Dns - server attacks, Computer Networking

DNS - Server Attacks

It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response to that flaw or can say the bug and the contrary is also true. The two copies of attack are generally attached at the server side. Detailingdifficulties which can be one of these attacks is very difficult. They are emerging way in a very high speed.

As, the contrary,a patch is released in order to fix a bug which is discovered, Following are the types:

BUGs attack: The attack which enables to take advantage of bugs in the implementation of Domain Name server’s Software or any other system winning the DNS server. For example, for instance, buffer overflow for bind.

Attack by Denial of Service a very large number of fake requests made by a malicious user which will flood the airwaves, an example of this is oven which has same frequency as that of wireless network is called Denial of Service. Log Off, Delivery Failure connected successful is some messages that are used to flood the access point.

Posted Date: 3/1/2013 3:04:09 AM | Location : United States







Related Discussions:- Dns - server attacks, Assignment Help, Ask Question on Dns - server attacks, Get Answer, Expert's Help, Dns - server attacks Discussions

Write discussion on Dns - server attacks
Your posts are moderated
Related Questions
What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

What are the benefits of wireless devices One benefit is that if everyone uses standard, everyone can talk to anyone. Another benefit is that extensive use of any standard will

Simple Mail Transfer Protocol ( SMTP) SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to

Q. Show the Class A Addresses? Class A Addresses Numerically the lowest Use merely one byte to identify the class type and netid Three bytes are obtainable

TCP/IP protocols are managed into five basic layers. Although some layers of the TCP/IP reference model related to layers of the ISO reference model, the ISO layers procedure does

Write a report on your chosen topic that has been approved by your Lecturer. Your report should include appropriate figures, about 2000 words. Topics: 1 MAN- Metro Ethernet 2 Inte

What is Project 802? It is a project begins by IEEE to set standards that enable intercommunication among equipment from a variety of manufacturers. It is a way for specifying

FIBER OPTIC EXTENSION:  The LAN extension using fiber optic is given in the figure below:   Figure The fiber-modem translates digital data into pulses of light the

What is the implication of increasing and decreasing subnet Bits?

Simplicity The advantage of this approach is the simplicity  of receiver buffering. The  receiver need not  buffer out of  order packets the sender must maintain the upper an