In recent weeks, numerous high profile organizations and financial institutions have been targets of massive service disruption attacks.
Several of these attacks are characteristically similar to attacks against top level domain name servers in 2006.
ICANN’s Security and Stability Advisory Committee published an Advisory, SAC008 [PDF, 963 KB]: Distributed Denial of Service (DDoS) Attacks, shortly after the 2006 incidents.
Recommendations from that Advisory remain relevant today.
DDoS attacks commonly use IP addresses that are not allocated to the subscriber or IP addresses from reserved/private space to make it difficult to identify sources of attack traffic. This is called IP address spoofing. Access service providers or corporations should apply network ingress filtering (described in SAC004 and recommended by the Internet IAB in BCP038) to prevent spoofing. Squelching attack traffic close to its origins has the added benefit of relieving ISPs from forwarding malicious or criminal traffic. Everyone benefits when every operator filters spoofed source addresses, except would be attackers.
See more at: http://blog.icann.org/2013/04/do-more-to-prevent-dns-ddos-attacks/#
Several of these attacks are characteristically similar to attacks against top level domain name servers in 2006.
ICANN’s Security and Stability Advisory Committee published an Advisory, SAC008 [PDF, 963 KB]: Distributed Denial of Service (DDoS) Attacks, shortly after the 2006 incidents.
Recommendations from that Advisory remain relevant today.
DDoS attacks commonly use IP addresses that are not allocated to the subscriber or IP addresses from reserved/private space to make it difficult to identify sources of attack traffic. This is called IP address spoofing. Access service providers or corporations should apply network ingress filtering (described in SAC004 and recommended by the Internet IAB in BCP038) to prevent spoofing. Squelching attack traffic close to its origins has the added benefit of relieving ISPs from forwarding malicious or criminal traffic. Everyone benefits when every operator filters spoofed source addresses, except would be attackers.
See more at: http://blog.icann.org/2013/04/do-more-to-prevent-dns-ddos-attacks/#
Comments
Post a Comment