Mitigating Domain Name System Cyberattacks ICANN's Security and Stability Advisory Committee (SSAC)

30 September 2011 - A Workshop on Critical Internet Resources in Nairobi, Kenya


Cyberattacks have been increasing both in number and ferocity.
Top-level domains are particularly at risk because of the breadth of
the consequences when failures or service degradations occur. When
a country code top-level domain is attacked, both its economy and
its citizens are at risk. A failure or degradation of the country's
domain name system has a direct impact on all Internet services both
within the country and those outside who have a name that is
registered within the country.

SSAC has published several reports with many recommendations for
improving the quality of domain name system services. In this
session we propose to target senior government officials with the
collection of issues and, in some cases, recommended solutions for
the issues. We will include a look at the threat landscape to
explain why the issues are important to consider.

Here is a list of relevant documents published by SSAC:

[SAC041]: Recommendation to prohibit use of redirection and
synthesized responses by new TLDs (10 June 2009)

[SAC038]: Registrar Abuse Contacts (26 February 2009)

[SAC032]: Preliminary Report on DNS Response Modification (20 June

[SAC031]: SSAC Review of the After Action Report for the gTLD
Registry Failover Exercise conducted 24-25 January 2008 (23 April

[SAC015]: Why Top Level Domains Should Not Use Wildcard Resource

[SAC008]: DNS Distributed Denial of Service (DDoS) Attacks

[SAC005]: DNS Infrastructure Recommendation (1 November 2003)

[SAC004]: Securing The Edge (17 October 2002)