Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Attackers use reflection techniques for larger DDoS attacks

Attackers use reflection techniques for larger DDoS attacks

2014/04/17

Help Net Security - (International) Akamai released a global distributed denial of service (DDoS) attack report, which found that attackers in the first quarter of 2014 favored using reflection and amplification techniques to conduct DDoS attacks, rather than relying on traditional botnets. The report found that the most abused protocols were Character Generator (CHARGEN), Network Time Protocol (NTP), and Domain Name System (DNS.)

Source: http://www.net-security.org/secworld.php?id=16707

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:19:56