SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
 
	
  
	
   1	
  
	
  
NTP-­‐AMP	
  DDoS	
  Attacks:	
  A	
  Cyber	
  Security	
  Threat	
  
Selected	
  excerpts	
  
	
  
The	
  Security	
  Engineering	
  and	
  Response	
  Team	
  (PLXsert)	
  at	
  Prolexic	
  (now	
  part	
  of	
  Akamai)	
  recently	
  
published	
  a	
  Distributed	
  Denial	
  of	
  Service	
  (DDoS)	
  Threat	
  Advisory	
  about	
  a	
  serious	
  up-­‐and-­‐coming	
  
cyber	
  security	
  threat:	
  NTP	
  amplification	
  attacks.	
  The	
  NTP-­‐AMP	
  DDoS	
  threat	
  advisory	
  describes	
  the	
  
cyber-­‐attack	
  and	
  shares	
  a	
  Snort	
  rule	
  and	
  DDoS	
  defense	
  instructions	
  for	
  attack	
  mitigation	
  by	
  the	
  
target	
  and	
  best	
  practices	
  for	
  NTP	
  server	
  administration.	
  
	
  
Fueled	
  by	
  the	
  availability	
  of	
  new	
  Network	
  Time	
  Protocol	
  (NTP)	
  amplification	
  DDoS	
  toolkits	
  that	
  
make	
  it	
  simple	
  for	
  malicious	
  actors	
  to	
  generate	
  high-­‐bandwidth,	
  high-­‐volume	
  DDoS	
  attacks	
  against	
  
online	
  targets,	
  the	
  NTP	
  amplification	
  attack	
  method	
  has	
  surged	
  in	
  popularity,	
  making	
  it	
  one	
  of	
  the	
  
most	
  popular	
  DDoS	
  attack	
  types	
  in	
  2014,	
  as	
  reported	
  by	
  Prolexic.	
  
	
  
With	
  only	
  a	
  handful	
  of	
  vulnerable	
  NTP	
  servers,	
  the	
  current	
  batch	
  of	
  NTP	
  amplification	
  attack	
  
toolkits	
  enable	
  malicious	
  actors	
  to	
  launch	
  100	
  Gbps	
  attacks	
  –	
  or	
  larger.	
  The	
  most	
  recent	
  toolkit	
  
uses	
  an	
  NTP	
  server’s	
  own	
  list	
  of	
  recent	
  server	
  connections	
  –	
  as	
  many	
  as	
  600	
  IP	
  addresses	
  –	
  as	
  the	
  
payload	
  to	
  create	
  malicious	
  traffic	
  at	
  the	
  target	
  site.	
  
	
  
What	
  makes	
  the	
  NTP-­‐AMP	
  attack	
  so	
  powerful?	
  
	
  
The	
  NTP	
  protocol	
  has	
  a	
  few	
  methods	
  that	
  can	
  be	
  exploited	
  to	
  launch	
  a	
  DDoS	
  amplification	
  attack.	
  
One	
  of	
  the	
  more	
  common	
  methods	
  observed	
  recently	
  is	
  the	
  monlist	
  request.	
  Monlist	
  is	
  a	
  feature	
  
within	
  the	
  NTP	
  protocol	
  that	
  lists	
  the	
  address	
  of,	
  and	
  statistics	
  about,	
  the	
  last	
  600	
  clients	
  that	
  have	
  
connected	
  to	
  a	
  server	
  for	
  NTP	
  time	
  service.	
  The	
  abuse	
  of	
  the	
  monlist	
  request	
  is	
  not	
  new	
  but	
  has	
  
definitely	
  hit	
  a	
  trending	
  status.	
  
	
  
The	
  amplification	
  is	
  dramatic.	
  If	
  every	
  request	
  received	
  a	
  response	
  and	
  every	
  server	
  responded	
  
with	
  the	
  maximum	
  amount	
  of	
  traffic,	
  1	
  Gbps	
  of	
  request	
  traffic	
  would	
  yield	
  366	
  Gbps	
  of	
  response	
  
traffic	
  destined	
  for	
  the	
  primary	
  target.	
  In	
  real-­‐world	
  environments	
  NTP	
  monlist	
  responses	
  vary	
  
wildly	
  in	
  size,	
  which	
  will	
  affect	
  the	
  total	
  attack	
  bandwidth	
  directed	
  to	
  the	
  primary	
  target.	
  	
  
	
  
With	
  such	
  significant	
  amplification,	
  malicious	
  actors	
  can	
  produce	
  harmful	
  attacks	
  using	
  only	
  a	
  few	
  
systems.	
  With	
  the	
  use	
  of	
  NTP	
  scanners,	
  malicious	
  actors	
  could	
  refine	
  their	
  NTP	
  lists	
  to	
  include	
  only	
  
servers	
  that	
  respond	
  with	
  the	
  maximum	
  response	
  size	
  and	
  two	
  NTP	
  servers	
  could	
  easily	
  generate	
  
more	
  than	
  100	
  Gbps	
  of	
  amplified	
  reflection	
  traffic.	
  	
  
	
  
As	
  with	
  all	
  DrDoS	
  (Distributed	
  Reflected	
  Denial	
  of	
  Service)	
  flooding	
  tools,	
  raw	
  sockets	
  are	
  used	
  by	
  
 
	
  
	
   2	
  
the	
  NTP-­‐AMP	
  DDoS	
  toolkit	
  to	
  craft	
  the	
  IP	
  and	
  UDP	
  headers	
  to	
  allow	
  IP	
  spoofing.	
  Elevated	
  
privileges	
  are	
  required	
  for	
  the	
  use	
  of	
  raw	
  sockets	
  on	
  any	
  modern	
  operating	
  system.	
  Therefore,	
  the	
  
execution	
  of	
  the	
  NTP	
  amplification	
  tools	
  requires	
  attackers	
  to	
  either	
  set	
  up	
  their	
  own	
  servers	
  or	
  
compromise	
  a	
  server	
  and	
  elevate	
  privileges	
  in	
  order	
  to	
  make	
  the	
  operating	
  system	
  create	
  raw	
  
socket	
  connections.	
  	
  
	
  
What	
  an	
  NTP-­‐AMP	
  attack	
  looks	
  like	
  
	
  
Shown	
  below	
  in	
  Figure	
  1	
  is	
  a	
  sample	
  of	
  malicious	
  traffic	
  replicated	
  to	
  emulate	
  the	
  actual	
  NTP_AMP	
  
DDoS	
  campaigns	
  Prolexic	
  mitigated	
  for	
  its	
  customers.	
  
	
  
Figure	
  1:	
  Traffic	
  observed	
  by	
  the	
  primary	
  target	
  network	
  using	
  tcpdump	
  
Get	
  the	
  full	
  NTP-­‐AMP	
  DDoS	
  threat	
  advisory	
  for	
  a	
  full	
  analysis	
  and	
  mitigation	
  techniques	
  
	
  
In	
  the	
  threat	
  advisory,	
  PLXsert	
  shares	
  its	
  insight	
  into	
  NTP	
  Amplification	
  attacks:	
  
• Indicators of the use of the NTP Amplification toolkit
• Analysis of the source code
• Use of monlist as the payload
• The SNORT rule and target mitigation using ACL entries for attack targets
• Mitigation instructions for vulnerable NTP servers
• Statistics and payloads from two observed NTP Amplification DDoS attack campaigns
About	
  Prolexic	
  
Prolexic	
  Technologies	
  (now	
  part	
  of	
  Akamai)	
  is	
  the	
  world’s	
  largest	
  and	
  most	
  trusted	
  provider	
  of	
  
DDoS	
  protection	
  and	
  mitigation	
  services.	
  Learn	
  more	
  at	
  http://www.prolexic.com.	
  	
  

Más contenido relacionado

Último

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 

Último (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 

Destacado

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

NTP-AMP DDoS Attacks: A Cyber Security Threat | Prolexic

  • 1.       1     NTP-­‐AMP  DDoS  Attacks:  A  Cyber  Security  Threat   Selected  excerpts     The  Security  Engineering  and  Response  Team  (PLXsert)  at  Prolexic  (now  part  of  Akamai)  recently   published  a  Distributed  Denial  of  Service  (DDoS)  Threat  Advisory  about  a  serious  up-­‐and-­‐coming   cyber  security  threat:  NTP  amplification  attacks.  The  NTP-­‐AMP  DDoS  threat  advisory  describes  the   cyber-­‐attack  and  shares  a  Snort  rule  and  DDoS  defense  instructions  for  attack  mitigation  by  the   target  and  best  practices  for  NTP  server  administration.     Fueled  by  the  availability  of  new  Network  Time  Protocol  (NTP)  amplification  DDoS  toolkits  that   make  it  simple  for  malicious  actors  to  generate  high-­‐bandwidth,  high-­‐volume  DDoS  attacks  against   online  targets,  the  NTP  amplification  attack  method  has  surged  in  popularity,  making  it  one  of  the   most  popular  DDoS  attack  types  in  2014,  as  reported  by  Prolexic.     With  only  a  handful  of  vulnerable  NTP  servers,  the  current  batch  of  NTP  amplification  attack   toolkits  enable  malicious  actors  to  launch  100  Gbps  attacks  –  or  larger.  The  most  recent  toolkit   uses  an  NTP  server’s  own  list  of  recent  server  connections  –  as  many  as  600  IP  addresses  –  as  the   payload  to  create  malicious  traffic  at  the  target  site.     What  makes  the  NTP-­‐AMP  attack  so  powerful?     The  NTP  protocol  has  a  few  methods  that  can  be  exploited  to  launch  a  DDoS  amplification  attack.   One  of  the  more  common  methods  observed  recently  is  the  monlist  request.  Monlist  is  a  feature   within  the  NTP  protocol  that  lists  the  address  of,  and  statistics  about,  the  last  600  clients  that  have   connected  to  a  server  for  NTP  time  service.  The  abuse  of  the  monlist  request  is  not  new  but  has   definitely  hit  a  trending  status.     The  amplification  is  dramatic.  If  every  request  received  a  response  and  every  server  responded   with  the  maximum  amount  of  traffic,  1  Gbps  of  request  traffic  would  yield  366  Gbps  of  response   traffic  destined  for  the  primary  target.  In  real-­‐world  environments  NTP  monlist  responses  vary   wildly  in  size,  which  will  affect  the  total  attack  bandwidth  directed  to  the  primary  target.       With  such  significant  amplification,  malicious  actors  can  produce  harmful  attacks  using  only  a  few   systems.  With  the  use  of  NTP  scanners,  malicious  actors  could  refine  their  NTP  lists  to  include  only   servers  that  respond  with  the  maximum  response  size  and  two  NTP  servers  could  easily  generate   more  than  100  Gbps  of  amplified  reflection  traffic.       As  with  all  DrDoS  (Distributed  Reflected  Denial  of  Service)  flooding  tools,  raw  sockets  are  used  by  
  • 2.       2   the  NTP-­‐AMP  DDoS  toolkit  to  craft  the  IP  and  UDP  headers  to  allow  IP  spoofing.  Elevated   privileges  are  required  for  the  use  of  raw  sockets  on  any  modern  operating  system.  Therefore,  the   execution  of  the  NTP  amplification  tools  requires  attackers  to  either  set  up  their  own  servers  or   compromise  a  server  and  elevate  privileges  in  order  to  make  the  operating  system  create  raw   socket  connections.       What  an  NTP-­‐AMP  attack  looks  like     Shown  below  in  Figure  1  is  a  sample  of  malicious  traffic  replicated  to  emulate  the  actual  NTP_AMP   DDoS  campaigns  Prolexic  mitigated  for  its  customers.     Figure  1:  Traffic  observed  by  the  primary  target  network  using  tcpdump   Get  the  full  NTP-­‐AMP  DDoS  threat  advisory  for  a  full  analysis  and  mitigation  techniques     In  the  threat  advisory,  PLXsert  shares  its  insight  into  NTP  Amplification  attacks:   • Indicators of the use of the NTP Amplification toolkit • Analysis of the source code • Use of monlist as the payload • The SNORT rule and target mitigation using ACL entries for attack targets • Mitigation instructions for vulnerable NTP servers • Statistics and payloads from two observed NTP Amplification DDoS attack campaigns About  Prolexic   Prolexic  Technologies  (now  part  of  Akamai)  is  the  world’s  largest  and  most  trusted  provider  of   DDoS  protection  and  mitigation  services.  Learn  more  at  http://www.prolexic.com.