Advanced Multi-layer Firewall Protection > AFM DDos and DNS DoS Protections Source | Edit on
Simulate a DNS DDoS Attack¶
DNS flood (or DoS) attacks¶
Denial-of-service (DoS) or flood attacks attempt to overwhelm a system by sending thousands of requests that are either malformed or simply attempt to overwhelm a system using a particular DNS query type or protocol extension, or a particular SIP request type. The BIG-IP system allows you to track such attacks, using the DoS Protection profile.
- Minimize Firefox and restore the SSH session windows. Ensure the
top
utility is still running on the victim server.

- Now we’re going to run a longer attack against the DNS server from the attack host using the attack volume of 10x the safe QPS level:
dnsperf -s 10.1.10.6 -d queryfile-example-current -b 8192 -c 100 -T 20 -l 60 -q 1000000 -Q 180000
- While the attack is running, navigate to Security > Reporting > DoS > Dashboard. You will see the attack appear in the dashboard once the detection/mitigation threshold is exceeded.

- After the attack, navigate to Security > Event Logs > DoS > DNS Protocol. Observe the logs to see the mitigation actions taken by the BIG-IP.

- Under the Statistics > Analytics > DNS, you can see graphs surrounding the traffic and attack details. Change between the Domain Names, Query Types, Attack IDs, Transaction Outcomes and other values in the View By drop-down to view various states. Observe the table holding TopN values below the chart.
