Need cloud computing? Get started now

Shield NS53 Protects Your Origin DNS Infrastructure from NXDOMAIN Attacks

Akamai Wave Blue

Written by

Sandeep Rath and Venkat Praneeth Nangineni

April 09, 2024

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Venkat Praneeth Nangineni is a Product Manager in the Akamai Cloud Security Business Unit. Venkat has more than 12 years of experience working in the cybersecurity industry and specializes in attack detection and response and in designing firewalls. In his current role, Venkat works closely with customers to identify their security needs and develops solutions to help them overcome cybersecurity threats. 

Venkat’s other areas of interest include mapping cybersecurity threats to MITRE ATT&CK frameworks and advocating for Akamai customers to follow Border Gateway Protocol (BGP) routing best practices as mandated by Mutually Agreed Norms for Routing Security (MANRS). By following MANRS practices, organizations can help reduce the risk of BGP hijack attacks and improve the overall security and resiliency of the internet infrastructure.

Protect your on-prem and hybrid DNS infrastructure with Akamai Shield NS53.
Protect your on-prem and hybrid DNS infrastructure with Akamai Shield NS53.

DNS: The critical internet infrastructure that’s under constant attack

Imagine if you had to type in “142.250.80.14” to search for the latest information on Taylor Swift events, or “2600:1406:3a00:281::b63” to learn how you can protect and power the online experiences of your users. Thankfully, the global Domain Name System (DNS) translates words and names that humans can easily remember — like Google and Akamai (and Taylor Swift) — into IP addresses that computers understand. This makes DNS a critical and foundational element of our digital interactions and experiences. If a company’s DNS systems go down, their online presence goes down.

Therefore, it is probably not a surprise that cybercriminals continuously attack the DNS systems of their targets with distributed denial-of-service (DDoS) attacks. According to Akamai’s internal DDoS threat intelligence, more than 64% of the total DDoS attacks in the fourth quarter of 2023 had a DNS component (Figure 1). 

More than 60% of DDoS attacks in 2023 were tied to DNS Fig. 1: More than 64% of DDoS attacks in the fourth quarter of 2023 had a DNS component (Source: Akamai DDoS threat intelligence)

One such attack type is the NXDOMAIN, or DNS resource exhaustion attack. Figure 2 shows how a leading global financial services company’s DNS infrastructure was targeted with sustained NXDOMAIN traffic over several days in the first quarter of 2024. Akamai blocked the DNS attack in zero seconds and successfully protected the DNS customer's infrastructure from any impact.

. Figure 2 shows how a leading global financial services company’s DNS infrastructure was targeted with sustained NXDOMAIN traffic over several days in the first quarter of 2024. Fig. 2: A leading financial services company’s DNS infrastructure encountered a sustained campaign of NXDOMAIN traffic over several days

Analyzing the trend of DNS queries for the top 50 financial services customers from October 2023 through March 2024 shows that, on average, roughly 40% of the DNS queries processed and blocked by Akamai were illegitimate NXDOMAIN queries (Figure 3). The volume of NXDOMAIN queries reached as high as 60% in December 2023, indicating an attempt by cybercriminals to bring down the DNS infrastructure of these companies during the holiday season. Akamai successfully thwarted these attempts with its robust DNS security solutions.

Analyzing the trend of DNS queries for the top 50 financial services customers from October 2023 through March 2024 shows that, on average, roughly 40% of the DNS queries processed and blocked by Akamai were illegitimate NXDOMAIN queries (Figure 3) Fig. 3: Approximately 40% of the DNS queries for the top 50 financial services customers were illegitimate NXDOMAIN queries

Protecting against sustained and increasing DNS attacks has become an urgent challenge for businesses and government institutions that aim to provide a seamless digital experience for their customers, end users, and employees.

The anatomy of a typical DNS resource exhaustion attack

DNS resource exhaustion attacks are popularly known by several other names, including NXDOMAIN attacks, pseudo-random subdomain (PRSD) attacks, DNS water torture attacks, and DNS flood attacks, among others. Before we take a high-level view of how cybercriminals architect this type of attack to make sense of the various names in technical and popular discourse, let’s remind ourselves how DNS usually works.

A day in the life of DNS

When an individual types a web address (a domain name), like www.akamai.com, or a subdomain name, like www.ir.akamai.com (for the investor relations page), into their browser’s uniform resource locator (URL) bar, the steps in Figure 4 take place behind the scenes.

Client query

DNS recursive resolver 

(often provided by ISPs)

DNS 

top-level domain (TLD) nameserver

A company’s authoritative domain nameserver

Fig. 4: The behind-the-scenes steps when a web address is typed into a URL bar.

DNS recursive resolvers often respond to user queries from their cache of previous responses. If no cache response is available, the request gets forwarded to the origin authoritative domain nameserver. If the nameserver cannot answer an IP address for a particular DNS request, it returns an “NXDOMAIN” or “nonexistent domain” response to the resolver. 

During a DNS resource exhaustion attack, cybercriminals flood an organization's DNS infrastructure with a high volume of random subdomain queries, often running into millions of queries per second (Figure 5).

The intent is to overwhelm the origin components of the DNS infrastructure stack — global server load balancers (GSLBs), firewalls, nameservers, etc. — with illegitimate queries such that the system cannot service legitimate queries from users. These application layer (Layer 7) DNS DDoS attacks can use TCP and UDP packets, often requiring no spoofing to exhaust the DNS servers.

During a DNS resource exhaustion attack, cybercriminals flood an organization's DNS infrastructure with a high volume of random subdomain queries, often running into millions of queries per second (Figure 5). Fig. 5: Cybercriminals often use botnets to launch DNS resource exhaustion attacks, which overwhelm the DNS infrastructure with several millions of illegitimate queries per second

Select key tactics used by cybercriminals to launch resource exhaustion attacks

Unique queries

The attacker crafts DNS queries for nonexistent or rarely accessed domain names. Each query is designed to appear unique, meaning that the DNS server or any upstream resolver hasn't ever seen it.

No repeats

To avoid detection and mitigation, the attacker ensures that each illegitimate DNS request differs from the previous DNS requests. This prevents upstream resolvers from caching the request and its response, as they may not have encountered the same query before.

Avoiding DNS resolver cache

By constantly changing the queries, the attacker aims to bypass caching mechanisms in upstream resolvers. DNS caching helps resolve subsequent queries faster by storing previously resolved domain names and their corresponding IP addresses. However, if the queries are unique each time, caching becomes less effective in mitigating the attack.

An example of a random subdomain DNS query

A legitimate subdomain of the Akamai website, www.ir.akamai.com directs users to the investor relations page. However, a query like www.randomsubdomain.akamai.com is an illegitimate query. Recursive resolvers wouldn’t have any cache response for such a query and would forward the request to Akamai’s DNS nameserver to answer for the IP address of this nonexistent page. As it should, Akamai’s DNS servers would respond with a NXDOMAIN response (Figure 6).

As it should, Akamai’s DNS servers would respond with a NXDOMAIN response (Figure 6). Fig. 6: DNS servers respond with a NXDOMAIN response to an illegitimate query

NXDOMAIN attacks constitute a significant challenge for network security leaders because they cause the DNS server(s) to use their resources to look up nonexistent subdomains. This technique increases the load on the origin DNS infrastructure and consumes network resources, potentially leading to service degradation or even downtime for legitimate users trying to access legitimate services.

Protecting your DNS infrastructure from NXDOMAIN attacks

Akamai Edge DNS offers a comprehensive, purpose-built, cloud-based authoritative DNS solution that uses the scale, security, and capacity of Akamai Connected Cloud to distribute your DNS zones across several thousand servers across the globe. 

Customers delegate their zone authority to Edge DNS by updating nameserver records at the registrar and using those provided by Akamai. Akamai Edge DNS provides an unparalleled attack surface and proactive security controls that can mitigate even the largest DNS attacks without impacting a customer's DNS performance, reliability, and availability.

In many instances, organizations maintain on-premises DNS infrastructure and cannot delegate their authoritative zones to an external cloud solution to protect themselves from various types of DNS  attacks. The reasons for such preferences range from compliance concerns to dynamic configurations on origin GSLBs to a simple desire to manage their authoritative zones at the origin.

Oftentimes, this is a business decision based on the fact that a company might have already made significant capital investments in building on-prem DNS infrastructure, therefore delegating zones to the cloud would not be a financially viable option, at least in the near term.

In certain hybrid scenarios, an organization that has delegated some of its authoritative DNS zones to Edge DNS but prefers to serve the remaining zones from an on-prem origin leaves the on-prem infrastructure vulnerable to DNS resource exhaustion attacks.

So, how can an organization in one of these scenarios protect themselves from DNS resource exhaustion attacks? Enter Akamai Shield NS53!

Akamai Shield NS53: One-stop Protection for on-prem and hybrid DNS infrastructure

Get protection from NXDOMAIN attacks

Akamai Shield NS53 is a bidirectional DNS proxy solution that protects key components of your origin DNS infrastructure from resource exhaustion attacks. Using an intuitive user interface on the Akamai Control Center, you can self-configure, administer, manage, and enforce your organization’s specific dynamic security policies in real time. Illegitimate DNS queries and DNS attack floods are dropped at the very edge of the Akamai network, keeping your DNS secure, reliable, and available (Figure 7).

Using an intuitive user interface on the Akamai Control Center, you can self-configure, administer, manage, and enforce your organization’s specific dynamic security policies in real time. Illegitimate DNS queries and DNS attack floods are dropped at the very edge of the Akamai network, keeping your DNS secure, reliable, and available (Figure 7). Fig. 7: Akamai Shield NS53 is a bidirectional DNS proxy solution that protects key components of your origin DNS infrastructure from NXDOMAIN attacks

Optimize your DNS performance

Shield NS53 also helps alleviate the load on your on-prem DNS infrastructure by responding to legitimate queries from the cache and forwarding queries to the origin name servers only when necessary. Additionally, the solution reduces latency and improves user experience by accessing Akamai’s global NAMES anycast network, which is built with thousands of servers, to respond to user queries from the closest point of presence.

Optimize your total cost of ownership

Theoretically, you can protect your DNS from resource exhaustion attacks by adding more capacity. If you have more resources, it will take larger and longer attacks to exhaust those resources. However, it is quite evident that such an approach is neither financially viable nor a scalable technical solution.

Shield NS53 helps organizations protect their financial investment in their existing DNS infrastructure, including nameservers, GSLBs, and firewalls, by fortifying the already deployed solutions against modern resource exhaustion attacks, thereby lowering the total cost of ownership and maximizing the return on your investment in existing DNS infrastructure.

A cheat sheet on how Akamai can protect your digital infrastructure

Akamai offers a comprehensive portfolio of solutions to protect your digital infrastructure from various DDoS attacks. You can use the following table  as a cheat sheet on how to tailor your security solution(s) based on your specific needs.

Attack type

Recommended solutions

DNS NXDOMAIN attacks

Akamai Edge DNS, Akamai Global Traffic Management, Akamai Shield NS53

DNS direct queries attacks

Edge DNS, Global Traffic Management, Shield NS53

DNS reflection and DNS amplification attacks 

Akamai Prolexic, Akamai Network Cloud Firewall

DNS source IP spoofing and DNS TTL attacks

Edge DNS, Global Traffic Management

Layer 3 and Layer 4 DDoS attacks (across all ports and protocols)

Prolexic (for cloud, on-prem, or hybrid)

Application layer (Layer 7) DDoS attacks not related to DNS (not on port 53)

Akamai App & API Protector

Table: How you can tailor your security solution based on your specific needs

Conclusion

It’s an understatement to say that we live in an incredibly digitally connected world. Almost all aspects of our day-to-day lives are powered by digital interactions. One of the cornerstones of these digital interactions is the underlying DNS infrastructure that makes it all possible. It is, therefore, absolutely critical for businesses and institutions to protect their DNS infrastructure to offer seamless digital experiences to their customers, end users, and employees.

Akamai Shield NS53 is a new solution that perfectly complements Akamai Edge DNS, Akamai Prolexic, and Akamai App & API Protector to create a comprehensive portfolio of DDoS protection solutions for businesses and institutions that depend on reliable digital infrastructure to power their applications and user experiences online.

Learn more

Learn more about how Akamai Shield NS53 can help your DNS security requirements.



Akamai Wave Blue

Written by

Sandeep Rath and Venkat Praneeth Nangineni

April 09, 2024

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Venkat Praneeth Nangineni is a Product Manager in the Akamai Cloud Security Business Unit. Venkat has more than 12 years of experience working in the cybersecurity industry and specializes in attack detection and response and in designing firewalls. In his current role, Venkat works closely with customers to identify their security needs and develops solutions to help them overcome cybersecurity threats. 

Venkat’s other areas of interest include mapping cybersecurity threats to MITRE ATT&CK frameworks and advocating for Akamai customers to follow Border Gateway Protocol (BGP) routing best practices as mandated by Mutually Agreed Norms for Routing Security (MANRS). By following MANRS practices, organizations can help reduce the risk of BGP hijack attacks and improve the overall security and resiliency of the internet infrastructure.