Jump to content

DNS Flood

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Intgr (talk | contribs) at 16:18, 16 June 2017 (Remove spammy and/or unreliable sources, WP:RS; citation needed). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

DNS Flood is a type of denial-of-service attack attack. It is the process whereby the traffic on a network resource or machine is stopped for some time. The offender sends a great number of requests to the resource or machine so that it might become unavailable to those who might try to reach it. During a DNS flood the host that connects to the Internet is disrupted due to an overload of traffic. It can be referred to as a disruption that causes the work of the resource or machine to halt by not allowing the traffic to land on it.

This attack is mainly done by hackers[citation needed] to benefit from the attacked resource or machine. DDoS attacks have been perpetrated for many reasons, including blackmailing website owners and knocking out websites, including high-profile sites such as large bank websites.[1]

Many methods can and are being adopted to prevent these types of attacks some of which include dropping malformed packages, use filters to avoid receiving packages from sources having potential to attack, timing out half open connections with greater hostility. One can also set SYN, ICMP, and UDP at lower levels to prevent such DDoS attacks from harming one’s network.[2][3]

References

  1. ^ Goldman, David (September 28, 2016). "Major banks hit with biggest cyberattacks in history". CNN. Retrieved December 12, 2016.
  2. ^ "6 Tips for Fighting DDoS Attacks - eSecurity Planet". www.esecurityplanet.com. Retrieved 2016-12-19.
  3. ^ "DDoS attack on the Russian banks: what the traffic data showed - Securelist". securelist.com. Retrieved 2016-12-19.