Akamai Technologies has published a new cybersecurity threat advisory.
Akamai said the threat is related to the increasing use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks.
RIPv1 uses a small, multi-router network to share route information quickly and easily.
According to a research, attackers prefer routers with a large amount of routes in the RIPv1 database and RIPv1 request contains only a 24 byte payload, which shows attackers are getting a large amount of unsolicited traffic flooding their intended target with a small request.
The company said user can avoid a DDoS reflection attack using RIPv1 while switching to RIPv1 or later for authentication and can also use an access control list (ACL) to restrict User Datagram Protocol (UDP) source port 520 from the Internet.
“Leveraging the behavior of RIPv1 to launch a DDoS reflection attack is quite simple for an attacker – by using a normal broadcast query, the malicious query can be sent as a unicast request directly to the reflector,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai.
In April, Akamai Technologies acquired Octoshape, a provider of video over internet.