Dns - server attacks, Computer Networking

DNS - Server Attacks

It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response to that flaw or can say the bug and the contrary is also true. The two copies of attack are generally attached at the server side. Detailingdifficulties which can be one of these attacks is very difficult. They are emerging way in a very high speed.

As, the contrary,a patch is released in order to fix a bug which is discovered, Following are the types:

BUGs attack: The attack which enables to take advantage of bugs in the implementation of Domain Name server’s Software or any other system winning the DNS server. For example, for instance, buffer overflow for bind.

Attack by Denial of Service a very large number of fake requests made by a malicious user which will flood the airwaves, an example of this is oven which has same frequency as that of wireless network is called Denial of Service. Log Off, Delivery Failure connected successful is some messages that are used to flood the access point.

Posted Date: 3/1/2013 3:04:09 AM | Location : United States







Related Discussions:- Dns - server attacks, Assignment Help, Ask Question on Dns - server attacks, Get Answer, Expert's Help, Dns - server attacks Discussions

Write discussion on Dns - server attacks
Your posts are moderated
Related Questions
how to connect two pc in lan?


Can you explain routing loop issue in RIP protocol?


As a system administrator, you require to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use?

A default route is used if there is not a particular entry in the routing table for the destination.

Q. Illustrate Network Layer in osi layers model? Network Layer :  This is responsible for addressing messages and data so they are sent to the required destination, and for tr

Allows for transmission and receiving of data concurrently


Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec