Top 10 DNS attacks likely to infiltrate your network

The problem with traditional firewalls is that they leave port 53 open, which is for DNS queries. So they are not always effective in protecting against DNS-based DDoS attack such as amplification, reflection, etc. They require extremely high compute performance to accurately detect DNS-based attacks, making deep inspection an impractical approach in terms of cost and the number of distribution points that are needed. Hence traditional protection is ineffective.
To read this article in full or to leave a comment, please click here
Read more: Top 10 DNS attacks likely to infiltrate your network
Story added 23. February 2015, content source with full text you can find at link above.
More antivirus and malware news?
- Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
- CISA Introduces Secure-by-design and Secure-by-default Development Principles
- ‘I forgot my password’ doesn’t impress judge in a child images case
- SSCC161 – What do you mean, "Trade him for Edward Snowden"? [PODCAST]
- Cisco apologizes for privacy ‘confusion,’ makes cloud service an opt-in feature
- It’s illegal to make private copies of music in the UK—again
- OpenAI Turns to Security to Sell ChatGPT Enterprise
- DMARC Fully Implemented on Two Thirds of U.S. Government Domains
- CISA Says Threat Actor Breached Federal Agency’s Network
- Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada