Page tree


DNS is a tempting target for attacks given that most traditional enterprise firewalls are configured to allow port 53 traffic to service DNS, which gives attackers an easy way to evade your firewall implementation. Since DNS queries are asymmetrical, they can result in a response many times larger than the query, which means that your DNS system can be used to amplify an attack.
To protect your DNS servers and DNS service performance, Infoblox provides the following features to detect and mitigate DNS DDoS attacks, such as NXDOMAIN attacks:

  • Automated mitigation of phantom domain attacks (a subset of NXDOMAIN attacks), as described in Automated Mitigation of Phantom Domain Attacks.
  • Configurable parameters used to detect possible NXDOMAIN attacks, as described in Detecting NXDOMAIN Attacks.
  • Mitigation of NXDOMAIN responses by removing the LRU (Least Recently Used) items from the list of NX (non-existent) RRsets. The appliance uses the LRU list to select entries for removal from the cache when the cache utilization exceeds the allowed threshold. For more information, see Mitigating Possible NXDOMAIN Attacks.
  • CLI commands for configuring RRL (Response Rate Limiting) to mitigate DNS DDoS attacks by reducing the rate at which authoritative servers respond to high volumes of malicious queries, as described in Support for RRL (Response Rate Limiting).

Infoblox also offers the following security features to fully protect your DNS infrastructure and implementation:

This page has no comments.