Nominumís latest research reveals:
- More than 24 million home routers on the Internet have open DNS proxies which expose ISPs to DNS-based DDoS attacks
- In February 2014, more than 5.3 million of these routers were used to generate attack traffic
- During an attack in January 2014, more than 70% of total DNS traffic on a providerís network was associated with DNS amplification
- DNS is by far the most popular protocol for launching amplification attacks, with more available amplifiers than the next four protocols combined.
Traffic from amplification amounts to trillions of bytes a day disrupting ISP networks, websites and individuals. The impact on ISPs is fourfold:
- Network impact generated by malicious traffic saturating available bandwidth
- Cost impact generated by a spike in support calls caused by intermittent service disruption
- Revenue impact as poor internet experience leads to increased churn or retention expenses
- Reputation impact as unwanted traffic is directed toward peers.