DNS Security and Hijacking Prevention
The Domain Name System underpins virtually every internet transaction, translating human-readable hostnames into IP addresses that route traffic across networks. When that system is compromised — through cache poisoning, registrar-level hijacking, or protocol exploitation — the consequences range from credential theft to full infrastructure takeover. This page describes the DNS security service landscape, the technical and administrative mechanisms used to defend it, the threat scenarios that define the risk environment, and the decision boundaries that distinguish DNS security categories from one another.
Definition and scope
DNS security encompasses the technical controls, protocol extensions, administrative policies, and monitoring practices applied to protect the Domain Name System from manipulation, interception, and unauthorized modification. The scope covers three distinct layers: the protocol layer (how DNS queries and responses are structured and authenticated), the infrastructure layer (resolver and authoritative server hardening), and the registrar/registry layer (administrative controls over zone delegation and domain registration records).
The Internet Engineering Task Force (IETF) formalized DNS Security Extensions — known as DNSSEC — through RFC 4033, RFC 4034, and RFC 4035, establishing a cryptographic chain of trust from the DNS root zone through top-level domains to authoritative zone records. DNSSEC allows resolvers to verify that DNS responses have not been altered in transit, but it does not encrypt query content — that distinction is critical for understanding what DNSSEC does and does not address.
The Cybersecurity and Infrastructure Security Agency (CISA) identifies DNS infrastructure as a component of critical infrastructure protection under the National Infrastructure Protection Plan. Federal civilian agencies are subject to DNS security requirements under Binding Operational Directive 18-01, which mandates DNSSEC deployment on all .gov domains and adoption of email authentication records including SPF and DMARC.
The cyber safety listings on this platform catalog service providers operating across DNS monitoring, DNSSEC implementation, and related protective categories.
How it works
DNS hijacking exploits the resolution process at one of four intervention points: the client configuration, the recursive resolver, the authoritative name server, or the registrar account. Defenders must address each layer independently.
DNSSEC validation chain operates as follows:
- A DNS resolver requests a record from an authoritative name server.
- The authoritative server returns the record along with a digital signature (RRSIG record) generated with the zone's private key.
- The resolver retrieves the zone's public key (DNSKEY record) and validates the signature.
- The resolver verifies the DNSKEY is authenticated by the parent zone using a Delegation Signer (DS) record, tracing the chain up to the ICANN-operated DNS root, which has been signed since 2010.
- If any signature fails validation, the resolver returns a SERVFAIL response rather than a potentially forged answer.
Encrypted DNS transport — including DNS over HTTPS (DoH, RFC 8484) and DNS over TLS (DoT, RFC 7858) — addresses a separate vulnerability: passive interception of unencrypted UDP port 53 traffic. DoH routes queries inside HTTPS sessions on port 443; DoT establishes a dedicated TLS session on port 853. The 2 protocols differ in their visibility to network administrators — DoH traffic is indistinguishable from standard web traffic, whereas DoT uses a dedicated port that network operators can monitor or filter.
Registrar-level controls address domain hijacking through registrar locks (also termed transfer locks or domain locks), multi-factor authentication on registrar accounts, and Registry Lock services that require out-of-band verification before any zone changes take effect. The Internet Corporation for Assigned Names and Numbers (ICANN) maintains published guidance on registrar lock tiers.
NIST's Special Publication 800-81-2 provides a structured framework for deploying DNS security controls in federal and enterprise environments, covering resolver configuration, zone signing procedures, and key management lifecycle.
Common scenarios
Cache poisoning (Kaminsky attack variant): An attacker floods a recursive resolver with forged responses, attempting to inject a malicious IP address for a target domain before the legitimate response arrives. The 2008 discovery by researcher Dan Kaminsky demonstrated that predictable transaction IDs and source ports made resolvers across the internet vulnerable; DNSSEC validation is the definitive technical countermeasure, supplemented by source port randomization (RFC 5452).
BGP-assisted DNS hijacking: Attackers announce fraudulent Border Gateway Protocol routes to attract traffic destined for authoritative DNS servers, intercepting or modifying responses at scale. This attack vector is classified separately from protocol-level DNS attacks because remediation requires routing security measures such as Resource Public Key Infrastructure (RPKI), not DNS-layer controls alone.
Registrar account compromise: An attacker gains access to a domain registrar account and modifies name server delegations or DS records, redirecting all DNS traffic for the domain to attacker-controlled infrastructure. CISA issued Emergency Directive 19-01 in January 2019 after a global DNS hijacking campaign — attributed to actors targeting government and commercial domains — exploited weak registrar account controls across organizations in at least 12 countries.
Resolver misconfiguration: Enterprise resolvers configured to forward queries to unvalidated upstream resolvers, or consumer routers with hardcoded DNS settings susceptible to firmware manipulation, expose all downstream clients to manipulation without any protocol-level attack being necessary. This scenario is the most operationally common and frequently addressed in the cyber safety directory purpose and scope framing for enterprise risk classification.
Decision boundaries
DNS security service categories are distinguished by the attack surface each addresses. Conflating these categories leads to coverage gaps:
DNSSEC vs. encrypted DNS transport: DNSSEC provides data integrity — it proves a DNS response was not altered. Encrypted DNS (DoH/DoT) provides confidentiality — it prevents passive observation of query content. A deployment of DNSSEC with unencrypted transport leaves query metadata visible; a deployment of DoH without DNSSEC validation leaves response content unverifiable. Complete DNS security requires both controls, applied independently.
Recursive resolver hardening vs. authoritative server protection: Organizations that harden their internal recursive resolvers but neglect their authoritative name servers remain vulnerable to zone tampering that affects all external users. Authoritative server protection requires DNSSEC zone signing, access controls on zone transfer (AXFR), and monitoring for unauthorized record modifications.
DNS filtering vs. DNS security: DNS filtering (blocking queries to malicious domains via threat intelligence feeds) is a detection and access-control measure, not a cryptographic integrity control. CISA's Protective DNS program for federal agencies operates a filtering layer but this is categorized separately from DNSSEC validation and registrar security programs in federal implementation guidance.
Organizations mapping DNS security requirements against compliance obligations — including those operating under FISMA for federal systems or PCI DSS for payment environments — will find the how to use this cyber safety resource page useful for navigating the categorical structure of available service listings.
References
- IETF RFC 4033 – DNS Security Introduction and Requirements
- IETF RFC 4034 – Resource Records for DNS Security Extensions
- IETF RFC 4035 – Protocol Modifications for DNS Security Extensions
- IETF RFC 8484 – DNS Queries over HTTPS (DoH)
- IETF RFC 7858 – Specification for DNS over Transport Layer Security (DoT)
- IETF RFC 5452 – Measures for Making DNS More Resilient against Forged Answers
- NIST SP 800-81-2 – Secure Domain Name System (DNS) Deployment Guide
- CISA Binding Operational Directive 18-01
- CISA Emergency Directive 19-01 – Mitigate DNS Infrastructure Tampering
- CISA Protective DNS Program
- ICANN – Protecting Your Domain Name
- CISA – Critical Infrastructure Protection Plans