Background
Chaotic Fault Generator (CFG) for Cloud Virtual Machine (CVM) domain name resolution tampering is designed to test the response capability of CVM when it is subject to DNS resolution tampering attacks. Domain Name System (DNS) resolution tampering is a common network attack method in which attackers tamper with DNS resolution results to redirect users to malicious websites, thereby stealing users' sensitive information or conducting other malicious activities. For this purpose, TSA-Chaotic Fault Generator (TSA-CFG) provides DNS resolution tampering experiments to test the response and recovery capabilities of business systems under attack, thereby enhancing business security and stability.
Experiment Execution
Step 1: Preparing an Experiment
Prepare a CVM instance to be experimented.
Step 2: Orchestrating the Experiment
2. Click Create Experiment, enter the basic information about the experiment, and click Next.
3. Choose Compute > CVM from the Experiment Instance drop-down list, click Add via Search, and add an instance resource. Alternatively, click Add via Architecture Diagram, click a CVM resource on the architecture diagram, select the required instance, and add it.
4. After the instance is added, click Add Action. Under the Network Resources category, select DNS Resolution Tampering, and then click Next.
5. Configure fault action parameters. Enter the domain names and IP addresses to be tampered with. Separate multiple domain names with semicolons (;). Then, click OK.
6. After completing the parameter configuration, set Execution Mode and Guardrail Policy, and add metrics for Observability Metrics in the Global Configuration section. After the configuration is complete, click Submit to complete the experiment creation.
Step 3: Executing the Experiment
1. Verify the resolution before a fault. Use the ping qq.com command to test domain name resolution. The resolution is normal.
2. Go to the experiment details panel, and click Execute in the fault action group or Start Experiment in the lower part of the panel to inject a fault.
3. After successful fault injection, use ping qq.com to test the resolution. You can see that the resolution of the qq.com domain name has been tampered with.
4. Click Execute in the corresponding recovery action for recovery.
5. After successful recovery, use ping qq.com to test the resolution again. You can see that the resolution has returned to normal.