Its so cute when journotards cover things they don't understandhttp://dailycaller.com/2016/10/24/internet-crashes-will-be-hard-to-stop-after-obamas-internet-giveaway/
Think of your GPS being shut off while you are traveling to an unfamiliar location in a foreign city,” Baron explained. “Dyn’s nameservers are responsible for over 170,000 domain names and websites including Twitter and Paypal.”
Sites like Google, Yahoo and thousands of others were unaffected because they do not use Dyn’s nameservers. And the online shutdown was only seen in certain parts of the world (mainly the Northeastern United States) because nameservers segregate internet traffic by region.
Um. No. If you really want to look into details, https://en.wikipedia.org/wiki/Domain_Name_System
When you setup your network card on your PC you have to enter a DNS server. It can also be assigned automatically over DHCP. That becomes your "home" server. When you want to know what IP to use to contact foo.batsh*t.crazy your PC asks your local DNS to look it up for you. If your loacl DNS resolver "owns" the batsh*t.crazy domain, then it returns an IP. Otherwise it looks for the DNS server that owns the .crazy domain, and then ask any sub-servers about .batsh*t. If you looked it up before, and your local DNS maintains a cache for some period of time, your local DNS won't even ask, it will assume noting changed and return the same result. The point is that these machines cache, and maintain duplicate listings all over the place. There is likely not just oneserer that knows about the entire .crazy domain, and likely not just one server that knows about the batsh*t domain. And once you get a response, your local DNS will probably remember that information for a time.
Because DNS is just a large Distributed Database, a DOS attack has to target ALL of the servers keeping information for a given domain. Not as some international autoirty comes into power they could make it harder to host a domain's DNS in multiple locations, etc, but by and large, there is little they can do to prevent others from building duplicates of that information. If you can get a site resolved, then instead of caching that information, you can just store it. Periodically send out a DNS query to verify it.
So if you are having problems with a local DNS.. CHANGE it and you will change the servers that get asked. Google runs 220.127.116.11 and 18.104.22.168 as alternate DNS servers that anyone in the world can use. So you aren't restricted to your local ISP's DNS. You can use whatever DNS you want. So, yes, an international body COULD do thing to make tese attacks have greater impacts, but no they can't really shut this stuff down. The more attacks there are, the more likely it is tat alternate (private- pay to use and protected) DNS servers would spring up and the public servers would become less important in the infrastructure.