Finally, some ISPs are deploying flood auto-detecting and auto-blocking technologies to help find traffic patterns
of floods and thwart the attack before the ISP's customers notice. Ask your ISP what technologies they are using and emphasize your need for such protection.
To learn more about this attack, read this paper, http://www.isotf.org/news/DNS-Amplification-Attacks.pdf.
Dig deeper on Web Application and Web 2.0 Threats
Related Q&A from Ed Skoudis, Contributor
At Black Hat 2006, researcher Joanna Rutkowska unveiled a piece of machine-based malware called the Blue Pill. But is it a serious threat to your ...continue reading
Wi-Fi on airplanes seems like it will be unavoidable in the future, but what security risks does it pose? In this security threats expert response, ...continue reading
There are some rare forms of malware that antivirus software doesn't pick up on, but there are some good tools to remove all sorts of malware.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.