Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard

DNS Amplification Attack

Attacks

DDoS technique using DNS servers to multiply attack traffic and overwhelm victims.

DNS amplification is a DDoS technique that exploits open DNS resolvers to multiply attack traffic. Attackers send DNS queries with spoofed source addresses (the victim's IP) to open DNS servers. The DNS servers send responses—much larger than the queries—to the victim. Because responses are amplified (sometimes 50x larger than queries), attackers generate massive traffic volumes with minimal resources. DNS amplification is one of several amplification attacks exploiting UDP-based protocols.

Why It Matters

The DSC Perspective:

DNS amplification demonstrates why DDoS mitigation requires specialised services—your bandwidth simply can't absorb amplified attacks. It also explains why organisations shouldn't run open DNS resolvers.

Related Terms