DNS Amplification
This type of amplified DoS attacks exploit the way DNS services operate – a forged domain request is sent to a vulnerable DNS server, and its response, being of a significant size, is forwarded to a victim server, resulting in its link getting overwhelmed with the responses. This type of attack is distinctive in that it is almost impossible to detect where the forged requests come from.
Other terms in this category
UDP floodTeardrop AttackICMP floodPing floodIP fragmentation attackSYN/ACK floodRST/FIN floodSlowloris or session attacksHTTP floodRecursive HTTP GET floodVoIP floodNTP floodIP Null AttackUDP floodMITM (man-in-the-middle) attackSYN flood, or SYN attackSIP malformed attackSNMP reflection attackCharGEN floodMS SQL reflection DDoS attackMemcached DDoS attack
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy