS configuration errors
- DNS Server Vulnerabilities
- Fingerprinting DNS Servers
- Buffer Overflows, Race Conditions, and Execution with Unnecessary Privileges
- Human Errors
- Chapter 4. External DNS exploits
- Cache Poisoning
- DNS Spoofing
- DDoS Attacks Using DNS
- Using DNS as a Command and Control or Exfil Channel
- Chapter 5. DNS reconnaissance
- Mapping DNS Infrastructure
- DNS Fingerprinting
- Reverse DNS
- DNS Cache Snooping
- Passive DNS
- Collection of Query Data
- Chapter 6. DNS network security
- Locating DNS Servers
- Public and Private DNS Infrastructure
- Logging and Monitoring DNS Traffic
- Flagging Bad Domains
- Passive DNS
- DNS Firewalls and RPZ
- Blacklists, Whitelists, and Other DNS Threat Intelligence
- Chapter 7. BIND security
- Running BIND in a Chroot Jail
- Fingerprint Evasion Techniques
- Response Rate Limiting
- Queries and Transfers
- Response Policy Zones
- Chapter 8. Windows DNS security
- Securing Windows DNS Files
- Dynamic DNS Control
- Queries and Transfers
- Windows and DDoS
- Windows Caching Servers
- Windows DNS and High Availability
- Chapter 9. DNS outsourcing
- DNS Outsourcing
- Deciding How Much to Outsource
- Working Securely with a DNS Provider
- Monitoring DNS Infrastructure
- DNS Outsourcing and DDoS
- Chapter 10. DNSSEC
- Cryptography Overview and TLS
- DNSSEC Protocol
- NXDOMAIN Responses
- Implementing DNSSEC on Linux
- Implementing DNSSEC on Windows
- Operating a DNSSEC Zone
- DNSSEC Criticisms
- Chapter 11. Anycast and other DNS protocols
- Anycast Motivation
- Implementing Anycast
- Anycast and DDoS
- Multicast DNS
- DNS Service Discovery
- Tor Hidden Services
- No. of pages:
- © Syngress 2016
- 14th June 2016
- Paperback ISBN:
- eBook ISBN:
Allan Liska is a Consulting Systems Engineer at FireEye Inc. and an "accidental" security expert. While Allan has always been good at breaking things, he got his start professionally working as a customer service representative at GEnie Online Services (a long defunct early competitor to AOL), where he would spend his off hours figuring out how users had gain unauthorized access to the system, booting them off, and letting the developers know what needed to be patched. Unknowingly, this was leading him down the path of becoming a security professional. Since then he has work at companies like UUNET, Symantec, and iSIGHT Partners helping companies better secure their networks. He has also worked at Boeing trying to break into those company networks.
In addition to his time spent on both sides of the security divide Allan has written extensively on security including The Practice of Network Security and Building an Intelligence-Led Security Program. He was also a contributing author to Apache Administrator's Handbook.
Consulting Systems Engineer, FireEye Inc.
Geoffrey Stowe lives in San Francisco and is an Engineering Lead at Palantir Technologies. His network security work has included vulnerability research, reverse engineering, incident response, and anomaly detection. There was a time when he could translate byte code to assembly without looking at a manual. Geoff started Palantir’s commercial business in 2010 and built its first platforms for distributed, large scale data analysis. He graduated from Dartmouth College with a degree in computer science.
Engineer, Palantir Technologies
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.