当前位置:网站首页>What is DNS amplification attack
What is DNS amplification attack
2022-07-29 06:34:00 【Zhongyun era - defense testable - Xiaoyu】
DNS Amplification is a distributed denial of service (DDoS) attack , among , Attackers exploit the domain name system (DNS) Vulnerabilities in the server , Turn the initial small query into a large load , Achieve its purpose of destroying the victim server . DNS Amplification is a reflection attack , It can publicly access the domain name system through manipulation , With a large amount of UDP Drown a specific target . Using various amplification techniques , Attacker can ” Zoom in ” these UDP The size of the package , Make the attack powerful , It can even destroy the most powerful Internet infrastructure .
DNS Amplification is an asymmetrical DDoS attack , among , The attacker sends out a false target IP Smaller query requests , Make the deceived target bigger DNS The recipient of the response . Use these attacks , The attacker achieved his goal : Saturate the network by continuously consuming bandwidth capacity .
You need to make sure you have something close to you ISP Get the emergency telephone number to contact at any time . such , Once such an attack occurs , You can immediately contact ISP contact , Let them filter out this attack upstream . To recognize this attack , You want to view the contents DNS Reply to a large number of communications ( Source UDP port 53), Especially look at those who have a lot DNS Recorded port . some ISP Sensors have been deployed throughout its network to detect various types of early mass communications . such , Yours ISP It's likely that you found and avoided this attack before you found it .
Last , In order to prevent malicious people from using your DNS Server as implementation DNS Magnify the agent of the attack , You need to make sure you can access it from outside DNS The server only performs circular queries for your own network , Do not make such inquiries for any addresses on the Internet . Most of the major DNS The server has the ability to limit circular queries , therefore , They only accept queries from certain Networks , For example, your own network . By preventing the use of circular queries to load large harmful DNS Record , You can prevent your DNS The server becomes part of this problem .
边栏推荐
- Scanbasepackages scanning range configuration
- Explain the difference between FIR filter and IIR filter in detail
- Vivado IP核之定点数转为浮点数Floating-point
- Official tutorial redshift 09 camera
- Thinking about MySQL taking shell through OS shell
- 用神经网络实现手写数字识别
- OSPF理论介绍
- 服务器135、137、138、139、445等端口解释和关闭方法
- 盘点 | 全球关键信息基础设施网络安全大事件
- Idea installing Scala
猜你喜欢
day02_基本语法
虹科为您分享EtherCAT demo,教您如何从其他协议快速过渡到EtherCAT工业总线
[leetcode brush questions] array 3 - divide and conquer
day10_异常处理&枚举
[leetcode skimming] array 2 - binary search
浅谈缺陷描写样式
基于TCP的在线词典
Thinking about MySQL taking shell through OS shell
Vivado IP核之浮点数开方 Floating-point
2022 summer second day information competition learning achievement sharing 1
随机推荐
What is the lifecycle of automated testing?
Summary of winter vacation training (1.23~1.28) [first tier]
虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(3)——MoDK例程测试
Sequence list and linked list
day02_基本语法
网络安全学习(二)
通过os-shell引发的mysql拿shell的思考
Official tutorial redshift 09 camera
Joint use skills of joiner.on and stream().Map
【面试题】2022年最新软件测试面试题(400道)【附带答案】持续更新...
Webshell管理工具的流量特征
Software testing career development: where should software testers go
OSPF理论介绍
Oracle10g出现Enterprise Manager 无法连接到数据库实例解决办法
day09_ Static & Final & code block & abstract class & Interface & internal class
Scanbasepackages scanning range configuration
c语言问题
FPGA—奇偶数分频和小数分频代码例程
八、 网络安全
七、 下一代互联网IPV6