Rules for Critical Infrastructure Protection

Critical infrastructures are generally thought of as the key systems, services and functions whose disruption or destruction would have a debilitating impact on public health and safety, commerce, and national security or any combination of those matters. Critical information infrastructures (CII) provide the essential services that support modern information societies and economies.

Types of Virtual DNS Attacks

Attackers are taking advantage of weaknesses in the DNS protocol in order to launch a high bandwidth sophisticated attack on their victim using amplification effects. A domain name system server translates a human readable domain name (such as example.com) into a numerical IP address that is used to route communications between nodes. Normally if the server doesn't know a requested translation it will ask another server, and the process continues recursively.

DNS Pharming Attack Lab

DNS (Domain Name System) is the Internet's phone book; it translating hostnames to IP addresses, and vice versa. This translation is through DNS resolution, which happens behind the scene. DNS Pharming attacks manipulate this resolution process in various ways, with an intent to misdirect users to alternative destinations, which are often malicious. The objective of this lab is to understand how such attacks work. Students will first set up and configure a DNS server, and then they will try various DNS Pharming attacks on the target that is also within the lab environment.