ISC adds DDoS defense module to BIND software

Internet Systems Consortium (ISC) announces that the RRL module, currently the most effective defense against the use of DNS in Distributed Denial of Service attacks, is now part of the upcoming BIND release.

A DNS DDoS attack works by forging queries that look like they came from the victim’s server, making it appear to be requesting a high volume of information. RRL enables server administrators to limit the rate at which their server will send replies to forged queries, thereby preventing it from contributing to the attack. The frequency of DNS DDoS attacks has been increasing, rising by 20% in Q2 of 2013. In an average attack 50 million packets per second are beamed at the victim. As attacks increase, RRL is the best defense available.

“Our users have been asking for RRL to be incorporated into BIND,” said Kannan Ayyar, President of Internet Systems Consortium, “and we recognize the important role it plays in DDoS mitigation. With DDoS attacks increasing in both number and severity, we felt it was important to integrate RRL into a supported release.”

“We have been testing RRL in limited release, and are now confident that it is ready for general use in BIND installations,” said Scott Mann, ISC’s VP of Engineering. “Third-party additions like RRL are possible because BIND is open source software. Now that it is fully implemented, we look forward to enhancing and building on RRL in future releases.”

For more information on RRL, visit the ISC Knowledgebase at https://kb.isc.org/article/AA-01000, or sign up for a webinar listed at our events page.

Commercial support for BIND and additional RRL functionality is available to DNSco subscription customers; visit DNSco’s BIND Solutions to learn more.

2 Comments

  1. Sickle Man August 6, 2013 Reply

    Cool

    • feras January 19, 2014 Reply

      Dear ;

      i am feras Ali i finished my master but still need to do my thesis in
      ” Defense Destributed Denial Of Service in Cloud Computing”
      i am looking for someone who can help me doing any simple lab in DDOS for cloud computing for any two techniques and shoose the best

      based on the results .

      from a year and i couldnt have any lap for DDOS in Cloud.
      i can puy how much it cost just to have any simple practical for my professor.
      if you can help me please do
      if you cant please inform me where i can find the help .

Leave a reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Protected with IP Blacklist CloudIP Blacklist Cloud

What is 6 + 5 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)