The invention belongs to the technical field of
domain name system (DNS) security protection, and particularly relates to a solution for coping with reflection amplification attacks of a DNS
server. The solution comprises the following steps that: a field of cookie is added into a pseudo resource
record of EDNS0; a user generates random cookie while sending a request, and a recursive
server checks whether the cookie exists or not after reception of the request, and returns truncate to require the user to perform
retransmission by using a
transmission control protocol (TCP) if the cookie does not exist; if the cookie exists, the recursive
server checks whether the request carries
Server Cookie or not, returns the
Server Cookie together with
Client Cookie if the request does not carry the
Server Cookie, checks whether Server Cookie of the user is consistent with the Server Cookie generated by the recursive server if the request carries the Server Cookie, returns the Server Cookie and the
Client Cookie to the user if the Server Cookie of the user is consistent with the Server Cookie, and returns the truncate to require the user to perform
retransmission by using the TCP if the Server Cookie of the user is not consistent with the Server Cookie; and the user checks whether the
Client Cookie is the same as the random cookie or not, receives the data if the Client Cookie is the same as the random cookie, and discards the data if the Client Cookie is not the same as the random cookie.