• DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation

    Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation

    • This topic has 1 reply, 2 voices, and was last updated 7 years ago by anonymous.
    Author
    Topic
    #192628

    DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation
    By Catalin Cimpanu | May 15, 2018

     
    Attackers are experimenting with a new method of avoiding some DDoS mitigation solutions by employing the Universal Plug and Play (UPnP) protocol to mask the source port of network packets sent during the DDoS flood.

    In a report published on Monday, DDoS mitigation firm Imperva says it observed at least two DDoS attacks employing this technique.

    By masking the origin port of incoming network packets, Imperva says that older DDoS mitigation systems that rely on reading this info to block attacks will need to be updated to more complex solutions that rely on deep packet inspection (DPI), a more costly and slower solution.

    The technique is, no doubt, going to become more popular as time passes by. Just like when the UPnProxy flaw came to light, router owners are advised to disable UPnP support if they are not using the feature.

     
    Read the full article here

    2 users thanked author for this post.
    Viewing 0 reply threads
    Author
    Replies
    • #192810

      What benefit was UPnP supposed to bring us anyway? Maybe it is time to remove the service from routers or it be disabled by default in the firmware.

    Viewing 0 reply threads
    Reply To: DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: