About
Subscribe

DDoS reality check: It can happen to you

What makes today's DDOS threats more dangerous is that multiple attack types are being used in conjunction with other attack threats, says John Paul Blaho, product marketing expert at Arbor Networks.

Johannesburg, 04 Dec 2015

The Distributed Denial of Service (DDOS) threat has changed to one where the attack types are more diverse and nefarious than before, says John Paul Blaho, product marketing expert at Arbor Networks.

What makes today's DDOS threats more dangerous than in the past is the fact that multiple attack types are being used in conjunction with other attack threats.

This approach is used by perpetrators to find security gaps on the network that can be exploited, and to exhaust the both the network and network resources, thereby acting as a smokescreen to deflect attention away from the nefarious activities happening behind that "screen". Basically, DDOS attacks are being used as part of a much larger attack campaign.

The majority of enterprises that have DDOS mitigation solutions in place rely on their network operations teams to manage and use these solutions, along with firewalls, routers, load balancers, and more. Back when Denial of Service (DOS) attacks were more of a nuisance, this defence strategy was effective, as its pure intent was to keep the network pipes running. Bear in mind that DOS attacks are more times than not used as a part of a larger security threat to the network and, as such, the network operation team does not have the capacity or capability to focus on the entire attack. This gap between network and security operations can very easily be exploited. Better alignment, if not a consolidation between these two teams should therefore be part of an organisation's overall security posture and improvement strategy.

The cost and risk analysis of an attack has changed: when organisations are dealing with more than a single attack vector, the reasoning and use cases of an attack become diverse, and the costs to mitigate and recover as well as the values assigned to the risk factors increase. At inception, DOS attacks were used as a way to prohibit access to a network. This caused outages and the inability to move product via the Web. Downtime was a company's single largest cost. In today's environment, however, the costs range from downtime, to damaged equipment, customer data, and even corporate IP.

Not only have the attack types changed and advanced over time, the use cases for "the network" are different. Just three years ago, most enterprises were experimenting with virtualisation and "some" cloud applications. Today, organisations have accelerated beyond cloud-based applications and are looking at software-defined networks (SDN) and network function virtualisation (NFV).

As organisations embrace these advancements, the new complexity and risk to the infrastructure these bring must be recognised. The faster organisations move towards technology adoption, the more pragmatic they must be when it comes to security posture. Namely, an organisation must accept the fact that it is increasing its risk, while it looks at technologies that address the most obvious and common attack tactics.

The reality of addressing security threats has not changed: this is a bad thing. That is, although the views have changed, the reality is that businesses are not making the shift to address the newer and greater threats. These threats are real, and organisations need to do something about it, but the reality is that they have not made the change, or have changed enough.

The reasons for this are varied and many. Unfortunately, without change, business sustainability is impossible. Network operations and security operations teams must learn to communicate and share their information and resources. Management must also face the fact that their teams will not be able to grow, as there is a predicted shortage of technologist skills in the coming years. Executives must accept the fact that they spend way too much on existing technologies and maintenance, and not enough on where it matters. The risks associated to old thinking are too high.

DDOS attacks are just one of many attack types that can cause irreparable harm to a brand and an organisation's revenue - making it necessary to change the approach to network security maturity. Don't make the mistake of assuming it'll "never happen to me".

Networks Unlimited, South Africa's leading value-added distributor, exclusively distributes Arbor products in southern Africa.

* Article first published on itweb.africa

Share

Arbor Networks

Arbor Networks helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDOS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualisation and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Its goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and reduce the risk to their business.

To learn more about Arbor products and services, please visit its Web site at arbornetworks.com. Arbor's research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Networks Unlimited

Networks Unlimited is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Arbor Networks, Arista, Aruba Networks, CensorNet, Centrify, Fortinet, F5, ProLabs, Riverbed, RSA, SimpliVity and Tintri. The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, WiFi-, mobile- and networking security, load balancing, data centre in-a-box, and storage for virtual machines.

Since its formation in 1994, Networks Unlimited has continually adapted to today's progressively competitive and evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the sub-Saharan Africa market.
www.nu.co.za

Editorial contacts

Lynne McCarthy
Networks Unlimited
(+27) 011 202 8400
lynne@nu.co.za