Guarding Against DDoS Attacks

BY:

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix, GitHub, Twitter, the New York Times, and many others. Overloading Dyn with spurious domain name lookups kept it from responding to legitimate requests.

DDOS Attack

DDoS attacks have been around for a long time. The attacker gets control of a large number of machines and coordinates them to flood the target with data packets. 2016 saw attacks of unprecedented scope.

The reason is the Internet of Things. Smart devices perform simple tasks with the aid of an Internet connection. The owner can control them or get information from them remotely. Most of them have very poor security. They have default user names and passwords which are difficult to change. Some have their own Wi-Fi access points, without adequate security. Criminals use software such as the infamous “Mirai” to take control of these devices by the thousands and build botnets from them.

Traditional computer security measures provide little protection against these attacks. New approaches, designed to meet an attack of a million pinpricks, are necessary.

Monitoring traffic for changes from the normal pattern is the first line of defense. The more quickly you can detect an attack, the more quickly you can stop it. Specialized software can dynamically analyze traffic patterns and distinguish bogus from legitimate data packets, giving a quicker indication that an attack is under way.

Standard firewalls give very limited protection against DDoS attacks. A Web application firewall (WAF) provides more help by using application-specific rules to block malicious and malformed requests, but it won’t stand up against a heavy attack.

A cloud-based mitigation service is the strongest defense against serious DDoS attacks. The people running the service are specialists, and they constantly update their service as new forms of attack appear. These services have large amounts of reserve processing power and can put multiple machines on a single IP address. This extra capacity lets a site absorb a much larger amount of traffic without exceeding its capacity.

Website owners can never stand still. New threats develop and require new defenses.

Contact us at {email} to learn more about our services, or call {company} in {city} at {phone}.

Related Blogs

  • AI-Driven Customer Service Chatbots: Enhancing Customer Experience & Business Efficiency

    What’s All the Fuss about AI-Driven Customer Service Chatbots? Using AI technology, customers can interact with chatbots via phone, email, text, or social media. AI-driven chatbots offer answers to...

    Learn More
  • Elevating Customer Experiences: Unleashing AWS Conversational AI in Contact Centers

    Learn what Conversational AI is and how you can benefit from it. Traditional first-tier customer service support has moved to AI. Why? Because AI offers conversational interfaces that act and...

    Learn More
  • Artificial Intelligence and Multi-Channel Contact Centers: The Future of Customer Service

    AI Innovation and Multichannel Contact Centers  Multi-channel contact centers offer better service by allowing customers to choose their communication preferences. Customers are no longer forced to...

    Learn More