What is DNS Amplification Attack?
DNS Amplification is a kind of mirror attack that manipulates publicly accessible DNS, making them a target for large numbers of UDP packets. Using a variety of techniques, the culprit can "inflate" the size of these UDP packets, making the attack so powerful that it destroys even the most powerful Internet infrastructure.
Description of the attack
DNS Amplification, like other amplification attacks, is a kind of reflection attack. In this case, mirroring is achieved by eliciting a response from the DNS resolver to a spoofed IP address.
In a DNS Amplification attack, the culprit sends a DNS query with a fake (victim's) IP address to an open DNS resolver, causing it to respond to that address with a DNS response. With many fake queries being sent, and with several DNS resolvers responding simultaneously, the victim's network can easily be overwhelmed by the uncontrolled number of DNS responses.
Counterattacks are even more dangerous when amplified. 'Amplification' here refers to the fact that the server's response does not match the packet request originally sent.
To amplify a DNS attack like this, each DNS request can be sent using the DNS EDNS0 protocol extension, allowing for large DNS messages, or using DNSSEC's encryption (DNS security extension) to increase the size. message. Spoof queries of type 'ANY' (any), which return all known information about the DNS zone in a single request, can also be used.
Through these and other methods, a DNS request message about 60 bytes in size can be configured to send response messages over 4000 bytes to the destination server - resulting in a gain of 70. :first. This significantly increases the amount of traffic that the target server receives and speeds up the server's resource exhaustion.
Furthermore, DNS Amplification attacks often forwards DNS requests through one or more botnets - significantly increasing direct traffic to the targeted server (s) and inducing anonymous tracking. The attacker's character is much more difficult.
Methods of minimizing the impact of DNS Amplification attack
Common ways to prevent or mitigate the effects of DNS Amplification attacks include tightening DNS servers, blocking specific DNS servers or all recursive relay servers, and limiting the speed.
However, these methods do not eliminate sources of attacks, nor do they reduce the load on the network and switch between the name server and the open recursive server. Additionally, blocking all traffic from open recursive servers can thwart legitimate DNS communication attempts. For example, some organizations maintain open recursive servers so that employees working on mobile devices can resolve from 'trusted' name servers. Blocking traffic from these servers may interfere with their access.
You should read it
- What is 51% attack? How does 51% attack work?
- What is a Replay Attack?
- What is Volumetric DDoS Attack?
- What is SS7 attack? What can hackers use it for?
- Analysis of an attack (Part 3)
- What is BlueSmack attack?
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is Teardrop attack?
May be interested
- What is a Sybil Attack?a sybil attack is a type of security threat on an online system where a person tries to take over the network by creating multiple accounts, nodes, or computers.
- What is Replay Attack? How to Prevent It Effectivelyreplay attack is also known as replay attack. this is a network attack method in which the attacker records and reuses valid communications between two parties to perform fraudulent actions.
- Phishing attack: The most common techniques used to attack your PCphishing attack is probably a term that is not unfamiliar to most internet users. in fact, it is also one of the most common forms of cyberattacks.
- What is DDoS ICMP Flood?an icmp (internet control message protocol) flood attack, also known as a ping flood attack, is a common denial of service (dos) attack in which an attacker tries to overwhelm a device target with icmp echo-request (ping).
- What is Salami Attack?a salami attack can wreak havoc on individuals and organizations. this is a stealthy method to steal small amounts of money or data from many people or businesses, often without the victim knowing about the theft.
- What is '51% attack'? Can Bitcoin completely collapse by a 51% attack?51% attack makes new transactions unable to confirm network congestion, even if an attacker controls the network completely, it can cause the transaction to be reversed.
- What is Office 365 Attack Simulator? How to use it?you can train your employees to identify such attacks using office 365 attack simulator. this article will introduce some methods to simulate phishing attacks.
- What is a Deface attack? How to prevent Deface attacksdeface attacks are attacks that change the visual appearance of a website. this is often the action of hackers who specialize in hacking systems. they break into a web server and replace the hosted website with their own website.
- What is Man-in-the-Disk Attack?if you are an android user, you should know about the man-in-the-disk attack and the dangers it brings. this vulnerability allows intruders to take control of legitimate apps on your android device and use them to introduce malicious apps.
- Detecting APT attack campaign on important national infrastructure on Tet holidaythe main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.