Published April 30, 2013
Cyber criminals targeting a vast array of industries are exploiting common protocols to launch Distributed Reflection Denial of Service (DrDoS) attacks. Even printers can be hijacked and made to participate in distributed denial of service (DDoS) attacks. Learn about the three common network protocols used by malicious actors and find out how to prevent and mitigate these kinds of attacks.
Three common network protocols are frequently used in reflection attacks: Simple Network Management Protocol (SNMP), Network Time Protocol (NTP) and Character Generator Protocol (CHARGEN).
DrDoS attacks have been a persistent DDoS method for more than ten years. However, during 2012, use of DrDoS attack methodology increased significantly. The technique continues to grow in effectiveness, and it remains a popular attack method for many malicious actors.
Options for mitigating vulnerabilities in network protocols
Akamai® is the leading provider of cloud services for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai helps enterprises around the world optimize the web experience with SaaS cloud computing solutions including web application acceleration, mobile and web performance optimization, web media delivery and content delivery network (CDN) services, Akamai's cloud security solutions protect online assets against threats such as SQL Injection and DDoS attacks for maximum information security. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.