Domain Name Server (DNS) Amplification Attacks

Reblogged from IS&T Security FYI:

According to a recent report by US-CERT, Domain Name Server (DNS) amplification attacks are on the rise. DNS amplification is a type of distributed denial of service (DDoS) attack that relies on the use of open recursive DNS servers to overwhelm a target system with misdirected DNS response traffic.

The basic attack technique is fairly simple. An attacker sends a DNS name lookup request to an open recursive DNS server with the source address spoofed to the DDoS target’s address.

DarkReading throws more light on the DDOS amplification attacks and discusses on what needs to be done. First and foremost, an enterprise needs to engage services that protect them even before the threat reaches them. Second, have a plan for what to do when you are under attack. Lastly, make sure that you are not unwittingly participating in these attacks.


3 thoughts on “Domain Name Server (DNS) Amplification Attacks

  1. I was pretty pleased to discover this website. I need to
    to thank you for your time for this fantastic read!! I definitely appreciated every bit of it and i also have you bookmarked to look at new information in your blog.

  2. Having read this I thought it was really enlightening.

    I appreciate you finding the time and effort to
    put this article together. I once again find myself spending a significant amount of time both reading and posting comments.
    But so what, it was still worth it!

Comments are closed.