DDoS Attack
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic from multiple sources. In the context of DNS, attackers often exploit DNS infrastructure through techniques like DNS amplification to generate massive amounts of traffic directed at victims.
How it works
DDoS attacks work by flooding a targeted system with so much traffic that it becomes unable to process legitimate requests. Unlike a simple DoS attack from a single source, DDoS attacks use multiple compromised systems (often thousands of infected devices forming a 'botnet') to simultaneously attack the target, making them much harder to stop and trace.
Key Points
- DDoS attacks use multiple sources to flood targets, making them difficult to stop
- DNS amplification exploits open DNS resolvers to multiply attack traffic by 50x-70x
- Attackers spoof the victim's IP address to redirect DNS responses to the target
- The 'ANY' DNS query type is commonly used to maximize response size
- Modern DDoS attacks can generate hundreds of gigabits per second of traffic
Common Use Cases
- DNS Amplification Attack: Exploiting open DNS resolvers to amplify small queries into large responses directed at victims, overwhelming their network capacity
- DNS Flood Attack: Overwhelming authoritative DNS servers with millions of DNS queries, preventing them from responding to legitimate requests
- Reflection Attack: Using DNS servers as intermediaries to hide the attacker's true location while directing amplified traffic at the victim
- Infrastructure Disruption: Targeting critical DNS infrastructure like root servers or major DNS providers to disrupt internet services for large populations
code DNS Amplification Attack Example
| Type | Host / Name | Value / Points to | TTL |
|---|---|---|---|
| Query | Attacker → DNS Server | 60 bytes | — |
| Response | DNS Server → Victim | 4,000 bytes | — |
| Scale | 10,000 DNS Servers | 40 MB total | — |
| Impact | Victim Network | Overwhelmed | — |
* This example shows how a small DNS query is amplified into a large response directed at the victim.