Modern DDoS attacks seek fewer hosts, yet impale large network servers

Content delivery network Akamai Technologies has revealed that technology companies, educational institutions and gaming companies have been targeted by as many as 50 potent DDoS attacks using Connection-less Lightweight Directory Access Protocol (CLDAP) reflection.

Akamai Technologies believes that most targeted entities carry peak bandwidth in excess of 1Gbps and use source port 389 for which there isn't enough ingress filtering.

While the report from Akamai Technologies could turn out to be too strong for laymen because of its technical content, what it implies is that today's DDoS attacks can prove highly damaging despite attackers not targeting too many hosts. Basically, the hackers in question target port 389 for which proper ingress filtering isn't in place in many organisations, and it serves to amplify smaller attacks into big ones.

Copyright Lyonsdown Limited 2020