What exactly happened that enabled the enlistment of a zombie army of 100,000 IoT devices to attack Dyn on 10/21/2016.
There seems to be a lot of misunderstanding on what exactly happened, thus much of the advice that's given does not fit. I'll start by describing what a DDoS is exactly then get into specifics of this attack.
What changes did Dyn make after the attack to mitigate future attacks. What are some examples and patterns of DNS changes made by the companies affected? What are the strengths and weaknesses in their approaches? How is this relevent to you?
About Neil Anuskiewicz
Neil worked as Hostmaster for Pacifier Online Data Services (PODS) in the mid '90s. Since then he's worked for a non-profit organization and an Email Service Provider (ESP). In 2002, Neil published An Introduction to DNS and DNS Tools for the Linux Journal. This year, he wrote an article about email authentication, an aspect of security that many experts seem to overlook
Neil's long felt passionate about Open Source, even writing a political piece back when Microsoft posed an existential threat to open source.