

For example, an attacker might perform cache poisoning on the DNS entry for a legitimate bank’s website, thereby directing visitors to the hacker’s fake look-a-like site in order to capture their login or banking details.


One common attack on the DNS infrastructure is called “ DNS spoofing.” In this type of attack, also known as “DNS cache poisoning,” an attacker tricks a DNS server into returning an incorrect IP address for a target website. Though DNS provides a deceptively simple service - translating human-friendly website addresses such as into computer-friendly numerical IP addresses such as - the system’s integrity is a crucial cornerstone of Internet operations and trustworthiness. Like most of the network protocols and systems in widespread use today, the Domain Name System ( DNS) harbors significant security vulnerabilities.
