Published April 30, 2013
Cyber criminals targeting a vast array of industries are exploiting common protocols to launch Distributed Reflection Denial of Service (DrDoS) attacks. Even printers can be hijacked and made to participate in distributed denial of service (DDoS) attacks. Learn about the three common network protocols used by malicious actors and find out how to prevent and mitigate these kinds of attacks.
Three common network protocols are frequently used in reflection attacks: Simple Network Management Protocol (SNMP), Network Time Protocol (NTP) and Character Generator Protocol (CHARGEN).
DrDoS attacks have been a persistent DDoS method for more than ten years. However, during 2012, use of DrDoS attack methodology increased significantly. The technique continues to grow in effectiveness, and it remains a popular attack method for many malicious actors.
Options for mitigating vulnerabilities in network protocols