Browse Definitions :
Definition

DNS redirection

DNS redirection was the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected. In the early days of the internet, an ISP would typically serve an ad-based page when the user mistyped a URL, rather than a 404 error message,

In July 2009, Comcast announced it would test DNS redirection, under the name "Domain Name Helper Service," in Arizona, Colorado, New Mexico, Oregon, Texas, Utah, and Washington. Other ISPs that implemented DNS redirection include Verizon, Cox, Earthlink and Charter. The practice was generally not popular among consumers and is no longer a source of revenue for ISPs.

DNS redirection differs from DNS poisoning, in which an attacker gains access to a server's DNS table and substitutes a rogue address for a valid one. Fake companies have been set up to sell billions of hijacked IP addresses. Fraud, forgery and identity theft are involved with these hijackings.

The recent rise in DNS poisoning, also referred to as IP hijacking, can partially be attributed to hackers who find the WHOIS database an easy target. By making unauthorized changes to registration records, hackers have been able to hijack existing IP address ranges created before the American Registry for Internet Numbers' (ARIN's) inception in 1997. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location.

This was last updated in February 2018

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close