Results 1 to 6 of 6

Thread: How to fight with amplification attacks

  1. #1
    Join Date
    Nov 2009
    Posts
    23

    How to fight with amplification attacks

    What does DoS and amplification attacks means. How does they work and what are the losses generated by it. I need some detailed information on the same. I am not aware of such attacks on a web system. But a little bit of prevention can help me to be secure. The other thing I want to know is what is mitigations. How to protect a system from it.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How to fight with amplification attacks

    DNS resolvers are question to the customary DoS threats that plague any networked system. However, amplification attacks are of scrupulous apprehension because DNS resolvers are gorgeous targets to attackers who develop the resolvers large response-to-request size ratio to gain supplementary free bandwidth. Resolvers that sustain and maintain EDNS0 (Extension Mechanisms for DNS) are particularly vulnerable because of the considerably larger packet size that they can return.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How to fight with amplification attacks

    In the amplification scenario, the attack continues as pursues, the attacker used to send a victim DNS server question using a forged foundation IP address. The question may be sent from a solitary system or a network of systems all using the same forged IP address. The questions are for evidences that the attacker knows will result in much larger reactions and answers, up to several number of time.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How to fight with amplification attacks

    In anticipation of a customary system-wide explanation to DNS vulnerabilities is generally put into practiced, such as the DNSSEC2 protocol, open DNS resolvers necessitate to separately take some determines to mitigate against known threats. Many procedures have been projected; see IETF RFC 5452 will determines for making DNS more flexible against forged answers for an overview of most of them.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How to fight with amplification attacks

    In Google Public DNS, subsequent are the suggestions to the protecting your code beside buffer overflows, predominantly the code accountable for parsing and serializing DNS messages. Over stipulating machine resources to prevent against direct DoS attacks on the resolvers themselves. Since IP addresses are unimportant for attackers to forge, it's not possible to block question based on IP address or subnet; the only effectual way to handle such attacks is to easily absorb the load.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How to fight with amplification attacks

    Implementing basic validity- in this you have to check of the answer packets and of nameserver reliability, to prevent against easy cache poisoning. These are customary apparatus and understanding checks that any customarys-acquiescent caching resolver should achieve. Adding entropy to demand messages, to diminish the prospect of more sophisticated spoofing/cache poisoning attacks such as Kaminsky attacks. In this way you can fight with amplification attacks.

Similar Threads

  1. Fight night round 4: champion ruined fight night
    By Delightful. in forum Video Games
    Replies: 5
    Last Post: 06-03-2011, 08:37 PM
  2. Mafia wars-Fight List by Fight Club level
    By The$Nakul in forum Technology & Internet
    Replies: 4
    Last Post: 29-01-2011, 08:01 PM
  3. Audio Amplification not working in Macbook
    By Meena89 in forum Portable Devices
    Replies: 3
    Last Post: 08-12-2010, 07:39 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,277,255.34013 seconds with 17 queries