It is difficult to imagine the practical use of the Internet without the convenient name-to-IP address mapping provided by DNS. In fact, the only real threat to the operation of the Internet is the lurking possibility of a massive distributed denial of service (DoS) attack being used to hold the Internet's primary and secondary DNS servers off the Net long enough for all cached copies of DNS records to expire throughout the Internet. (This would take about one week.) Although such a concerted attack on DNS would not take the Internet itself down, it would rob the world of the convenient DNS domain naming that we all take for granted, and effectively kill the Internet for the continued duration of the attack.
Since everyone uses DNS, virtually all machines function as clients of DNS servers. Our machines ask for and receive the results of "DNS lookups" which provide the IP address associated with the domain name and specific machine with which we wish to communicate. Similarly, it is quite uncommon for an end-user's machine to be running a public DNS server. Although advanced users sometimes run their own local DNS resolvers or caches for improved Internet performance and reliability, those servers should not be exposing their DNS services to the Internet.
If our port analysis reveals that your system's port 53 is open and listening for incoming traffic, you should determine what's going on. Even though only a few Trojan programs are known to open port 53, the exact behavior of malicious software is a constantly moving target . . . which is why periodic security checkups here are always worthwhile.
If you are curious to learn more about the operation of the Internet's DNS system, the following links and documents tell the whole story:
DNS RFCs:
Domain Names - Concepts and Facilities:
http://www.ietf.org/rfc/rfc1034.txt
http://www.faqs.org/rfcs/rfc1034.html
Domain Names - Implementation and Specification:
http://www.ietf.org/rfc/rfc1035.txt
http://www.faqs.org/rfcs/rfc1035.html
DNS Related RFCs:
http://www.dns.net/dnsrd/rfc/
Trojan Sightings: ADM worm, Lion