Dns - server attacks, Computer Networking

DNS - Server Attacks

It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response to that flaw or can say the bug and the contrary is also true. The two copies of attack are generally attached at the server side. Detailingdifficulties which can be one of these attacks is very difficult. They are emerging way in a very high speed.

As, the contrary,a patch is released in order to fix a bug which is discovered, Following are the types:

BUGs attack: The attack which enables to take advantage of bugs in the implementation of Domain Name server’s Software or any other system winning the DNS server. For example, for instance, buffer overflow for bind.

Attack by Denial of Service a very large number of fake requests made by a malicious user which will flood the airwaves, an example of this is oven which has same frequency as that of wireless network is called Denial of Service. Log Off, Delivery Failure connected successful is some messages that are used to flood the access point.

Posted Date: 3/1/2013 3:04:09 AM | Location : United States







Related Discussions:- Dns - server attacks, Assignment Help, Ask Question on Dns - server attacks, Get Answer, Expert's Help, Dns - server attacks Discussions

Write discussion on Dns - server attacks
Your posts are moderated
Related Questions

In communication weakening or loss of signal energy, typically caused by distance

Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are

Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

Q. Describe about Packet Switching? Packet Switching - Data are transmitted in separate units - Called Packet - Packets are variable length blocks - The max leng

Destination Port Number This is  port number used by the process  running on the destination host. It is also 16 bits long  if the destination  host if  server ( a client  sen

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

Which layers are network support layers? a. Physical Layer b. Data link Layer and c. Network Layers

ACK Received If an ACK is received by the  sender. The  SR sender marks  that packet  as having  been received by the receiver.

A statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network. Part of the file content is as follows: DOD