Do you have feedback on the definitions or the terms? Send us an email to: email@example.com
A technique in which an attacker sends a request to a name server using a falsified (spoofed) source Internet Protocol (IP) address. The spoofed IP address not only conceals the location of the attacker, it also causes the name server to direct responses to the attacker’s intended target.
Attackers often use this technique in denial-of-service attacks to flood a targeted name server with query traffic.