T 5.151 DNS flooding - denial-of-service attacks

A denial-of-service attack (DoS attack) is used to prevent legitimate users of IT systems from using their systems. In this case, limited resources such as the CPU computing time, memory (RAM), disk space, network bandwidth or the like are deliberately overloaded.

When a DoS attack on a DNS server is carried out, so many requests are sent to this server that the network connection to the DNS server and/or the DNS server itself will become overloaded. In general, the requests are sent using a bot network to achieve the required volume of data traffic. Since a DNS server is virtually "flooded" with requests when this form of attack is performed, it is also known as "DNS flooding". A DNS server that has become overloaded in this manner can no longer respond to any legitimate requests. In general, all DNS servers responsible for the domain are attacked; thus the names of this domain can no longer be resolved.

Example: