{"id":675,"date":"2018-03-27T18:45:16","date_gmt":"2018-03-27T18:45:16","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=675"},"modified":"2020-05-06T10:27:07","modified_gmt":"2020-05-06T17:27:07","slug":"are-you-ready-to-counter-udp-based-amplification-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/","title":{"rendered":"Are You Ready to Counter UDP-Based Amplification Attacks?"},"content":{"rendered":"<p>DNS was identified as a key vulnerability by US-CERT (United States Computer Emergency Response Team) of the Department of Homeland Security (DHS) in the UDP-based amplification attacks. The DHS has become the latest premier security agency to realize the DNS vulnerability. You can read more about all protocols and associated vulnerabilities in their\u00a0<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">security advisory<\/a>.<\/p>\n<p>Advanced Persistent Threats (APTs) and malware rely on the Domain Name System (DNS) at various stages of the cyber kill chain to infect devices inside the network, propagate malware and exfiltrate data. According to\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/mkto.cisco.com\/rs\/564-whv-323\/images\/cisco-asr-2016.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco 2016 Annual Security Report<\/a>, 91% of malware uses DNS, during one or more phases in the cyber kill chain, to carry out the campaign, and the longer it takes to detect malware, the higher the cost of damage.<\/p>\n<h2 id=\"toc-hId--1333278568\">But, many organizations aren\u2019t ready to deal with DNS-based attacks<\/h2>\n<p>According to a\u00a0<a href=\"https:\/\/www.infoblox.com\/company\/news-events\/press-releases\/new-global-survey-finds-companies-unprepared-dns-attacks\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">global survey<\/a>\u00a0of over 1,000 security and IT Professionals worldwide conducted by Dimensional Research, 86% of DNS solutions failed to first alert teams of an occurring DNS attack, and nearly one-third of professionals doubted their company could defend against the next DNS attack.<\/p>\n<p>The risk of a DNS-based attack increases exponentially with an increasingly mobile and nomadic workforce, where there are a high number of employees working from multiple and remote locations. This means that the traditional security you use might not be able to provide all the benefits your secure internal network might provide. Whether your DNS is in your network or hosted in the cloud, DDoS attacks can be quite disruptive.<\/p>\n<p><strong><em>Now the alarm bells are going off in your mind, right?<\/em><\/strong><\/p>\n<p>The combination of the fact that DNS is a commonly accepted exploited vector and the fact that many organizations are not effectively addressing the threat, presents a challenge. Fortunately, Infoblox can help address this gap, which we at Infoblox call the DNS Security Gap. Infoblox has a solution that can help protect the\u00a0<a href=\"https:\/\/www.infoblox.com\/solutions\/infrastructure-protection\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">integrity of your network<\/a>\u00a0by helping you detect and protect against DNS attacks cited by the DHS security advisory. We call that product\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Advanced DNS Protection (ADP)<\/a>.<\/p>\n<p>It helps to understand what UDP-based amplification attack means, best practices to counter it, and how Infoblox approaches this issue.<\/p>\n<h2 id=\"toc-hId--445774887\">The Break Down of UDP-Based Amplification Attacks<\/h2>\n<p>The DHS advisory summarizes the attack in the following words:\u00a0<strong>\u201cA distributed reflective denial-of-service (DRDoS)<\/strong>\u00a0is a form of distributed denial-of-service (DDoS) attack that relies on publicly accessible UDP servers and bandwidth amplification factors (BAFs) to overwhelm a victim\u2019s system with UDP traffic.\u201d\u00a0 The critical element in the DRDoS is the reflective nature of the attack with an amplification of the response. It is important to understand what a reflective attack is.<\/p>\n<h2 id=\"toc-hId-441728794\">What is a Reflective Attack?<\/h2>\n<p>In\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/ebook\/dns-security-for-dummies\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS Security for Dummies<\/a>, authored by Joshua Kao, Robert Nagy, and Cricket Liu, the authors explain the reflection attack:<\/p>\n<p><em>A reflection attack sends queries that look like they came from the victim of the attack. The response (<strong>often a large, amplified answer<\/strong>) is sent to the victim, who never asked, and the amount of the response traffic could potentially overwhelm the victim\u2019s network.<\/em><\/p>\n<h3 id=\"toc-hId--478221988\">How is a Reflective Attack Implemented?<\/h3>\n<p>In a reflection attack, an attacker sends a query to a recursive name server with a spoofed source IP address. Instead of his real IP address, he places the target (victim) IP address as the source IP address. The recursive name server does the legwork, retrieves the answer to the query from the authoritative name server, and sends the answer to the unsuspecting victim.<\/p>\n<h2 id=\"toc-hId--2078231140\">Stopping Reflection Attacks<\/h2>\n<p><a href=\"https:\/\/www.infoblox.com\/resources\/ebook\/dns-security-for-dummies\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>DNS Security for Dummies<\/strong><\/a>\u00a0identifies multiple strategies and tools to detect and prevent DNS attacks.<\/p>\n<p>According to the authors of DNS Security for Dummies, a strong mitigation solution will need to have the following capabilities:<\/p>\n<ul>\n<li>Protect against the widest possible range of DNS attacks for secure, resilient, and trustworthy DNS services even under attack.<\/li>\n<li>Ensure that your threat intelligence is always up to date and you can automatically defend against new and evolving attacks.<\/li>\n<li>Provide deep visibility into infected devices on or off-premises.<\/li>\n<li>Have flexible deployment options &#8211; on-premises or cloud (public, private).<\/li>\n<\/ul>\n<h4 id=\"toc-hId--510669089\">HERE ARE SOME OF THE BEST PRACTICES TO MITIGATE THE RISKS FROM US-CERT:<\/h4>\n<p><strong>To help mitigate a DDoS attack:<\/strong><\/p>\n<ul>\n<li>Use stateful UDP inspections to reduce the impact to critical services on border firewalls\/routers.<\/li>\n<li>Use a Border Gateway Protocol (BGP) to create a Remotely Triggered Blackhole.<\/li>\n<li>Maintain a list of primary upstream provider emergency contacts to coordinate responses to attacks.<\/li>\n<li>Upstream providers should conduct mitigation in coordination with downstream customers.<\/li>\n<\/ul>\n<p><strong>To avoid becoming amplifier nodes and avoid any misuse of Internet resources, ISP network and server administrators should:<\/strong><\/p>\n<ul>\n<li>Regularly update software and configurations to deny or limit abuse.<\/li>\n<li>Disable and remove unwanted services, or deny access to local services over the Internet.<\/li>\n<li>Use UDP-based protocols to enable network-based rate-limiting to legitimate services provided over the Internet.<\/li>\n<li>Work with Customer Provider Edge manufacturers for secure configuration and software.<\/li>\n<li>Use ingress filtering to block spoofed packets.<\/li>\n<li>Use traffic shaping on UDP service requests to ensure repeated access to over-the-Internet resources is not abusive.<\/li>\n<\/ul>\n<h2 id=\"toc-hId--303223778\">How Infoblox ADP Protects Against Reflection Attacks<\/h2>\n<p>By design,\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/resources\/solution-notes\/protect-against-widest-range-dns-attacks\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox Advanced DNS Protection<\/a>\u00a0blocks reflection attacks on DNS and many other forms of threats. Further, it ignores and drops all other protocols such as Network Time Protocol that use User Datagram Protocol (UDP) as a foundation.\u00a0 The graphic below shows more details on the types of threats that can be blocked by Infoblox ADP as part of the Infoblox Grid deployment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-676\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-advanced-dns-protection.png\" alt=\"Infoblox Advanced DNS Protection\" width=\"600\" height=\"500\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-advanced-dns-protection.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-advanced-dns-protection-300x250.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/downloads\/software\/advanced-dns-protection\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Contact us<\/a>\u00a0to learn more about ADP and how Infoblox can help protect your network.<\/p>\n<p>Further\u00a0<a href=\"\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Reading &#8211; Don\u2019t be an accomplice in NTP-based DDoS attacks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS was identified as a key vulnerability by US-CERT (United States Computer Emergency Response Team) of the Department of Homeland Security (DHS) in the UDP-based amplification attacks. The DHS has become the latest premier security agency to realize the DNS vulnerability. You can read more about all protocols and associated vulnerabilities in their\u00a0security advisory. Advanced [&hellip;]<\/p>\n","protected":false},"author":270,"featured_media":590,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[15],"class_list":{"0":"post-675","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are You Ready to Counter UDP-Based Amplification Attacks? - Infoblox Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Ready to Counter UDP-Based Amplification Attacks?\" \/>\n<meta property=\"og:description\" content=\"DNS was identified as a key vulnerability by US-CERT (United States Computer Emergency Response Team) of the Department of Homeland Security (DHS) in the UDP-based amplification attacks. The DHS has become the latest premier security agency to realize the DNS vulnerability. You can read more about all protocols and associated vulnerabilities in their\u00a0security advisory. Advanced [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-27T18:45:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srinivas Penumaka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srinivas Penumaka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/\"},\"author\":{\"name\":\"Srinivas Penumaka\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\"},\"headline\":\"Are You Ready to Counter UDP-Based Amplification Attacks?\",\"datePublished\":\"2018-03-27T18:45:16+00:00\",\"dateModified\":\"2020-05-06T17:27:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/\"},\"wordCount\":945,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/\",\"name\":\"Are You Ready to Counter UDP-Based Amplification Attacks? - Infoblox Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"datePublished\":\"2018-03-27T18:45:16+00:00\",\"dateModified\":\"2020-05-06T17:27:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"width\":600,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/are-you-ready-to-counter-udp-based-amplification-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are You Ready to Counter UDP-Based Amplification Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4404b78793ca92db7dee7f4b841f5293\",\"name\":\"Srinivas Penumaka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g\",\"caption\":\"Srinivas Penumaka\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/srinivas-penumaka\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are You Ready to Counter UDP-Based Amplification Attacks? - Infoblox Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Are You Ready to Counter UDP-Based Amplification Attacks?","og_description":"DNS was identified as a key vulnerability by US-CERT (United States Computer Emergency Response Team) of the Department of Homeland Security (DHS) in the UDP-based amplification attacks. The DHS has become the latest premier security agency to realize the DNS vulnerability. You can read more about all protocols and associated vulnerabilities in their\u00a0security advisory. Advanced [&hellip;]","og_url":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2018-03-27T18:45:16+00:00","article_modified_time":"2020-05-06T17:27:07+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","type":"image\/jpeg"}],"author":"Srinivas Penumaka","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Srinivas Penumaka","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/"},"author":{"name":"Srinivas Penumaka","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293"},"headline":"Are You Ready to Counter UDP-Based Amplification Attacks?","datePublished":"2018-03-27T18:45:16+00:00","dateModified":"2020-05-06T17:27:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/"},"wordCount":945,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","keywords":["Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/","name":"Are You Ready to Counter UDP-Based Amplification Attacks? - Infoblox Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","datePublished":"2018-03-27T18:45:16+00:00","dateModified":"2020-05-06T17:27:07+00:00","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","width":600,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/are-you-ready-to-counter-udp-based-amplification-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Are You Ready to Counter UDP-Based Amplification Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4404b78793ca92db7dee7f4b841f5293","name":"Srinivas Penumaka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6506ba75922b832639e70416510d3e1a2e78bb9d4e36f6d4f7143efb0564e71?s=96&d=blank&r=g","caption":"Srinivas Penumaka"},"url":"https:\/\/www.infoblox.com\/blog\/author\/srinivas-penumaka\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/270"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=675"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/675\/revisions"}],"predecessor-version":[{"id":3662,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/675\/revisions\/3662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/590"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}