Dns - server attacks, Computer Networking

DNS - Server Attacks

It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response to that flaw or can say the bug and the contrary is also true. The two copies of attack are generally attached at the server side. Detailingdifficulties which can be one of these attacks is very difficult. They are emerging way in a very high speed.

As, the contrary,a patch is released in order to fix a bug which is discovered, Following are the types:

BUGs attack: The attack which enables to take advantage of bugs in the implementation of Domain Name server’s Software or any other system winning the DNS server. For example, for instance, buffer overflow for bind.

Attack by Denial of Service a very large number of fake requests made by a malicious user which will flood the airwaves, an example of this is oven which has same frequency as that of wireless network is called Denial of Service. Log Off, Delivery Failure connected successful is some messages that are used to flood the access point.

Posted Date: 3/1/2013 3:04:09 AM | Location : United States







Related Discussions:- Dns - server attacks, Assignment Help, Ask Question on Dns - server attacks, Get Answer, Expert's Help, Dns - server attacks Discussions

Write discussion on Dns - server attacks
Your posts are moderated
Related Questions
Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance


What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses

I need help in designing a network for a fictional company.

What is Ping? Ping is a utility program that permits you to check connectivity among network devices on the network. You can ping a device by using its IP address or device nam

• This device creates one big collision domain and one large broadcast domain.

What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o

The World  Wide Web HTTP The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP(

Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memor