New! Domain name (DNS) servers can be compelled by cyber criminals to participate in cyber attacks. This white paper explains what ISPs and IT administrators need to know about this kind of distributed reflection and amplification (DrDoS) attack.
Prolexic has observed many distributed reflection and amplification (DrDoS) attacks targeting a vast array of industries. An analysis of these domain name server (DNS) reflection DrDoS attack cases are included in this white paper.
In it you will learn about this type of DrDoS attack:
How DNS enables users to type in domain names instead of numeric URLs
Why the protocol contributes to the problem of DrDoS attacks
Which DNS extensions are most likely to be exploited
What a DNS reflection attack looks like to an administrator
Server misconfigurations that can lead to a DNS server being used to attack
What the internet community can do to lower the risk to DNS servers and cyber attack targets
Register and subscribe today. It’s free. Get on the list for automatic updates about DDoS attack reports, threat advisories, the DDoS Dispatch newsletter and other important alerts.
By identifying the sources and associated attributes of individual DDoS attacks, the PLXsert team helps organizations like yours adopt best practices and make more informed, proactive decisions about DDoS threats. PLXsert now offers a premium subscription service that provides current threat intelligence, infrastructure and defense evaluation, as well as post-attack forensics. To learn more about being a premium subscriber, please contact email@example.com or
call +1 (888) 368 2923.
Download the DDoS protection planning white paper
* Required field