04:18 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Nominum Launches Tool To Minimize Effect Of DNS-Based DDoS Attacks

Vantio CacheServe 5.4 introduces precision policies to rate limit DNS traffic based on specific criteria

Redwood City, USA, December 18, 2013 ̶ NominumTM, the provider of integrated subscriber, network, and security solutions for communication service providers (CSPs), today announced the launch of its Vantio CacheServe 5.4 software, which introduces ground-breaking rate limiting technology to allow CSPs to minimize the effect of DNS amplification attacks on network performance.

Nominum's Vantio CacheServe 5.4 introduces industry-leading precision policies which can be used to rate limit DNS traffic based on specific criteria, including by type of query, by client IP or response size.

The release of the latest version of Vantio CacheServe follows the worldwide launch of Nominum's network security solution Vantio ThreatAvert last month. ThreatAvert combines the power of the Vantio CacheServe and its precision policies with the Global Intelligence Xchange (GIX) platform, a real-time database of malware threats, to provide a foundational security layer to protect CSPs from threats emanating from within networks.

Vantio CacheServe DNS software has a proven track record of defending against multiple attacks including botnet related activities, malware exploits, DNS amplification, DoS / DDoS, and outbound spam. The latest version of the software includes upgrades allowing:

- Improved broadband subscriber experience during an attack by increasing bandwidth availability and decreasing the response time of DNS infrastructure

- Increased protection of server and bandwidth resources

- A reduction in the number of customers impacted by attacks, resulting in fewer complaints

Hari Krishnan, Director of Product Management, Nominum, says: "Sophisticated DNS amplification attacks are becoming an increasingly common problem for CSPs, who have a responsibility to their end-users to deploy the most advanced protection for network infrastructure to minimize impact to customer experience.

"Nominum is committed to developing ground-breaking security solutions to help CSPs protect themselves, and their customers, by leveraging the expertise derived from our rich heritage in developing the DNS architecture used by CSPs around the world."

Craig Sprosts, VP of Product Management, Nominum, says: "The new precision policies that have been applied to Vantio CacheServe and Vantio ThreatAvert provide the only way to stop the latest DNS amplification attacks using the DNS itself, without blocking legitimate traffic. Only a month ago we launched Vantio ThreatAvert, which combines precision policies with the unique capability of Nominum's GIX platform to detect attacks days, or even hours, before alternative solutions. The additional precision policies available in this release, plus the real-time threat updates delivered by GIX, provide unmatched protection against this critical threat to our customers worldwide."

About Nominum

Nominum provides innovative software that leverages DNS data to deliver a reliable, safe and personalized Internet experience for Communication Service Providers and their subscribers. The company's Vantio tm DNS Software and N2 applications arm CSP's to avert insider threats that could impact network availability and reputation. Nominum enables CSPs to engage with customers to deliver unique services and revenue opportunities and to build brand loyalty. Today, Nominum's carrier-grade software processes over 1.5 trillion queries daily and is deployed by the largest fixed and mobile operators worldwide. Nominum is a global organization headquartered in Redwood City, CA

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web