Optimum Bandwidth offers IT security solutions to protect your business from malicious traffic. Don’t be left exposed, the threat is real, proven by dozens of notable breaches already in 2014.
Gaps in existing DDoS defenses require highly targeted DNS defenses to eliminate malicious traffic
Redwood City, USA, April 2, 2014 ̶ New research by NominumTM, the innovation leader in DNS and Internet Activity applications for Communication Service Providers, today reveals evidence that DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide. A simple attack can create 10s of Gbps of traffic to disrupt provider networks, enterprises, websites, and individuals anywhere in the world.
Anatomy of a DNS-based DDoS Amplification Attack
- More than 24 million home routers on the Internet have open DNS proxies which expose ISPs to DNS-based DDoS attacks
- In February 2014, more than 5.3 million of these routers were used to generate attack traffic
- During an attack in January 2014, more than 70% of total DNS traffic on a provider’s network was associated with DNS amplification
- DNS is by far the most popular protocol for launching amplification attacks, with more available amplifiers than the next four protocols combined