{"id":2385,"date":"2006-03-17T00:00:00","date_gmt":"2006-03-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/17\/dns-recursion-leads-to-nastier-dos-attacks\/"},"modified":"2021-12-30T11:41:14","modified_gmt":"2021-12-30T11:41:14","slug":"dns-recursion-leads-to-nastier-dos-attacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/17\/dns-recursion-leads-to-nastier-dos-attacks\/","title":{"rendered":"DNS recursion leads to nastier DoS attacks"},"content":{"rendered":"<p>A new kind of denial-of-service (DoS) attack has emerged that delivers a heftier blow to organisations&#8217; systems than previously seen DoS threats, according to VeriSign&#8217;s security chief.  The new DoS attacks first emerged in late December and kicked into high gear in January, before dying down four weeks ago, said Ken Silva, VeriSign&#8217;s chief security officer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Under a more common distributed DoS (DDos) attack, a botnet &#8212; a network of compromised PCs being remotely controlled &#8212; directly inundates a victim&#8217;s Web server, name server or mail server with a multitude of queries.  The goal of a DoS attack is to crash the victim&#8217;s system or take their Web site offline, as either tries to respond to the requests.<\/p>\n<p>But in this latest spate of DDoS attacks, bots are sending queries to DNS servers with the return address pointed at the targeted victim.<\/p>\n<p>While it is possible to stop a bot-delivered DDoS attack by blocking the bots&#8217; IP addresses, blocking queries from DNS servers would prove more difficult, Silva said.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/internet\/0,39020369,39257938,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2385","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2385"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2385\/revisions"}],"predecessor-version":[{"id":4872,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2385\/revisions\/4872"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}