DNS Amplification Attack (DNS Amplification)
The Importance of DNS Amplification
DNS amplification attacks are one of the most common DDoS vectors because DNS can amplify traffic by a factor of 50-70x. A 1 Gbps attack stream from the attacker can become a 50 Gbps flood hitting the victim. This makes it possible for a single attacker with modest bandwidth to generate overwhelming traffic volumes.
As a domain operator, your DNS infrastructure can be either a target or an unwitting participant. If your DNS servers are configured as open resolvers (accepting recursive queries from any source), they can be exploited as amplifiers. Properly configured authoritative-only nameservers do not process recursive queries and cannot be used for amplification.
Defending against DNS amplification when you are the target requires DDoS mitigation services (like Cloudflare, AWS Shield, or Akamai) that can absorb and filter the amplified traffic. As a responsible internet citizen, also verify that your nameservers are not configured as open resolvers.
How to Verify
Verify your nameservers only respond to authoritative queries for your domains and do not process recursive queries from arbitrary sources. A DNS health check can confirm your nameserver configuration. Use tools like the Open Resolver Project to check if your DNS servers are exploitable.
Check DNS Health