Response Rate Limiting in Windows DNS Server

In Windows Server 2016, the DNS server will provide an option to enable Response Rate Limiting. Response Rate Limiting intends to prevent the abuse of Windows DNS servers for orchestrating an amplification attack. In a DNS amplification attack, the attackers forge the IP address of the victim network and send a lot of queries to the DNS servers. The traditional DNS server responds back to all the queries it receives and as a result the victim network gets a huge amount of unwanted DNS responses .  The attackers can orchestrate this attack to involve multiple DNS servers all of which start sending unsolicited responses to the victim network, which chokes down on the high volume of inbound packets, slows down and eventually collapses. 

http://blogs.technet.com/b/teamdhcp/archive/2015/08/28/response-rate-limiting-in-windows-dns-server.aspx

August 28th, 2015 4:24pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics