Special Topics in Networks Operation and Administration_Unit5_IP

Special Topics in Networks Operation and Administration_Unit5_IP

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Special Topics in Networks Operation and Administration Unit 5 Individual Project Kregg M. Soltow November 4, 2011 American Intercontinental University DNS cache poisoning is an intentional malicious effort to attack a specific name server. It is possible that such poisoning is an unintentional occurrence, but not always likely. The main function of the domain name server is to interpret any given domain name into an easily recognizable IP address. These types of attacks involve poisoning the cached information of these servers which are then fed down through unsuspecting servers downstream resulting in poor performance and reliability of data. By utilizing certain DNS software and methods, users can reduce the likelihood of such poisoning. What is DNS cache poisoning? DNS cache poisoning is mainly just an information integrity protection conciliation within the users DNS. Such a breach often takes place at the time when information is brought into a domain name server's cached information database that was not sent from secure DNS resource. This is often an intentional malicious effort to attack a specific name server for any number of given reasons. However, it is possible that such poisoning is an unintentional consequence of a system poorly configuring a cached DNS and can also likely be the result of unacceptable programming of the systems domain name server applications....
View Full Document

Page1 / 6

Special Topics in Networks Operation and Administration_Unit5_IP

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online