DNS Attack - Counter Offensive
Our final strategy is to develop and document a secure, web-based methodology that can be implemented in each Member State for the timely sharing of information on attacks, risks, and best practices.
Currently, an established process or coordinated methodology for sharing information on attacks, risks and best practices among governments of Member States, and operators of DNS and other information infrastructures does not exist. Instead, parties depend on periodic reporting, email lists and informal sharing of information as the primary means of staying informed with instances of attack, risks and best practices.
A coordinated, well-designed, real-time approach is needed to give governments, as well as DNS and information infrastructure providers, the information and tools needed to prevent and respond to malicious attacks against the information infrastructure.
The development and implementation in each Member State of technologies such as Anycast, distributed master name servers within Internet Exchange Points, and other technologies that the consortium may suggest in its proposal would provide real-time monitoring and other tools for sharing and disseminating vital information. These tools, supplemented by other secure, web-based tools that can be developed and accessed by authorized parties in all Member States, would formalize the processes and methodologies for sharing information and best practices within the Member States.