DNS Amplification Attack
Attackers exploit misconfigured DNS servers, making the DNS response much larger than the DNS request. The attacker sends a large number of small DNS queries with a spoofed source IP address to the targeted DNS server. The server then sends the amplified responses to the victim's IP address, overwhelming its network capacity
DNS Flood Attack
Attackers utilize a network of compromised computers called botnets to send a massive volume of DNS requests to the target DNS server, which floods the DNS server and causes it to become unresponsive
DNS Water Torture / DNS Random Sub-domain Attack
Attackers send a constant stream of small, legitimate-looking DNS queries to the victim's DNS server at a slow and steady rate. The continuous flow of queries gradually overwhelms the DNS server's resources and causes complete unresponsiveness over time
Phantom Domain Attack
Attackers set up one or more phantom domains and send requests to the victim's DNS server to resolve the phantom domains. The victim's DNS server gets overwhelmed when it tries to resolve the phantom domains through non-responsive servers