Resources Banner

Glossary - D

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 

DNS Flood

An application-specific variation of the UDP flood. During a DNS flood, a victim DNS server receives valid but spoofed DNS request packets at a very high packet rate and from a very large pool of source IP. The victim server cannot determine which packet is from a real server and therefore proceeds to respond to all requests. The server is overwhelmed by the requests. This attack consumes network resources and available bandwidth that exhausts the network until it shuts down. Spoofed DNS attacks are well-crafted flood attacks – the content of spoofed DNS packets are designed to mimic actual DNS requests. Since they are 100% normal looking packets, this attack is not detectable by deep packet inspection. With a wide range of available attacking IP, the attacker can easily evade most traffic anomaly detection techniques.