Guarding Against DDoS Attacks

BY:

Nov 21, 2016

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix, GitHub, Twitter, the New York Times, and many others. Overloading Dyn with spurious domain name lookups kept it from responding to legitimate requests.

DDOS Attack

DDoS attacks have been around for a long time. The attacker gets control of a large number of machines and coordinates them to flood the target with data packets. 2016 saw attacks of unprecedented scope.

The reason is the Internet of Things. Smart devices perform simple tasks with the aid of an Internet connection. The owner can control them or get information from them remotely. Most of them have very poor security. They have default user names and passwords which are difficult to change. Some have their own Wi-Fi access points, without adequate security. Criminals use software such as the infamous “Mirai” to take control of these devices by the thousands and build botnets from them.

Traditional computer security measures provide little protection against these attacks. New approaches, designed to meet an attack of a million pinpricks, are necessary.

Monitoring traffic for changes from the normal pattern is the first line of defense. The more quickly you can detect an attack, the more quickly you can stop it. Specialized software can dynamically analyze traffic patterns and distinguish bogus from legitimate data packets, giving a quicker indication that an attack is under way.

Standard firewalls give very limited protection against DDoS attacks. A Web application firewall (WAF) provides more help by using application-specific rules to block malicious and malformed requests, but it won’t stand up against a heavy attack.

A cloud-based mitigation service is the strongest defense against serious DDoS attacks. The people running the service are specialists, and they constantly update their service as new forms of attack appear. These services have large amounts of reserve processing power and can put multiple machines on a single IP address. This extra capacity lets a site absorb a much larger amount of traffic without exceeding its capacity.

Website owners can never stand still. New threats develop and require new defenses.

Contact us at {email} to learn more about our services, or call {company} in {city} at {phone}.

Related Blogs

  • AWS Data Migration Services" alt="">
    Best Practices for Using AWS Data Migration Services for Your Cloud Migration

    Following these best practices can ensure a smooth data migration to the cloud Key Takeaways: Data migration is the most important element in a cloud-based digital transformation A well-planned data...

    Learn More
  • This image is a drawing of a man in a business suit with a large magnifying glass. He’s standing in front of a backdrop of a cityscape, and in front of him are a number of clouds; one of them is red, the others are white. This represents making a choice of cloud service providers." alt="">
    AWS and Beyond: The Cloud Service Providers Your Company Should Consider

    Cloud migration is a must for business today, here’s how to be sure you choose the right cloud services provider. Key Takeaways: It’s important for businesses to choose the right cloud service...

    Learn More
  • AWS ad on a subway station wall." alt="">
    3 Ways Businesses on AWS Can Extract Huge Benefits From the Overarching Amazon Ecosystem

    Being on AWS means you not only have the most widely adopted cloud service but also access to several tools that can be immensely valuable for your business Key Takeaways: AWS cloud service is part...

    Learn More