{"id":5783,"date":"2020-12-16T15:29:14","date_gmt":"2020-12-16T23:29:14","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5783"},"modified":"2024-08-07T12:22:44","modified_gmt":"2024-08-07T19:22:44","slug":"defending-against-the-attack-of-distraction-and-how-dns-can-help","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/","title":{"rendered":"Defending Against The Attack Of Distraction And How DNS Can Help"},"content":{"rendered":"<p>A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own.<\/p>\n<p>It&#8217;s actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today&#8217;s networks are so much more dangerous than what enterprises dealt with way back in January 2020.<\/p>\n<p>These network changes are on top of long-endured security nightmares: too many tools, siloed environments, and cybersecurity staffing shortages. But the new environment makes these challenges far worse. How many of those tools are optimized\u2014or even appropriate\u2014for today&#8217;s threat landscape? We still have siloed environments, but an additional 100,000 remote sites (coupled with a lot more cloud along with more IoT) is creating far more silos, more places where legitimate data can hide and cyberattackers can lurk. As for those staffing shortages, some CISOs are now longing for the days of last year. With COVID&#8217;s economic impact, enterprises are losing revenue and many have had to impose cost cuts on all departments, including security. This is at a time when the area that CISOs need to protect is an order of magnitude larger and more complex.<\/p>\n<p>When there is an attack in today&#8217;s environments\u2014typically every other minute\u2014it takes the SOC team a long time to figure out which part of the network is being attacked. In these situations where split-second decisions are needed, such delays can prove disastrous.<\/p>\n<p>To negate this problem, SOCs need visibility that extends well beyond the campus network (public cloud, IoT, roaming users, branch offices, etc.) along with the context to see through distractions and zero in on the most critical attack. That network context is essential for efficient defense and must include correlation criticality of the compromised asset, location of the asset, audit trail, and history of destinations accessed. These key datasets are needed to make threat intelligence actionable. Data overload is the cyberattacker&#8217;s friend and the enemy of the SOC and the CISO. Today&#8217;s typical threat intelligence on its own is insufficient for effective threat investigation. CISOs and SOC teams need an automated way to gather context around threat indicators to enable linkages and appropriate event prioritization.<\/p>\n<p>One often overlooked tool is DNS data and all of its analytical components. Anything that connects to the server needs an IP address and that is a goldmine of actionable information. The next step of that journey would be levering DDI data more, most likely via AI&#8217;s Machine Learning. The data is the same as is available today, but ML would allow for far faster analysis\u2014which could make the difference between identifying an attacker before any data is accessed or stolen and discovering the attacker&#8217;s true path and point of origin ten minutes too late to negate the attack.<\/p>\n<p>The DDI platform has constant\u2014and complete\u2014visibility of all devices touching the network because, clearly, any time a device joins a network, the first thing it will do is to request an IP address from the DHCP server, which then delivers that IP address to the device.<\/p>\n<p>DHCP Discovery is much more effective than traditional network scanning techniques, which can be disruptive and need scheduling. That in turn means that such network scanning data is often out-of-date. Also, DHCP discovery is far more comprehensive, feeding into the IPAM database full characteristics of the device (type of device, OS, version) based on the initial DHCP request, along with username, switch port, access point, physical location, MAC Address, current IP\/historical IPs and locations and other user details. Using DHCP is a much better way to do discovery when compared to traditional network scanning techniques.<\/p>\n<p>Typically, when working without the kind of detailed device inventory that DNS analysis delivers, security analysts have to manually investigate each incident based on an IP address, reviewing the logs from the firewall, server, network devices and security tools logs, trying to figure out an attack pattern and then dumping all of that raw data into a SIEM or SOAR platform. Not only does this take far more time than a SOC security analyst can justify during a live attack, but they are doing it without the critical context for prioritizing responses and deciding immediate next steps.<\/p>\n<p>Another massive problem with the typical approach to threat intel feeds is that enterprises leverage so many different threat feeds in different parts of their security infrastructure \u2013 like their NGFWs, DLP, Endpoint, IPS etc.\u2014that the target is more obfuscated, not less. Each tool is working off a different source of truth, which leads to conflicts and duplicate alerts going into the SIEM. That forces the SIEM to try and track events based upon separate uncorrelated vendor threat feeds and the Ops team doesn\u2019t know what feed is trustworthy and what is not.<\/p>\n<p>There is also a lack of flexibility when trying to put the right intel in the right platform. For example, phishing specific IoCs should be added to an email gateway. Aggregating those IoCs across multiple vendors puts the onus on the security operations person to do that, including ensuring that it is in a format the receiving platform can consume. This adds manual overhead.<\/p>\n<p>Today&#8217;s global networks are only going to get more complicated in the coming months, with no return to pre-COVID networks expected\u2014ever. Isn&#8217;t it time you rethought your defense strategy, leveraging DNS as far as you can?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":2806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[360,361,189],"class_list":{"0":"post-5783","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-security","9":"tag-network-security","10":"tag-cybersecurity","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Defending Against The Attack Of Distraction And How DNS Can Help<\/title>\n<meta name=\"description\" content=\"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It&#039;s actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today&#039;s networks are so much more dangerous than what enterprises dealt with way back in January 2020.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending Against The Attack Of Distraction And How DNS Can Help\" \/>\n<meta property=\"og:description\" content=\"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It&#039;s actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today&#039;s networks are so much more dangerous than what enterprises dealt with way back in January 2020.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-16T23:29:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:22:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"Defending Against The Attack Of Distraction And How DNS Can Help\",\"datePublished\":\"2020-12-16T23:29:14+00:00\",\"dateModified\":\"2024-08-07T19:22:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"keywords\":[\"DNS Security\",\"Network Security\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/\",\"name\":\"Defending Against The Attack Of Distraction And How DNS Can Help\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"datePublished\":\"2020-12-16T23:29:14+00:00\",\"dateModified\":\"2024-08-07T19:22:44+00:00\",\"description\":\"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It's actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today's networks are so much more dangerous than what enterprises dealt with way back in January 2020.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg\",\"width\":660,\"height\":454,\"caption\":\"Cloud Security Provider Turns to Infoblox For Network Availability and Agility\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/defending-against-the-attack-of-distraction-and-how-dns-can-help\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defending Against The Attack Of Distraction And How DNS Can Help\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Defending Against The Attack Of Distraction And How DNS Can Help","description":"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It's actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today's networks are so much more dangerous than what enterprises dealt with way back in January 2020.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/","og_locale":"en_US","og_type":"article","og_title":"Defending Against The Attack Of Distraction And How DNS Can Help","og_description":"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It's actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today's networks are so much more dangerous than what enterprises dealt with way back in January 2020.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/","og_site_name":"Infoblox Blog","article_published_time":"2020-12-16T23:29:14+00:00","article_modified_time":"2024-08-07T19:22:44+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"Defending Against The Attack Of Distraction And How DNS Can Help","datePublished":"2020-12-16T23:29:14+00:00","dateModified":"2024-08-07T19:22:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/"},"wordCount":999,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","keywords":["DNS Security","Network Security","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/","url":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/","name":"Defending Against The Attack Of Distraction And How DNS Can Help","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","datePublished":"2020-12-16T23:29:14+00:00","dateModified":"2024-08-07T19:22:44+00:00","description":"Defending Against The Attack Of Distraction And How DNS Can Help. A popular\u2014and especially evil\u2014attack technique is the distraction attack. That is often done with a D-DOS attack and while everyone is furiously fighting to keep the site up, the attacker quietly steals the payroll files, which were the actual target all along. But for enterprise CISOs today dealing with the COVID-fueled new attack surface, there may be little need for an attacker distraction: the new networks provide more than ample distractions of their own. It's actually part-distraction and part-obscuring as the new networks deliver so much noise that finding the one attack that merits worrying (the signal, if you will) is difficult and takes time. And during a major active attack, every second counts, which is why today's networks are so much more dangerous than what enterprises dealt with way back in January 2020.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Cloud-Security-Provider-Turns-to-Infoblox-For-Network-Availability-and-Agility.jpg","width":660,"height":454,"caption":"Cloud Security Provider Turns to Infoblox For Network Availability and Agility"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/defending-against-the-attack-of-distraction-and-how-dns-can-help\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Defending Against The Attack Of Distraction And How DNS Can Help"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5783"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5783\/revisions"}],"predecessor-version":[{"id":5784,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5783\/revisions\/5784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2806"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}