Botnets and Packet Flooding DDoS Attacks on the Domain Name System

For example, a vulnerability in software may enable a single malformed message to crash a system. In another example, an onslaught of unexpected traffi c may inhibit other legitimate communications. When these packet fl ooding attacks are sent from multiple diverse sources it becomes a distributed denial of service (DDoS) attack. The frequent and sustained packet fl ooding DDoS attacks targeted at a system or service is what we have focused on in this paper.