- CheckMates
- :
- Products
- :
- General Topics
- :
- Help to mitigate DNS flood DDoS attacks
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Help to mitigate DNS flood DDoS attacks
Hello,
Grateful for any tips/hints to mitigate DNS flood DDoS attacks which we've been experiencing recently.
We're running a bunch of R81.20s (all on Open Servers), as standalone gateways and VSXs. During the attack (which lasts ~10-15 minutes), the CPU goes to 100% with all concurrent connections utilized, therefore the fw stops processing traffic. The attacks target our authoritative DNS servers by flooding with UDP.
From the bandwidth perspective, there is no noticeable increase, so I assume the concurrent connections rate is exploited.
The source addresses are thousands of hosts from random subnets.
We do have L4 DDoS protection activated on the upstream ISP, and they do identify the attacks, however, by the time they mitigate it (up to 10 minutes), we are affected by intermittent (or complete lack of) connectivity.
In case it will be of help, we have Arista routers in front, that can cope with the load, but unfortunately without any rate limiting functionality.
Any tips would be greatly appreciated!
Thank you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'd rate-limit the incoming DNS requests on the gateway.
See: https://support.checkpoint.com/results/sk/sk112454
