eWEEK recently reported that DDoS attacks leveraging the Network Timing Protocol (NTP) are now flooding the Web and that the U.S. Computer Emergency Readiness Team (US-CERT) has issued a warning on the increased risks involved with this amplification attack technique.
Our own Paul Scanlon, principal product line manager, spoke to eWEEK to provide Juniper's point of view on this current and dangerous DDoS threat and offer suggestions for how organizations can prepare for and reduce the possibility of these types of attacks by putting the right defenses in place.
Every organization with systems participating in NTP, DNS and any other service that uses UDP as its communication model must implement simple administrative techniques to reduce the possibility that attackers looking for points of reflection can abuse these services, Scanlon said. Hardening the services is only one key step in preparing for these types of threats, Scanlon said. "Ultimately, if an organization has mission-critical services exposed to the Internet, dedicated solutions and practices should be implemented to defend against the ever-evolving threat of DDoS attacks," he added. - See more at: http://www.eweek.com/security/ddos-attacks-abusing-network-timing-protocol-flood-the-web-2.html#sthash.fRc3saBA.dpuf
Read the full article by Sean Michael Kerner at eWeek.