![]() ![]() At the same time though, organizations should be employing some kind of DDoS protection. To protect against these kinds of DDoS attacks, Netscout recommends that network operators perform reconnaissance to identify any abusable PMSSDP reflectors/amplifiers on their networks and those of their customers. The incidence of both single-vector and multi-/omni-vector reflection/amplification attacks leveraging PMSSDP has increased significantly since November of 2020, indicating its perceived utility to attackers.β βIt should be noted that a single-vector PMSSDP reflection/amplification attack of ~2 Gbps β ~3 Gbps in size is often sufficient to have a significant negative impact on the availability of targeted networks/servers/services. In a blog post, principal engineer Roland Dobbins and senior network security analyst Steinthor Bjarnason at Netscout explained that even a single-vector PMSSDP reflection/amplification attack can be quite disruptive, saying: I was right around the area of the BMC chip on the motherboard. However, multi-vector and omni-vector attacks incorporating PMSSDP range from the low tens of Gbps all the way up to 218Gbps. The screw must have been bridging some contacts or something causing the issue. ![]() So far the firm has identified 27,000 abusable PMSSDP reflectors/amplifiers with single-vector PMSSDP reflection/amplification DDoS attacks ranging in size from 2Gbps to 3GBps. According to Netscout, amplified PMSSDP DDoS attack traffic consists of SSDP HTTP/U responses sourced from UDP/32414 on vulnerable routers directed toward attack targets with each amplified response packet ranging from 52 to 281 bytes in size.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |