What is an DDoS attack?

A distributed denial-of-service (DDoS) attack is a particular form of cyber-crime that is considered a variant of a denial-of-service (DoS) attack. In a DDoS attack, a requested service is either completely blocked or its availability is significantly restricted. This is typically done by deliberately overloading the target's IT infrastructure. Such attacks are often used by cyber criminals to blackmail unprotected organizations by demanding a ransom or to carry out, conceal or prepare other criminal activities.

What is a NTP amplification attack and how does it work?

Network diagram depicting an NTP amplification DDoS attack in which a compromised computer bombards NTP servers with fake requests to send an excessive response to the target

NTP is a UDP-based protocol that is used to synchronise computer clocks on the Internet. Attackers exploit it to amplify DDoS attacks:

  • The attacker spoofs the victim's IP address and sends a small UDP request to a vulnerable NTP server.
  • The NTP server thinks the request is legitimate and sends a much larger UDP response back to the spoofed victim's IP address.
  • By forwarding responses from thousands of NTP servers, the attacker uses amplification factors of 50x, 100x or more.
  • This allows relatively small requests of just a few kilobits to generate gigabits or terabits of attack traffic that floods the victim.
  • Common NTP commands such as monlist are abused to generate large responses.

Amplification effects in NTP: The 'monlist' command and its effects

Amplification results from the use of certain NTP commands that convert a small request into a large response. A frequently used example is the "monlist" command, which returns a list of the last 600 hosts that have contacted the NTP server. This response can be very large and therefore cause a considerable amplification.

Strengthen NTP server security

Digital illustration with various cybersecurity symbols such as shields, locks and digital codes in connection with DDoS protection

Learn here how you can strengthen the security of your NTP time servers. You can expect effective methods to fend off DDoS attacks and protect your network.

Share this post