Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge

Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own handsDistributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world. As protections have evolved, the technology used by hackers has adapted and become much more sophisticated. New attack types now target applications and services, and oftentimes, they’re masked in bulk layer 3 and 4 DDoS events, making it difficult to detect them.

The financial services industry is one of the largest targets of cyber criminals for DDoS attacks, followed closely by the government sector. Besides disrupting Internet operations through a brute-force data onslaught, DDoS attacks have recently been used to hide more sophisticated attempts to break into financial and e-commerce information. These attacks often have the intent of disrupting operations mostly through the destruction of access to information.

There are generally three categories of motivations behind DDoS attacks: political, retaliatory and financial. Political attackers target those who disagree with their political, social or religious beliefs. When a botnet gets shut down or a major cyber-crime ring is busted, it can trigger retaliatory attacks against those who aided or assisted the authorities. Financially-motivated attacks are a payto- play scheme, where hackers are compensated by a third-party to conduct the attack on their behalf. With each motivation, the results are the same—your network and online services are down, and can remain down for an extended period of time.

Watch Out for Advanced Application Layer DDoS Attacks

There are many kinds of DDoS attacks that are widely used today, including older methods from the early days of the Internet to the latest advanced layer 7 attacks that target application services. SYN flood and HTTP GET floods are the most common and are used to overwhelm network connections or overload servers behind firewalls and intrusion protection services (IPS).

More worrisome, however, is that application layer attacks use far more sophisticated mechanisms to attack organizations’ networks and services. Rather than simply flooding a network with traffic or sessions, these attack types target specific applications and services to slowly exhaust resources at the application level.

Application layer attacks can be effective using small traffic volumes and may appear to be completely normal to most traditional DDoS detection methods. This makes them harder to detect than basic types of DDoS attacks.

DDoS Protection Options

Most ISPs offer layer 3 and 4 DDoS protection to keep organizations’ links from becoming flooded during bulk, volumetric events; however, they don’t have the capability to detect the much smaller layer- 7-based attacks. Data centers should not rely on their ISP alone to provide a complete DDoS solution that includes application layer protection. Instead, they should consider putting in place one of the following measures:

DDoS service providers. There are many hosted, cloud-based DDoS solutions that provide layer 3, 4 and 7 mitigation services. These can range from inexpensive plans for small websites to large-scale enterprise plans that can cover multiple sites. They’re usually very easy to set up and heavily advertised to small and mid-sized organizations. Most offer customized pricing options and many have advanced layer 7 detection services for large organizations that require sensors to be installed in the data center.

Although many companies opt to go this route, some experience unpredictable and significant overage charges when they’re hit with high-volume DDoS attacks. Performance also may not be up to their expectations as the service providers redirect DDoS traffic to mitigation centers, instead of stopping it in real time. This is especially problematic for short duration attacks typically encountered.

Firewall or IPS. Almost every modern firewall and intrusion protection system (IPS) claims some level of DDoS defense. Advanced, next-generation firewalls (NGFWs) offer DDoS and IPS services that can mitigate many DDoS attacks. Having one device for firewall, IPS and DDoS is easier to manage, but one device may be overwhelmed with volumetric DDoS attacks and it may not have the sophisticated layer 7 detection mechanisms other solutions offer.

Another trade-off is that enabling DDoS protection on the firewall or IPS may impact the overall performance of a single device, resulting in reduced throughputs and increased latency for end users.

Dedicated DDoS attack mitigation appliances. These are dedicated, hardwarebased devices that are deployed in a data center, used to detect and stop basic (layer 3 and 4) and advanced (layer 7) DDoS attacks. Deployed at the primary entry point for all web-based traffic, they can both block bulk volumetric attacks and monitor all traffic coming in and leaving the network to detect suspicious patterns of layer 7 threats.

By using a dedicated device, expenses are predictable, as the cost is fixed whether an organization suffers from one attack in six months or is attacked every day. The trade-offs are: These devices are an additional piece of hardware to manage; lower-bandwidth units can be overwhelmed during bulk-volumetric attacks; and many manufacturers require frequent signature updates.

Dedicated hardware-based DDoS attack mitigation solutions come in two primary versions: Carrier and Enterprise. Carrier versions are large, expensive solutions designed for global ISP networks. Most organizations that want to protect their private data centers usually look at the Enterprise models to provide costeffective, DDoS detection and mitigation. Today’s models provide capacities that can handle large-scale, volumetric attacks for 100 percent layer 3, 4 and 7 protection or can be used to supplement basic, ISP-based, bulk DDoS protection with advanced layer 7 detection and mitigation. Although these devices require an up-front investment, compared to hosted solutions, they are generally much less expensive in the long run when overage charges are factored in with the total cost.

Enterprises should look for DDoS attack mitigation appliances that use adaptive, behavior-based methods to identify threats. Such appliances learn baselines of normal application activity and then monitor traffic against them. This adaptive/ learning approach has the advantage of protecting users from unknown zeroday attacks as the device doesn’t need to wait for signature files to be updated.

DDoS attacks are on the rise for almost any organization, large or small. The potential threats and volumes are increasing as more devices, including mobile handsets, join the Internet. If your organization has a web property, the likelihood of getting attacked has never been higher.

The evolving nature of DDoS attacks means that enterprises can no longer depend solely on their ISP for protection. Organizations must start making shifts now that give them greater foresight and more proactive defenses for network and application-level services.

This article originally appeared in the August 2014 issue of Security Today.

Featured

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3