Guarding Against DDoS Attacks

BY:

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix, GitHub, Twitter, the New York Times, and many others. Overloading Dyn with spurious domain name lookups kept it from responding to legitimate requests.

DDOS Attack

DDoS attacks have been around for a long time. The attacker gets control of a large number of machines and coordinates them to flood the target with data packets. 2016 saw attacks of unprecedented scope.

The reason is the Internet of Things. Smart devices perform simple tasks with the aid of an Internet connection. The owner can control them or get information from them remotely. Most of them have very poor security. They have default user names and passwords which are difficult to change. Some have their own Wi-Fi access points, without adequate security. Criminals use software such as the infamous “Mirai” to take control of these devices by the thousands and build botnets from them.

Traditional computer security measures provide little protection against these attacks. New approaches, designed to meet an attack of a million pinpricks, are necessary.

Monitoring traffic for changes from the normal pattern is the first line of defense. The more quickly you can detect an attack, the more quickly you can stop it. Specialized software can dynamically analyze traffic patterns and distinguish bogus from legitimate data packets, giving a quicker indication that an attack is under way.

Standard firewalls give very limited protection against DDoS attacks. A Web application firewall (WAF) provides more help by using application-specific rules to block malicious and malformed requests, but it won’t stand up against a heavy attack.

A cloud-based mitigation service is the strongest defense against serious DDoS attacks. The people running the service are specialists, and they constantly update their service as new forms of attack appear. These services have large amounts of reserve processing power and can put multiple machines on a single IP address. This extra capacity lets a site absorb a much larger amount of traffic without exceeding its capacity.

Website owners can never stand still. New threats develop and require new defenses.

Contact us at {email} to learn more about our services, or call {company} in {city} at {phone}.

Related Blogs

  • An image depicting a cloud, its computing capabilities, and the power behind early-stage migration." alt="">
    Eliminating the Myths of Serverless Computing

    There are quite a few myths surrounding the topic of serverless computing, and although it may be a new concept to some, the benefits it provides are substantial to cost savings, increased agility,...

    Learn More
  • Overhead view of an architecturally designed white concrete park with markers placed in various locations." alt="">
    Benefits of Using a Serverless Architecture

    The benefits of a serverless architecture Serverless architecture is a type of cloud computing that enables development teams to get applications to market faster. Serverless means the server...

    Learn More
  • A migrate to cloud button" alt="">
    Five Reasons Why You Should Replace Data Centers with a Cloud

    Is abandoning your traditional data centers for the cloud worth it? The truth is that switching to cloud services has many advantages, including increased scalability, flexibility, and efficiency....

    Learn More