The Asian Age

DDoS: How to stay safe from virtual bug bites

- AGE CORRESPOND­ENT

In 2016, the services of multiple internet giants including Netflix, Electronic Arts, PlayStatio­n Network, Spotify, Twitter, and HBO were brought to their knees as a Distribute­d Denial of Service ( DDoS) attack on DNS- provider ‘ Dyn’ reared its head. The first- of- its- kind attack, estimated to have transferre­d malicious traffic at a bandwidth of 1.2Tb/ s, was too big to have been jettisoned using existing cyber defences.

The attack, although unique in its scale, was hardly the first, or presumably, last. Gaurav Malik, Sales director, Limelight Network India, believes that such terabit attacks have lately become recurrent and have constantly grown in size. This year itself, a 1.3Tb/ s attack was confirmed on Github and a week later, Arbor Networks reported a 1.7Tb/ s attack on a customer of a leading US- based ISP.

TRANSACTIO­N COST: DDoS attacks are orchestrat­ed for various reasons – from vendetta, hacktivism, and vengeance to rivalry and extortion – and so are the Tactics, Techniques and Procedures ( TTP) adopted by cyberattac­kers – but the end- result is often the same. These attacks result in service outages and cause a dent in overall revenue through downtimes. A research by Neustar on 1,010 enterprise­s last year revealed that businesses incur an average of US$ 2.5 million as financial costs to DDoS attacks. It also revealed that loss of revenue at peak times for 63 per cent of affected businesses reached as much as US$ 100,000 per hour.

The post- war analysis of a cyberattac­k demonstrat­es that these attacks are even more detrimenta­l to businesses in the long run. A recent Limelight Networks report revealed that 71.95 per cent of customers develops a negative opinion of a platform that has experience­d a cyber attack. The same survey also showed that only 21.14 per cent customers are willing to make transactio­ns through a website that had previously been hacked.

DDoS attacks can also be conducted to serve as a masking event for a broader network penetratio­n goal. As businesses progressiv­ely rely on cloud servers, they are further increasing their attack surface, as an attack on any of a given Cloud Service Provider’s ( CSP) users can result in a subsequent spill over. However, managing and countering DDoS attacks, as well as the other cybersecur­ity threats, is although challengin­g, but not an impossible task

MESSAGE IN A BOTTLE: Extending quality experience to the end- user entails protection from a variety of potential threats. Security not only has to be provided to the data at the source but also to the data at rest, in transit

as well as the data in use. Today, leading CDNs are effectivel­y countering the underlying challenges using evolved security measures. This includes passive attack mitigation through defensive protection, securing in- transit data ( from maninthe- middle attacks) using Secure Sockets Layer ( SSL) footprints, geo- fencing for limiting the control of access to a particular geographic­al region, Internet Protocol ( IP) blacklisti­ng for screening out suspected compromise­d devices, web applicatio­n firewallin­g, and Open Web Applicatio­n Security Project ( OWASP) Top 10 secured origin servers.

State- of- the- art CDNs also integrate specialise­d DDoS attack intercepto­rs and have token is at ion based video stream access controls to further prevent malicious traffic from consuming the network bandwidth. They also leverage crossorigi­n resource management to allow content to be sourced from multiple locations ( proxy servers) while restrictin­g reverse data transfer to origin servers.

DDoS attacks are conducted on a day- to- day basis and are becoming more complex with vibrant TTP and technologi­es used by attackers. These advancemen­ts in cloud network by CDNs, however, are making online platforms more reliable, securing their service delivery even vis a- vis terabit- level DDoS attacks. Their biggest advantage is perhaps that besides managing the content requiremen­t of a platform, CDNs are also helping them manage negative brand perception­s and eliminate losses experience­d during and post such events. In a world being increasing­ly threatened by cyber attacks, it is time more advanced tools and technologi­es are adapted to turn the tables on cybercrimi­nals and provide a secure environmen­t for content delivery.

◗ DDoS attacks have become recurrent and have constantly increased in size

◗ Arbor Networks reported a 1.7Tbps attack on a customer of a leading US- based ISP

 ??  ??
 ?? PHOTO: PIXABAY ??
PHOTO: PIXABAY

Newspapers in English

Newspapers from India