Subscribe
  • Home
  • /
  • Malware
  • /
  • Understanding the risk and cost of a DDOS attack

Understanding the risk and cost of a DDOS attack


Johannesburg, 23 May 2016

Today, more and more companies are outsourcing their online operations, such as Web sites, e-commerce, e-mail and domain name system (DNS), to focus on core business activities and lower costs. As a result, hosting providers are experiencing double-digit growth as they meet this mounting market demand.

Service-level commitments and customer expectations are also on the rise due to the business-critical nature of many hosting services. In particular, the highest-value customers have the lowest tolerance for outages.

As explained in the Arbor Networks' white paper, The business value of DDOS protections, a continuing and growing threat to service availability is distributed denial of service (DDOS) attacks. In fact, the paper states that most hosting providers experience DDOS attacks on a regular basis.

Bryan Hamman, territory manager for Sub-Saharan Africa at Arbor Networks, says: "DDOS attacks are a growing reality in Africa. As a supplier of superior DDOS defence systems we are able to show that an effective DDOS defence system can safeguard a business operating on the continent against DDOS-related outages. However, we have realised that for many businesses, determining the return on investment (ROI) of purchasing and deploying such a system remains challenging."

One needs to thus quantify both the risks of DDOS attacks and their financial consequences, and the white paper mentioned earlier provides a simple, step-by-step approach for evaluating whether an investment in a DDOS defence system is financially justified.

Adds Hamman: "Since Africa has seen an immense increase DDOS attacks during the past couple of months, the continent has become a main focus area for Arbor."

In its 11th Annual Worldwide Infrastructure Security Report (WISR), Arbor offers direct insights from the global operational security community on a comprehensive range of issues, from threat detection and incident response to staffing, budgets and partner relationships. The survey covers data from November 2014 through to November 2015. Highlights of the report reveal:

* A change in attack motivation: The top motivation was not hacktivism or vandalism but 'criminals demonstrating attack capabilities', something typically associated with cyber extortion attempts.
* Attack size continues to grow: The largest attack reported was 500 Gbps; with others reporting attacks of 450 Gbps, 425 Gbps and 337 Gbps. In 11 years of this survey, the largest attack size has grown more than 60X.
* Complex attacks are on the rise: 56% of respondents reported multi-vector attacks that targeted infrastructure, applications and services simultaneously, up from 42% last year. 93% reported application-layer DDOS attacks. The most common service targeted by application-layer attacks is now DNS (rather than HTTP).
* Cloud under attack: Two years ago, 19% of respondents saw attacks targeting their cloud-based services. This grew to 29% last year, and now to 33% this year - a clear upward trend. In fact, 51% of data centre operators saw DDOS attacks saturate their Internet connectivity. There was also a sharp increase in data centres seeing outbound attacks from servers within their networks, up to 34% from 24% last year.
* Firewalls continue to fail during DDOS attacks: More than half of enterprise respondents reported a firewall failure as a result of a DDOS attack, up from one-third a year earlier. As stateful and inline devices, firewalls add to the attack surface and are prone to becoming the first victims of DDOS attacks as their capacity to track connections is exhausted. Because they are inline, they can also add network latency.

"Hosting providers in particular often have a higher risk of DDOS attack than stand-alone online businesses because hosting providers in effect aggregate the risk of all their customers. An attack on one customer can affect others and potentially the entire hosting operation because of the heavy reliance on shared infrastructure. Risk is also a function of the type of customers being hosted. Sites that engage in controversial activity, as well as large, visible businesses, are more likely targets of DDOS than small business Web sites. However, just one small customer can attract a massive DDOS response with a single controversial act," quotes Hamman from The Business Value of DDOS Protection white paper.

The research also reveals that cost of outages due to DDOS attacks is comprised of operational costs and revenue impacts. It states that lower-impact/ duration attacks may only result in added operational costs. High-impact attacks will also negatively affect revenues due to customer defections, SLA credits and reputation damage. The paper lists the elements contributing to the overall cost of DDOS consisting of the following:

* Personnel time spent addressing and recovering from the outage;
* incremental help desk expenses;
* customer credits and refunds;
* cost of customer defections and nonrenewal of contracts; and
* degradation of reputation resulting in higher customer acquisition costs and a lower rate of business growth.

"We encourage organisations to contact us to determine the business impact a DDOS attack and the resultant outage of service will have on their business, as well as to calculate the ROI from a DDOS solution," says Hamman.

For more information about Arbor in Africa, please contact Hamman at bhamman@arbor.net

Share

Arbor Networks

Arbor Networks, the security division of NETSCOUT, helps secure the world's largest enterprise and service provider networks from DDOS attacks and advanced threats. Arbor is the world's leading provider of DDOS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualisation and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Its goal is to provide a richer picture into networks and more security context so customers can solve problems faster and reduce the risks to their business.

To learn more about Arbor products and services, please follow it on Twitter @ArborNetworks. Arbor's research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Editorial contacts