Tech Junky
Part of the Furniture
Seems to only mention Mikrotik but, in essence is you leave ports open for legacy protocols you can be hijacked for a DDOS.If you're using Mikrotik be aware:
DROP / REJECT ALL and permit what you need as needed.