{"id":3353,"date":"2014-10-02T16:47:31","date_gmt":"2014-10-02T16:47:31","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3353"},"modified":"2020-05-06T10:31:33","modified_gmt":"2020-05-06T17:31:33","slug":"dns-based-ddos-attacks-what-s-in-a-name","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/","title":{"rendered":"DNS based DDoS Attacks- What&#8217;s in a Name?"},"content":{"rendered":"<p>Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises. At Infoblox our customers have been telling us the same thing, as DDoS attacks have intensified among our ISP customers. Initially everything was lumped together under the \u2018DDoS\u2019 heading. Then they became known as \u2018NXDomain\u2019 attacks, but as we sifted through the PCAP files of the actual attacks across different customers in different regions, a number of unique patterns emerged.<\/p>\n<p>ISPs are especially sensitive about DDoS attacks. Not only are these attacks extremely disruptive to the business \u2013 they consume time and effort to understand and mitigate \u2013 but they can also affect the ISP\u2019s brand reputation if attacks continue and degrade the user experience. Like every service provider they want to avoid costly customer churn. And DNS is critical to the customer experience \u2013 if DNS is slow, the customer will undoubtedly notice.<\/p>\n<p>Let\u2019s take a look at six new attack types and how each one works:<\/p>\n<p><strong>1.\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><strong>Basic NXDomain Attack<\/strong><\/p>\n<p>The attacker sends a flood of queries to a DNS server to resolve a non-existent domain (NXDomain). The recursive server tries to locate this non-existent domain by carrying out multiple domain name queries but does not find it. In the process, its cache is filled up with NXDomain results.<\/p>\n<p><strong>What is the impact? \u00a0<\/strong><\/p>\n<p>When the DNS caching server\u2019s cache is full, users experience slower DNS server response time for legitimate DNS requests. The DNS server also spends valuable resources as it keeps trying to repeat the recursive query to get a resolution result.<\/p>\n<p><strong>2.\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><strong>Random Sub-domain attacks on Legitimate Domains<\/strong><\/p>\n<p>The attacker tries to exhaust the number of outstanding concurrent DNS queries by flooding the DNS server with requests for multiple non-existent domains &#8211; that he creates using randomly generated domain strings. For example: xy4433.yahoo.com\u00a0aj323bc.yahoo.com etc.<\/p>\n<p><strong>What is the impact?<\/strong><\/p>\n<p>The responses never come back from these non-existing domains and the DNS server, as before, spends compute resources waiting for the responses. The attacker thinks he is attacking the domain usda.gov but he is in fact impacting the infrastructure of his ISP \u2013 so the impact is doubled:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0 The recursive DNS server has an upper limit on the number of outstanding DNS queries. The flood of randomly generated queries rapidly exhausts this limit.<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0 The authoritative DNS server of the target domain is subjected to a denial of service attack<\/p>\n<p><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><strong>Phantom Domain Attacks<\/strong><\/p>\n<p>In these attacks, the DNS resolver is forced to resolve multiple domains that are \u201cPhantom\u201d domains that have been setup as part of the attack. These domains do not send responses, causing the server to consume resources while waiting for responses, eventually leading to degraded performance or failure.<\/p>\n<p><strong>What is the impact?<\/strong><\/p>\n<p>The DNS resolver waits for responses &#8211; that never arrive &#8211; from these phantom domains. This consumes resources leading to degraded performance or failure.<\/p>\n<p><strong>4. Lock-Up Domain Attacks<\/strong><\/p>\n<p>Resolvers and domains are setup by attackers to establish TCP-based connections with DNS resolvers that request a response. These domains don\u2019t send the correct response expected by the DNS resolver but instead keep them engaged with random packets. They are also deliberately slow in responding to requests from the DNS resolvers and keep the DNS resolvers \u201ctied-up\u201d or \u201changing\u201d. Advanced attacks also involve adaptive techniques to keep the DNS resolver \u201ccoming back\u201d to check for responses. These domains might send a SERVFAIL at the end.<\/p>\n<p><strong>What is the impact?<\/strong><\/p>\n<p>The DNS resolver establishing these connections with the misbehaving domains exhausts its resources.<\/p>\n<p><strong>5. CPE-driven DDoS attacks in the ISP network<\/strong><\/p>\n<p>There are open DNS recursors or DNS proxies on customer premise equipment (CPE) devices. A significant proportion of the open DNS recursors utilized for DNS reflection or amplification attacks are CPE devices. Some devices ship with a local, caching-only DNS server or DNS proxies open to the world. Users enable port-forwarding to open DNS recursors on their home networks.<\/p>\n<p><strong>What is the impact?<\/strong><\/p>\n<p>Exhaustion of ISP DNS resources or slow servers.<\/p>\n<p><strong>6. DDoS attacks using Malware-infected CPE devices<\/strong><\/p>\n<p>Akamai&#8217;s Prolexic Security Engineering and Research Team (PLXsert) is tracking the spread of\u00a0<a href=\"https:\/\/blogs.akamai.com\/2014\/09\/plxsert-warns-of-spike-ddos-toolkit.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Spike<\/a>, a new malware toolkit that poses a threat to embedded devices, as well as Linux and Windows systems.<\/p>\n<p>From the advisory:<\/p>\n<p>Binary payloads from this toolkit are dropped and executed after the successful compromise of targeted devices, which may include PCs, servers, routers, Internet of Things (IoT) devices (i.e., smart thermostat systems and washer\/dryers) and home-based customer premise equipment (CPE) routing devices.<\/p>\n<p>The toolkit has multiple DDoS payloads, including SYN flood, UDP flood, DNS query flood, and GET floods.<\/p>\n<p><strong>What is the impact?<\/strong><\/p>\n<p>The malware-infected CPE devices effectively form a new botnet, enabling the botnet controller to generate DDoS traffic on demand against selected targets.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>While no single mitigation approach is bullet proof \u2013 and the vendor community is working hard to help customers as much as possible &#8211; it is clear that the latest spate of DDoS attacks is targeting DNS as a key vulnerability. DNS-based attacks can be either the heavy flood variety such as DNS reflection and amplification attacks, which typically grab the headlines, or they can be low-volume stealth attacks that evade traditional flood detection defenses. \u00a0We are working with our ISP customers and their enterprise customers to help them protect their DNS infrastructure and discuss the best ways to address these new DNS-centric DDoS attacks. We will continue to share what we learn in future blog postings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises. At Infoblox our customers have been telling us the same thing, as DDoS attacks have intensified among our ISP customers. [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":3212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[30,16,15],"class_list":{"0":"post-3353","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS based DDoS Attacks- What\u00e4\u00f3\u00bbs in a Name?<\/title>\n<meta name=\"description\" content=\"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS based DDoS Attacks- What&#039;s in a Name?\" \/>\n<meta property=\"og:description\" content=\"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-02T16:47:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renuka Nadkarni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renuka Nadkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/\"},\"author\":{\"name\":\"Renuka Nadkarni\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\"},\"headline\":\"DNS based DDoS Attacks- What&#8217;s in a Name?\",\"datePublished\":\"2014-10-02T16:47:31+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/\"},\"wordCount\":938,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/\",\"name\":\"DNS based DDoS Attacks- What\u00e4\u00f3\u00bbs in a Name?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"datePublished\":\"2014-10-02T16:47:31+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"description\":\"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dns-based-ddos-attacks-what-s-in-a-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS based DDoS Attacks- What&#8217;s in a Name?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\",\"name\":\"Renuka Nadkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"caption\":\"Renuka Nadkarni\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renuka-nadkarni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS based DDoS Attacks- What\u00e4\u00f3\u00bbs in a Name?","description":"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/","og_locale":"en_US","og_type":"article","og_title":"DNS based DDoS Attacks- What's in a Name?","og_description":"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/","og_site_name":"Infoblox Blog","article_published_time":"2014-10-02T16:47:31+00:00","article_modified_time":"2020-05-06T17:31:33+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","type":"image\/jpeg"}],"author":"Renuka Nadkarni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Renuka Nadkarni","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/"},"author":{"name":"Renuka Nadkarni","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9"},"headline":"DNS based DDoS Attacks- What&#8217;s in a Name?","datePublished":"2014-10-02T16:47:31+00:00","dateModified":"2020-05-06T17:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/"},"wordCount":938,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","keywords":["DNS","Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/","url":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/","name":"DNS based DDoS Attacks- What\u00e4\u00f3\u00bbs in a Name?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","datePublished":"2014-10-02T16:47:31+00:00","dateModified":"2020-05-06T17:31:33+00:00","description":"Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World,\u00a0DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/dns-based-ddos-attacks-what-s-in-a-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"DNS based DDoS Attacks- What&#8217;s in a Name?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9","name":"Renuka Nadkarni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","caption":"Renuka Nadkarni"},"url":"https:\/\/www.infoblox.com\/blog\/author\/renuka-nadkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3353"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3353\/revisions"}],"predecessor-version":[{"id":3639,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3353\/revisions\/3639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3212"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}