Introduction
This report was written for an University course related to Cybersecurity. In this report we were asked to explore more about DDRoS attacks and answer the follwing questions.
- How do DRDoS attacks compare with the Stuxnet incident?
- Elaborate on 2-3 examples of internet services (besides DNS) subject to DRDoS reflection or amplification attacks.
- What is the common denominator among those services?
- Identify possible mitigation strategies.
Report
I will start by explaining a bit more about DRDoS attacks, and in what these attacks consist.
As I have written in the report Distributed Reflective Denial-of-Service (DRDoS) is a form of Distributed Denial-of-Service (DDoS) attack. This type of attack relies on public services accessible through UDP servers these servers are then used for their Bandwidth Amplification Factors (BAFs) and Distribution capabilities in order to flood a targeted systems with colossal amounts of UDP traffic.
In the report I explore more about this type of attacks, explaining how different types of services/protocols are used to have the devastating effects these attacks have on the targeted systems, the amount of traffic generated by these attacks is truly mind-boggling. I also explore about possible mitigation techniques and strategies that businesses can adopt to better defend against DRDoS attacks.
What I have found is how vulnerable most systems are when faced with such an overwhelming amount of traffic coming its way. Anyway, I learned alot about these attacks are processed and the threat they represent in the modern security scene.
My report is available to everyone on my GitHub repository.