{"id":7644,"date":"2018-03-05T20:02:45","date_gmt":"2018-03-05T20:02:45","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1104"},"modified":"2018-03-05T20:02:45","modified_gmt":"2018-03-05T20:02:45","slug":"deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/","title":{"rendered":"Deep Analysis of Memcached Large DRDoS Attacks &#8211; China Telecom DamDDoS &#038; NSFOCUS Jointly Released"},"content":{"rendered":"<p style=\"text-align: left;\">Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack, which aroused the concern of all parties.\u00a0According to our monitoring, the peak traffic for this attack has now reached 1.35T.\u00a0On Feb. 27, Memcached&#8217;s reflection DDoS attacks ranged from hundreds of megabytes to a maximum of 500G.\u00a0A few days later, the volume of attack spiked rapidly and doubled its own record. The attacks took place more tens of hundreds of times a day, showing explosive growth, which may lead to significant consequences.<\/p>\n<p style=\"text-align: left;\">Table of Contents<\/p>\n<ul style=\"text-align: left;\">\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#1\">1. Event Review<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#2\">2. Attack Analysis<\/a>\n<ul>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#21_Memcached\">1 What is Memcached?<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#22_Memcached\">2 Memcached distribution<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#23_MemcachedDRDoS\">3 How does Memcached form a DRDoS attack?<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#24_Memcached\">4 Memcached attack characteristics<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#3Memcached\">3. Memcached Attack Defense Reinforcement Recommendations<\/a>\n<ul>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#31_Memcached\">1 Memcached system self-examination recommendations<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#32_Memcached\">2 Memcached attack traffic cleaning<\/a><\/li>\n<li><a href=\"http:\/\/blog.nsfocus.net\/memcached-drdos-analysis\/#33_Memcached\">3 Memcached system protection and reinforcement<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>1.Event Review<\/strong><\/p>\n<p style=\"text-align: left;\">According to China Telecom DamDDoS, attack monitoring data show that in as short as 5 days &#8211; from Monday to Friday (February 26 to March 2 at 06:00), there have been 79 cases using the Memcached protocol amplification attacks around the world.\u00a0The total daily attack traffic reached 419TBytes.<\/p>\n<p style=\"text-align: left;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-1105\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197.png\" alt=\"\" width=\"543\" height=\"356\" \/><\/p>\n<p style=\"text-align: left;\"><em>Memcached Reflection Amplification DDoS Attacks &#8211; Day<\/em><\/p>\n<p style=\"text-align: left;\"><img decoding=\"async\" class=\"alignnone wp-image-1106\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/112-300x138.png\" alt=\"\" width=\"561\" height=\"258\" \/><\/p>\n<p style=\"text-align: left;\"><em>Memcached Reflection Amplification DDoS Attacks &#8211; Total Traffic per Day<\/em><\/p>\n<p style=\"text-align: left;\">Among them, there are 68 attacks targeting Memcached in China, with attacks being frequent seen in Jiangsu and Zhejiang provinces.\u00a0The maximum single attack against China peaks 505Gbps.\u00a0The longest attack took place on March 1, lasting 1.2 hours, with a total attack traffic of 103.8TBytes.<\/p>\n<p style=\"text-align: left;\"><img decoding=\"async\" class=\"alignnone wp-image-1107\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/113-300x190.png\" alt=\"\" width=\"562\" height=\"356\" \/><\/p>\n<p style=\"text-align: left;\"><em>Memcached Reflection Amplification DDoS Attacks in Various Provinces in China<\/em><\/p>\n<p style=\"text-align: left;\">In terms of impact, all Internet businesses may become targets of Memcached DRDoS attacks.\u00a0Broadband service providers suffer from large traffic attacks, resulting in the outbound bandwidth fully occupied and the normal business not accessible, on the other hand, enterprise internal Memcached systems may be used by criminals and become an accomplice.\u00a0We urge customers in all regions and industries to exercise vigilance and beware of Memcached Reflection attacks that directly impact the server or use the attacks as a cover-up to carry out other types of attacks along to further jeopardize information security.<\/p>\n<p style=\"text-align: left;\"><strong>2.Attack Analysis<\/strong><\/p>\n<p style=\"text-align: left;\">2.1 What is Memcached?<\/p>\n<p style=\"text-align: left;\">Memcached is a high-performance caching system for open source distributed memory object and is mainly used to improve the scalability of web applications. It can effectively solve many problems of big data caches and is widely used worldwide.\u00a0Memcached stores small pieces of data based on the key-value of the memory and uses the data to complete database calls, API calls, or page renderings.\u00a0Attackers make use of the key-value function to create a large flow Memcached reflection attacks.\u00a0This will be described later in details.<\/p>\n<p style=\"text-align: left;\">2.2 Memcached distribution<\/p>\n<p style=\"text-align: left;\">According to the latest statistics, a total of 3,790 Memcached servers are being utilized worldwide to participate in these Memcached reflection amplification attacks.\u00a0These sources of reflection are distributed across 96 countries around the world.\u00a0Among them, the United States accounted for 1\/4 of the world total.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/114.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1108\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/114-300x238.png\" alt=\"\" width=\"576\" height=\"457\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Distributed Memcached servers in China ranked second, accounting for 12.7%.\u00a0The share of provinces in China is as follows, Guangdong, Beijing and Zhejiang are TOP3.<\/p>\n<p style=\"text-align: left;\">The statistics of the NSFOCUS Network Threat Intelligence (NTI) show that there are 104,506 Memcached servers worldwide at risk of being utilized.\u00a0The distribution is as follows:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1112\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/5-300x150.jpg\" alt=\"\" width=\"602\" height=\"301\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><em>Source: NSFOCUS Threat Intelligence Center<\/em><\/p>\n<p style=\"text-align: left;\">Geographically, Memcached servers are the most available in the United States, followed by China.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/115.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1109\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/115-300x165.png\" alt=\"\" width=\"598\" height=\"329\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><em>Source: NSFOCUS Threat Intelligence Center<\/em><\/p>\n<p style=\"text-align: left;\">These active Memcached reflectors provide a powerful tool for building super volume DRDoS attacks.\u00a0If no counter measures are taken in time, the number of attacks based on Memcached is expected to continue to increase, with serious consequences.<\/p>\n<p style=\"text-align: left;\">2.3 How does Memcached form a DRDoS attack?<\/p>\n<p style=\"text-align: left;\">The construction of Memcached reflection attacks is divided into the following three steps:<\/p>\n<p style=\"text-align: left;\">1.Collect reflector IP<\/p>\n<p style=\"text-align: left;\">Find the open Memcached system through NTI \/ Shodan and other search engines and further obtain the system IP;<\/p>\n<p style=\"text-align: left;\">2. Configure the reflector<\/p>\n<p style=\"text-align: left;\">Make use of the open Memcached system as a reflector and modify the key-value configuration to achieve large storage capacity for the purpose of constructing a reflection amplification attack;<\/p>\n<p style=\"text-align: left;\">3.\u00a0Launch a refletion attack<\/p>\n<p style=\"text-align: left;\">The attacker fakes his IP address into the target address and sends a request to the Memcached reflector to read the information Memcached stored in the key-value.\u00a0Memcached responds to the forged source IP upon receipt of the request, creating a reflection.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/116.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1110\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/116-300x297.png\" alt=\"\" width=\"578\" height=\"573\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><em>Memcached Reflection Attack Diagram<\/em><\/p>\n<p style=\"text-align: left;\">When a large number of Memcacheds are utilized simultaneously and reply with the same forged source IP, a heavy traffic DRDoS attack against this forgery source IP(victim) is easily formed.<\/p>\n<p style=\"text-align: left;\">2.4 Memcached attack characteristics<\/p>\n<p style=\"text-align: left;\">DRDoS (Distributed Reflective Denial-of-Service) is one type of DDoS attacks.\u00a0NSFOCUS has featured in the DDoS Trend Report published in 2015, 2016 and 2017 (report download link\u00a0<a href=\"http:\/\/www.nsfocus.com.cn\/research\/report_3.html\">http:\/\/www.nsfocus.com.cn\/research\/report_3.html<\/a>\u00a0).\u00a0The report clearly points out the popularity and level of harm of reflection attacks through actual use cases and data statistics. The outbreak of Memcached reflection attacks further shows that the heat of DRDoS attacks will continue.<\/p>\n<p style=\"text-align: left;\">Prior to this, the major types of DRDoS security vendors detected were mainly SSDP reflection, DNS reflection, NTP reflection.\u00a0The following table (from US-Cert) lists the magnifications for various types of reflection attacks with more details:<\/p>\n<table class=\" alignleft\" width=\"660\">\n<tbody>\n<tr>\n<td width=\"122\"><strong>Protocol<\/strong><\/td>\n<td width=\"156\"><strong>Bandwidth Amplification Factor<\/strong><\/td>\n<td width=\"137\"><strong>Vulnerable Command<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"122\">DNS<\/td>\n<td width=\"156\">28 to 54<\/td>\n<td width=\"137\">see: TA13-088A [4]<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">NTP<\/td>\n<td width=\"156\">556.9<\/td>\n<td width=\"137\">see: TA14-013A [5]<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">SNMPv2<\/td>\n<td width=\"156\">6.3<\/td>\n<td width=\"137\">GetBulk request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">NetBIOS<\/td>\n<td width=\"156\">3.8<\/td>\n<td width=\"137\">Name resolution<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">SSDP<\/td>\n<td width=\"156\">30.8<\/td>\n<td width=\"137\">SEARCH request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">CharGEN<\/td>\n<td width=\"156\">358.8<\/td>\n<td width=\"137\">Character generation request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">QOTD<\/td>\n<td width=\"156\">140.3<\/td>\n<td width=\"137\">Quote request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">BitTorrent<\/td>\n<td width=\"156\">3.8<\/td>\n<td width=\"137\">File search<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">Kad<\/td>\n<td width=\"156\">16.3<\/td>\n<td width=\"137\">Peer list exchange<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">Quake Network Protocol<\/td>\n<td width=\"156\">63.9<\/td>\n<td width=\"137\">Server info exchange<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">Steam Protocol<\/td>\n<td width=\"156\">5.5<\/td>\n<td width=\"137\">Server info exchange<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">Multicast DNS (mDNS)<\/td>\n<td width=\"156\">2 to 10<\/td>\n<td width=\"137\">Unicast query<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">RIPv1<\/td>\n<td width=\"156\">131.24<\/td>\n<td width=\"137\">Malformed request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">Portmap (RPCbind)<\/td>\n<td width=\"156\">7 to 28<\/td>\n<td width=\"137\">Malformed request<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">LDAP<\/td>\n<td width=\"156\">46 to 55<\/td>\n<td width=\"137\">Malformed request [6]<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">CLDAP<\/td>\n<td width=\"156\">56 to 70<\/td>\n<td width=\"137\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"122\">TFTP<\/td>\n<td width=\"156\">60<\/td>\n<td width=\"137\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"122\"><strong>Memcache<\/strong><\/td>\n<td width=\"156\"><strong>10,000 to 51,000<\/strong><\/td>\n<td width=\"137\"><strong>&#8211;<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left;\">Memcached reflection attacks are much more damaging than just other reflection attacks in terms of magnification, and data provided by US-Cert show that it achieves an astonishing 51,000x magnification.<\/p>\n<p style=\"text-align: left;\">How does Memcached achieve this magnification while compared with other reflection attacks?\u00a0One of the important reasons is the key-value function of Memcached.\u00a0As mentioned earlier, the role of key-value is to determine the size of storage capacity, under normal circumstances the value of key-value is usually not more than a few kilobytes.\u00a0When Memcached is exploited by an attacker as a reflector, the value of key-value can be modified to more than 1 million bytes.<\/p>\n<p style=\"text-align: left;\">We replicated the whole process of the attack in our laboratory.<\/p>\n<p style=\"text-align: left;\">The first step, use the command to modify the key-value parameter on Memcached to raise the magnification.<\/p>\n<p style=\"text-align: left;\">send = &#8220;set t 0 900 1048501&#8221; + &#8220;\\ r \\ n&#8221; + &#8216;a&#8217; * 1048501 + &#8220;\\ r \\ n&#8221;<\/p>\n<p style=\"text-align: left;\">socket.sendall (send)<\/p>\n<p style=\"text-align: left;\">As tested, the maximum value of key-value is 1048501.<\/p>\n<p style=\"text-align: left;\">The second step through the get command to read Memcached storage information, and get back to the target IP.<\/p>\n<p style=\"text-align: left;\">get = &#8220;\\ x00 \\ x00 \\ x00 \\ x00 \\ x00 \\ x01 \\ x00 \\ x00get t \\ r \\ n&#8221;<\/p>\n<p style=\"text-align: left;\">socket.sendto (get, (host, 11211))<\/p>\n<p style=\"text-align: left;\">The formed attack message is as follows:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1114\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/8-300x111.jpg\" alt=\"\" width=\"597\" height=\"221\" \/><\/a><\/p>\n<p style=\"text-align: left;\">The minimum size of request packets that trigger a Memcached reflection attack is 15 bytes, including 8 bytes (RFC defined) + 3 bytes (get) +1 (space) + 1 byte minimum (key name) +2 byte (\\ r \\ n), however the request data returns 105 million bytes, in theory, can be enlarged by as close to as 70,000 times.\u00a0The powerfulness of the attack\u2019s amplification capability forms a sharp contrast with other types of DRDoS attacks.<\/p>\n<p style=\"text-align: left;\"><strong>3.Memcached DDoS Attack Defense Reinforcement Recommendations<\/strong><\/p>\n<p style=\"text-align: left;\">3.1 Memcached system self-examination recommendations<\/p>\n<p style=\"text-align: left;\">The formation of the attack provides us with a good sample of early warning, security products can detect the key-value configuration of the Memcached system before it is exploited as an attack source to intercept.\u00a0The detection process is as follows:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/118.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1111\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/118-300x297.png\" alt=\"\" width=\"552\" height=\"546\" \/><\/a><\/p>\n<p style=\"text-align: left;\">(1) Check the TCP or UDP packets whose destination port is 11211 (ensure that it is a Memcached server).<\/p>\n<p style=\"text-align: left;\">(2) Check whether the message comes with a \u201cset\u201d command (set the command format, see Appendix), if so (3), or end the test;<\/p>\n<p style=\"text-align: left;\">(3) Check whether the value of the bytes field (the 1048501 marked in the figure below) after the set command exceeds the threshold value. If yes, you can suspect that the packet is abnormal.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1115\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/10-300x110.jpg\" alt=\"\" width=\"570\" height=\"209\" \/><\/a><\/p>\n<p style=\"text-align: left;\">(4) After detecting this kind of unusual control message, we can take the following two actions:<\/p>\n<ol style=\"text-align: left;\">\n<li>Alert and monitor.\u00a0In order to prevent mistakes, it is recommended to monitor the flow changes behind the Memcached server to further determine whether the server is used as a reflector.<\/li>\n<li>Discard directly.\u00a0If there is sufficient evidence that the record was maliciously added, dropping directly ensures that the server is not being used as a reflector.<\/li>\n<\/ol>\n<p style=\"text-align: left;\">Self-examination example: Suppose the following is the data obtained from a sa public network Memcached server.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1116\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/11.jpg\" alt=\"\" width=\"192\" height=\"411\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Most of the time, the value \u200b\u200bis within 64K, but the last one reaches nearly 1M, with a significant difference from the others, basically we judge that there is a problem with the last record and that the server may have been exploited.<\/p>\n<p style=\"text-align: left;\">3.2 Memcached attack traffic cleaning<\/p>\n<p style=\"text-align: left;\">When facing such a large-scale threat of DDoS attacks, all network security nodes should enforce their defense and start with attack protection and outbound traffic cleaning to fully guarantee the security of infrastructure and business.\u00a0In response to this attack, we provide the following protection advice:<\/p>\n<ul style=\"text-align: left;\">\n<li>Operators<\/li>\n<\/ul>\n<p style=\"text-align: left;\">Operators and IDC are upstream of the network and possess strong bandwidth resources. They are the most immediate victims of attacks and the first level of protection.\u00a0Operators can flexibly control routing policies and protection policies for fast filtering.<\/p>\n<p style=\"text-align: left;\">1) Configure UDP access control rules on the border to block or limit the packets with source port 11211;<\/p>\n<p style=\"text-align: left;\">2) Configure BGP FlowSpec policy on the border to block or limit UDP traffic from source port 11211;<\/p>\n<p style=\"text-align: left;\">3) Use the DDoS protection device to block or throttle UDP traffic of source port 11211.<\/p>\n<ul style=\"text-align: left;\">\n<li>Enterprise Users<\/li>\n<\/ul>\n<p style=\"text-align: left;\">Enterprise users are usually close to the service terminals, familiar with the characteristics of their business traffic, making the policy configuration clearer and more flexible.<\/p>\n<p style=\"text-align: left;\">1) Large enterprise customers can adopt the same strategy with operators to configure UDP access control rules or BGP FlowSpec policies at the egress boundary device to block or rate UDP traffic with source port 11211;<\/p>\n<p style=\"text-align: left;\">2) An enterprise customer who does not have the export route configuration permission can configure a protection policy on devices such as anti-DDoS devices to block or rate UDP traffic whose source port is 11211;<\/p>\n<p style=\"text-align: left;\">3) Considering that the export bandwidth of an enterprise may be fully occupied, enterprise customers can perform a cleaning policy upstream through an operator or cloud cleaning service. The policy content also blocks or throttles UDP traffic with a source port of 11211.<\/p>\n<p style=\"text-align: left;\">3.3 Memcached system protection and reinforcement<\/p>\n<p style=\"text-align: left;\">For the users who are using Memcached system, we make the following suggestions in order to avoid being exploited by attackers, making Memcached the source of attacks, attacking traffic externally and affecting own system performance.<\/p>\n<p style=\"text-align: left;\">1) Configure a URPF policy on the border network device to filter outbound false source IP packets.<\/p>\n<p style=\"text-align: left;\">2) In-depth inspection before the Memcached system, directly filtering the over-large data packet in the third field of the set key 0 900 64000 in the message feature, so as to intercept the Memcached system before being modified to become the source of the attack;<\/p>\n<p style=\"text-align: left;\">3) Check Memcached service security to see if the Memcached service listens on the UDP port.\u00a0Find Memcached process to see if there is a -l parameter, if not, set it as default &#8211; 0.0.0.0.\u00a0If Memcached service does not need to listen to UDP, disable UDP.\u00a0Details refer to Memcached official documents:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/github.com\/memcached\/memcached\/wiki\/ConfiguringServer#udp\">https:\/\/github.com\/memcached\/memcached\/wiki\/ConfiguringServer#udp<\/a><\/p>\n<p style=\"text-align: left;\">Appendix<\/p>\n<p style=\"text-align: left;\">The basic syntax of the \u201cset\u201d command is as follows:<\/p>\n<p style=\"text-align: left;\">set key flags exptime bytes [noreply]<\/p>\n<p style=\"text-align: left;\">value<\/p>\n<p style=\"text-align: left;\">The parameters are as follows:<\/p>\n<p style=\"text-align: left;\">key: Key in the key-value structure used to find the cached value.<\/p>\n<p style=\"text-align: left;\">flags: An integer parameter that includes a key-value pair that clients use to store additional information about key-value pairs.<\/p>\n<p style=\"text-align: left;\">exptime: The length of time the key-value pair is stored in the cache (in seconds, 0 means forever)<\/p>\n<p style=\"text-align: left;\">bytes: The number of bytes stored in the cache<\/p>\n<p style=\"text-align: left;\">noreply (optional): This parameter tells the server no need to return data<\/p>\n<p style=\"text-align: left;\">value: stored value (always in the second line) (which can be directly understood as the key-value structure value)<\/p>\n<p style=\"text-align: left;\">\n","protected":false},"excerpt":{"rendered":"<p>Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack, which aroused the concern of all parties.\u00a0According to our monitoring, the peak traffic for this attack has now reached 1.35T.\u00a0On Feb. 27, Memcached&#8217;s reflection DDoS attacks ranged from hundreds of megabytes to a maximum of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,6],"tags":[],"class_list":["post-7644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS &amp; NSFOCUS Jointly Released - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS &amp; NSFOCUS Jointly Released - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-05T20:02:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS &amp; NSFOCUS Jointly Released - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack,\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Deep Analysis of Memcached Large DRDoS Attacks &#8211; China Telecom DamDDoS &#038; NSFOCUS Jointly Released\",\"datePublished\":\"2018-03-05T20:02:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/\"},\"wordCount\":1994,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/111-300x197-1.png\",\"articleSection\":[\"DDoS Mitigation\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/\",\"name\":\"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS & NSFOCUS Jointly Released - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/111-300x197-1.png\",\"datePublished\":\"2018-03-05T20:02:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/111-300x197-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/111-300x197-1.png\",\"width\":300,\"height\":197,\"caption\":\"Bar chart showing data from February to March.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deep Analysis of Memcached Large DRDoS Attacks &#8211; China Telecom DamDDoS &#038; NSFOCUS Jointly Released\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS & NSFOCUS Jointly Released - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS & NSFOCUS Jointly Released - NSFOCUS","og_description":"Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack,","og_url":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/","og_site_name":"NSFOCUS","article_published_time":"2018-03-05T20:02:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS & NSFOCUS Jointly Released - NSFOCUS","twitter_description":"Recently, many domestic and foreign security companies and agencies issued warnings about the Memcached Distributed Reflection Denial of Service attack,","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Deep Analysis of Memcached Large DRDoS Attacks &#8211; China Telecom DamDDoS &#038; NSFOCUS Jointly Released","datePublished":"2018-03-05T20:02:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/"},"wordCount":1994,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","articleSection":["DDoS Mitigation","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/","url":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/","name":"Deep Analysis of Memcached Large DRDoS Attacks - China Telecom DamDDoS & NSFOCUS Jointly Released - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","datePublished":"2018-03-05T20:02:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/03\/111-300x197-1.png","width":300,"height":197,"caption":"Bar chart showing data from February to March."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/deep-analysis-of-memcached-large-drdos-attacks-china-telecom-damddos-nsfocus-jointly-released\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Deep Analysis of Memcached Large DRDoS Attacks &#8211; China Telecom DamDDoS &#038; NSFOCUS Jointly Released"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7644"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35807"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}