What is a DNS (Domain Name Server) - Check Point Software (2024)

How Does DNS Work?

Okay, so a DNS is like a sophisticated address book for the Internet – but how does it work? Glad you asked.

The DNS directory isn’t located in one physical place or even one corner of the vast Internet. It’s distributed all over the world and stored on many different servers that communicate with one another to regularly provide updates, information, and redundancies.

DNS information is shared among a variety of servers, but it’s also cached locally on individual computers and devices. This prevents users’ computers from having to query the name server for commonly used IP addresses every time. The result is far greater efficiency.

In all, there are four different DNS servers involved in loading a webpage (assuming it’s not already cached on the user’s computer or device):

  • DNS recursor. This server is similar to a librarian who is tasked with finding a specific book in a library. This server is specifically intended to handle queries directly from client machines through web browsers (and other similar applications).
  • Root nameserver. This server translates human readable host names – web URLs – into IP addresses. It’s basically the translator.
  • TLD nameserver. This server is responsible for categorizing websites based on their type. It’s the last portion of the domain name. Different TLDs include .com, .org, .net, etc.
  • Authoritative nameserver. The fourth and final server involved in loading a webpage is the authoritative nameserver. If this server has access to the record the user’s query is requesting, the IP address will be delivered to the DNS recursor that made the original request.

Common DNS Attacks

For the most part, DNS works flawlessly in the background. However, it’s been around for decades and hackers are continuously finding ways to compromise the underlying system (which was never developed with security in mind). Here are some common attacks we see:

  • Reflection attacks. This type of attack overwhelms users with high-volume messages straight from DNS resolver servers. The attackers request massive files from all open resolvers using the spoofed IP address of their victim. Once the resolvers respond, the victim gets an endless flow of unrequested data that overwhelms their machine.
  • Resource exhaustion. As the name suggests, these attacks work by clogging up the DNS infrastructure of ISPs. This blocks users from reaching sites on the internet.
  • Cache poisoning. This type of attack diverts users from an intended destination to malicious web addresses. The attacker does so by inserting false address records into the system. Once a user ends up on one of these phony websites, they can be tricked into providing sensitive information.

Accounting for DNS Security

Hackers today are sophisticated professionals who develop advanced, ever-changing attacks. As such, network security is more important than ever before. Whether it’s DNS attacks, or something else entirely, your business must commit to staying safe and protected around the clock.

What is a DNS (Domain Name Server) - Check Point Software (2024)
Top Articles
XE vs OFX (NZForex) | FX | Foreign exchange | Money Transfer
All the Devils Are Here by Bethany McLean, Joe Nocera: 9781591844389 | PenguinRandomHouse.com: Books
Ohio Houses With Land for Sale - 1,591 Properties
Davita Internet
B67 Bus Time
The Connecticut Daily Lottery Hub
Driving Directions To Atlanta
Nalley Tartar Sauce
Nwi Arrests Lake County
Playgirl Magazine Cover Template Free
Busted Barren County Ky
Payment and Ticket Options | Greyhound
Me Cojo A Mama Borracha
ARK: Survival Evolved Valguero Map Guide: Resource Locations, Bosses, & Dinos
Abby's Caribbean Cafe
Myhr North Memorial
Terry Bradshaw | Biography, Stats, & Facts
Shreveport City Warrants Lookup
At&T Outage Today 2022 Map
Brbl Barber Shop
Blackboard Login Pjc
WPoS's Content - Page 34
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Tu Housing Portal
Perry Inhofe Mansion
Bfri Forum
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Puerto Rico Pictures and Facts
Song That Goes Yeah Yeah Yeah Yeah Sounds Like Mgmt
1-800-308-1977
New Gold Lee
Wsbtv Fish And Game Report
Chatropolis Call Me
Orion Nebula: Facts about Earth’s nearest stellar nursery
Low Tide In Twilight Manga Chapter 53
Callie Gullickson Eye Patches
Homeloanserv Account Login
Coroner Photos Timothy Treadwell
Amc.santa Anita
Unblocked Games Gun Games
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Holzer Athena Portal
Killer Intelligence Center Download
Kaamel Hasaun Wikipedia
Wood River, IL Homes for Sale & Real Estate
Wild Fork Foods Login
Assignation en paiement ou injonction de payer ?
Powah: Automating the Energizing Orb - EnigmaticaModpacks/Enigmatica6 GitHub Wiki
Service Changes and Self-Service Options
Law Students
Ravenna Greataxe
What Are Routing Numbers And How Do You Find Them? | MoneyTransfers.com
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6820

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.