000 05390nam a2200637 i 4500
001 8006402
003 IEEE
005 20230927112359.0
006 m o d
007 cr |n|||||||||
008 171030s2008 maua ob 001 eng d
019 _a993640558
_a993651104
020 _a9781119328292
_qelectronic bk.
020 _a9781119331407
020 _a1119331404
020 _z9781119328278
_qprint
020 _a9781119331391
020 _z1119328292
_qelectronic bk.
020 _a1119331390
020 _z1119328276
024 7 _a10.1002/9781119328292
_2doi
035 _a(CaBNVSL)mat08006402
035 _a(IDAMS)0b00006485e6511c
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
082 0 4 _a005.8
100 1 _aDooley, Michael
_c(Computer scientist),
_eauthor.
245 1 0 _aDNS security management /
_cMichael Dooley, Timothy Rooney.
264 1 _aHoboken, New Jersey :
_bJohn Wiley and Sons, Inc. ;
_aPiscataway, NJ :
_bIEEE Press,
_c[2017]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2017]
300 _a1 PDF :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE Press series on networks and services management
504 _aIncludes bibliographical references and index.
505 0 _aDNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages
505 8 _aDNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS
505 8 _aNetwork ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers
505 8 _aMulti-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance
505 8 _aDetect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms
506 _aRestricted to subscribers or individual electronic text purchasers.
520 8 _aThis work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aOnline resource; title from PDF title page (EBSCO, viewed July 13, 2017)
650 0 _aInternet domain names
_xSecurity measures.
650 0 _aComputer security.
655 4 _aElectronic books.
700 1 _aRooney, Tim,
_eauthor.
710 2 _aIEEE Xplore (Online Service),
_edistributor.
710 2 _aWiley,
_epublisher.
776 0 8 _cOriginal
_z9781119328278
_z1119328276
_w(OCoLC)974672804
830 0 _aIEEE Press series on networks and services management.
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8006402
999 _c40776
_d40776