Skip to content

Amplification and reflection attack mitigation

Defender provides a simple mechanism to protect against DNS amplification and reflection attack by limiting the bandwidth that a single client can generate. It relies on DNSdist's DynBlockRulesGroup:setResponseByteRate() method. For example, to drop queries for 60s after a client has exceeded 300k bytes/s over the last 10 seconds:

  ---
  - type: amplification
    action: drop
    seconds: 10
    action_duration: 60
    comment: "Exceeded response bandwidth"
    max_response_byte_rate: 300000

Please refer to the reference for the complete description of the settings.