Stopping DNS-based DDoS attacks in their tracks
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
APNIC staff presented on IPv6, and DDoS prevention at KHNOG 3, held online on 4 December 2021.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.
Guest Post: Capturing DDoS characteristics with the Dissector.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Guest Post: How can we identify and locate IoT devices in networks to mitigate exposure to large-scale attacks?