• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

What is a DNS Flood?

December 4, 2017 By fbblog

A DNS flood is a type of Distributed Denial of Service (DDoS) attack in which an attacker targets specific Domain Name System (DNS) servers, aiming to overwhelm them with seemingly legitimate traffic, impeding the servers’ ability to allow valid traffic through and stopping a resource or machine for some time. The flood of requests to the machine or resource means it might become unavailable to those trying to reach it.

Domain Name Servers are often thought of as the Internet’s phone book. They map easy to remember domain names to machine friendly Internet Protocol (IP) addresses. When you type in a web address e.g. www.lucyslinks.com, your Internet Service Provider (ISP) views the DNS linked to that domain name, translates it into an IP address (e.g. 216.168.224.70) and directs your Internet connection to the right website. A DNS flood causes a slower response time for legitimate DNS requests because the DNS servers find it difficult to distinguish spoof requests from real ones.

A DNS zone is a specific section of the domain name space in the DNS. Each DNS zone constitutes a unique boundary of authority in which administrative responsibility is delegated to a single server cluster. In a DNS flood attack, the servers’ ability to direct valid requests to zone resources is jeopardized because the servers’ resources are overwhelmed and they can’t look up the IP address in order to direct the user to the correct website/s.

Incapsula defines DNS flood attacks as “symmetrical DDoS attacks” because they try to exhaust server-side assets such as CPU or memory with a flood of UDP (User Datagram Protocol) requests, which are generated from a botnet. By contrast, a DNS amplification attack is an asymmetrical DDoS attack in which the attacker uses a spoofed target IP to send out a small look-up query, effectively making the spoofed IP the recipient of much greater DNS responses. In both instances, the threat actor’s goal is to exhaust the server’s bandwidth capacity and saturate the network, taking down specific websites.

DNS floods are considered Layer 3 attacks and are difficult for on-premises solutions to mitigate. However, there are numerous ways to tackle DNS floods such as using filters to avoid receiving packages from sources that may attack, timing out half open connections or setting UDP, SYN and ICMP and lower levels.

Filed Under: DNS Flood, Types of Attack Tagged With: asymmetrical DDoS attack, DDoS, DNS flood, DNS server, DNS zone, symmetrical DDoS attack

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.