Question: Real World Scenario Infrastructure Services & Troubleshooting Read the scenario. Then, use this guide as you work through the lesson. Answer the questions to help

Real World Scenario
Infrastructure Services & Troubleshooting
Read the scenario. Then, use this guide as you work through the lesson. Answer the questions to help you connect your learning to the scenario.
Scenario:
The CloudFlare DDoS Attack in 2014
In 2014, CloudFlare, a cybersecurity provider and content delivery network, was slammed by a DDoS attack estimated at approximately 400 gigabits per second of traffic. The attack, directed at a single CloudFlare customer and targeted on servers in Europe, was launched using a vulnerability in the Network Time Protocol (NTP), which is used to ensure that computer clocks are accurate. Even though the attack was directed at just one of CloudFlares customers, it was so powerful that it significantly degraded CloudFlares own network.
Why the CloudFlare Attack Matters
This attack illustrates a technique where attackers use spoofed source addresses to send fake NTP server responses to the attack targets servers. This type of attack is known as a reflection attack, since the attacker is able to bounce bogus requests off of the NTP server, while hiding their own address. Due to a weakness in the NTP, the amplification factor of the attack can be up to 206 times, making NTP servers a very effective DDoS tool. Shortly after the attack, the U.S. Computer Emergency Readiness Team explained that NTP amplification attacks are especially difficult to block because responses are legitimate data coming from valid servers.
Lessons Learned and Preventative Measures:
Your goal is to provide a bulleted list with specific strategies cybersecurity providers can use to proactively prevent NTP amplification attacks based on lessons learned from the CloudFlare DDos attack.
Learn more about the CloudFlare 2014 Attack
Task 1: Define the Dependencies
1.What are the prerequisites required to understand the scenario?
2.What are the key factors that influence the scenario?
3.What skills or knowledge must be acquired before tackling the scenario?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!