heroui logo

Excessive DNS Failures

Splunk Security Content

View Source
Summary
The 'Excessive DNS Failures' rule is designed to detect anomalies in DNS queries by monitoring and counting instances of DNS responses that do not signify success. Specifically, the rule activates when the number of erroneous DNS replies exceeds a threshold of 50. It utilizes the Network_Resolution data model and inspects various DNS reply codes critical for identifying issues such as network misconfigurations, potential DNS poisoning, or signs of malware communication. A high frequency of DNS failures is a red flag as it may lead to significant disruptions in network services and potential data exfiltration attempts if related to malicious actors. This detection rule assists in maintaining the integrity of network connections and identifying malicious activities that exploit DNS protocols.
Categories
  • Network
  • Endpoint
Data Sources
  • Network Traffic
ATT&CK Techniques
  • T1071.004
  • T1071
Created: 2024-11-15