![]() Publicly exposed sites should be load balanced and include resource reserves for additional bandwidth and CPU cycles in order to handle increased loads caused by an attack. Monitor your network and make note of client IPs using unusual amounts of bandwidth. Work with your Internet provider to block or throttle traffic you do not want on your network, if possible. For example, a zone transfer reply would have a higher threshold than a reply for the name of the DNS server. This mechanism makes it difficult for entities to locate specific domains or web sites on the Internet that are malicious sites.Ĭonfigure your authoritative DNS servers to use DNS response rate limiting.ĭNS traffic should be throttled depending on the type of DNS packet. ![]() DNS blocking used for security against phishing and spam can help preclude DNS attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |