DNS Amplification
This type of amplified DoS attacks exploit the way DNS services operate – a forged domain request is sent to a vulnerable DNS server, and its response, being of a significant size, is forwarded to a victim server, resulting in its link getting overwhelmed with the responses. This type of attack is distinctive in that it is almost impossible to detect where the forged requests come from.
Other terms in this category
UDP FloodTeardrop AttackVoIP floodMS SQL reflection DDoS attackCharGEN floodSNMP reflection attackSIP malformed attackSYN Flood, or SYN AttackMITM (man-in-the-middle) attackIP Null AttackDNS AmplificationNTP floodMemcached DDoS attackRecursive HTTP GET floodHTTP floodSlowloris or session attacksRST/FIN FloodSYN/ACK FloodIP Fragmentation AttackWhat Is a Ping Flood?What is an ICMP Flood Attack?
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy