Dns - server attacks, Computer Networking

DNS - Server Attacks

It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response to that flaw or can say the bug and the contrary is also true. The two copies of attack are generally attached at the server side. Detailingdifficulties which can be one of these attacks is very difficult. They are emerging way in a very high speed.

As, the contrary,a patch is released in order to fix a bug which is discovered, Following are the types:

BUGs attack: The attack which enables to take advantage of bugs in the implementation of Domain Name server’s Software or any other system winning the DNS server. For example, for instance, buffer overflow for bind.

Attack by Denial of Service a very large number of fake requests made by a malicious user which will flood the airwaves, an example of this is oven which has same frequency as that of wireless network is called Denial of Service. Log Off, Delivery Failure connected successful is some messages that are used to flood the access point.

Posted Date: 3/1/2013 3:04:09 AM | Location : United States







Related Discussions:- Dns - server attacks, Assignment Help, Ask Question on Dns - server attacks, Get Answer, Expert's Help, Dns - server attacks Discussions

Write discussion on Dns - server attacks
Your posts are moderated
Related Questions
What are the data units at different layers of the TCP / IP protocol suite? The data unit formed at the application layer is known as a message, at the transport layer the data

Q. Function of TCP/IP Transport Layer ? TCP/IP Transport Layer - Defines two standard transport protocols UDP and TCP - TCP equipment a dependable data-stream protocol

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

WHAT IS NETWORK???

NETWORK ANALYZERS: A network analyzer also known network monitor or a network sniffer is used to calculate the performance of or debug a network. It may report statistics s

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner:  For n

Can you define PPTP (Point-to-Point Tunneling Protocol)?

Q. Explain File Transfer Protocol? - File Transfer Protocol (FTP) is a TCP/IP client-server application for copying files from one host to another -- Establishes two connect

Can you give an overview of the components in IPSec?