Stopping DNS-based DDoS attacks in their tracks
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.
Guest Post: Capturing DDoS characteristics with the Dissector.
Guest Post: Study investigates booter-based DDoS attacks in the wild and the impact of an FBI takedown.
Last year’s DDoS attacks on Cambodia’s ISPs have been a wake up call to the industry.
Guest Post: Steinthor Bjarnason concludes a three-part series on DDoS attacks, focusing on blocking well-known attack vectors and using realtime monitoring.
Guest Post: Steinthor Bjarnason details SSDP and memcached DDoS attacks and how to mitigate them.
Guest Post: Steinthor Bjarnason discusses recent DDoS trends, and details carpet bombing attacks and how to mitigate them.
Here are a few moments I’ve captured from the first two days of the RIPE 77 meeting happening this week.