Login

Register

Login

Register

#cybersecurity | hacker | Evolving DDoS security toward self-defending networks


A new era of
Distributed Denial of Service (DDoS) attacks has arrived. In 2018 DDoS attacks broke
the terabit barrier, and have become
even more frequent and sophisticated (or vicious) as they now commonly combine
several different attack techniques that vary — both in time and geographically
— to maximize impact.

Even the giants of
today’s platform economy, like Amazon, are not immune or safe. And, when the new generation of DDoS
attacks hit, telecom and cloud service providers, large digital enterprises and
their customers feel that impact as they are left without services, sometimes
for hours.

DDoS threats are no
longer just external either (i.e., coming from other networks). Due to the pervasiveness of IP technology as a
lingua franca for all communications today, any IP device able to reach other
IP destinations in the network can effectively become a threat factor.

The introduction of an
all-IP networking environment resulted in the super large “surface attack area”
(or expanded security perimeter, as experts call it). Expansion of the internet
of things (IoT) space, with millions of IoT devices now residing in our homes
and enterprises, sometimes with less-than-ideal security settings, serves as a
base for malicious players to explore in order to create botnets.

Botnets are an army
of remote-controlled devices, ready to serve their malicious operators in the
latest generation of DDoS attacks — dubbed command-and-control (C&C) attacks.
 DDoS threats are everywhere and can realize
themselves as “inbound” attacks, coming from the internet at large, or “outbound,”
coming from within service providers networks. These attacks not only put an
organization’s own networks, and the internet, in jeopardy, but also potentially
leave  service providers exposed
(legally) for the harm their users may bring to other users and networks.

But what can be done
about it?

Historically, security
professionals have relied on the use of dedicated hardware probes and Deep
Packet Inspection (DPI) technology to detect network anomalies that could be
the result of imminent DDoS attacks. From there, these anomalies would be
manually investigated, and traffic flows (typically identified by IP “quintuplets”
— i.e. their source IP address, destination IP address, source and destination
ports, and protocol type) would be subject to a number of router-based mitigation
strategies. These strategies encompassed blackholing (i.e. sending all “quintuplet”
traffic to unreachable network destinations), partial traffic filtering using
BGP Flowspec, and diversion of traffic to scrubbing centers (where the traffic
would be “cleaned” and sent back to the destination IP addresses). DPI
technology helped mitigate attacks initially but it does not scale economically
with the growth of multi-terabit networks.

While traffic scrubbing
showed to be the most effective of those three approaches, it has significant costs
due to the  backhauling of all traffic to
and from scrubbing centers, which adds to the overall latency and total cost of
ownership because of the exponentially rising traffic volumes (and a proportional
CAPEX increase of scrubbing center costs). All of these costs have made the scrubbing
approach not cost effective for the largest, volumetric DDoS attacks, and
therefore not fit for the future.

Luckily, a few
technological developments have come to the rescue.

First, networks
today are huge repositories of data, a fact formally recognized by the
International Telecommunications Union in their dedicated work on big
data-driven networking – seen as a foundation for future networks.

Secondly, IP routers
– elements that control, process, and forward all traffic as IP packets within
service providers’ networks and across the internet – have become much more
capable. As a result, they can generate real-time telemetry data about the
traffic they transport, and some have increased processing capabilities that
can be leveraged for security. The new generation of more capable routers can also
perform additional, on-the-fly “payload inspection,” in order to allow for more
precise DDoS detection (since DDoS traffic often contains very specific traffic
signatures for specific attacks).

Thirdly, real-time
network analytics has evolved to incorporate heuristics – or knowledge-based
algorithms to monitor the volume and composition of traffic protocols that are
most commonly used in DDoS attacks in order to detect anomalies in real-time,
triggering immediate actions and agile mitigation scenarios. Big data collected
from the network (e.g., flow-based information, BGP routing information,
streaming telemetry, mirrored traffic samples, etc.) can be processed in
real-time. This is due to increased processing capabilities of hardware
(servers), and because of the progress made in software engineering for
analytics platforms, where machine learning (ML) rules are enhancing the
process of DDoS detection and paving the way for future uses of artificial and augmented
intelligence.

Because of these
factors, it was ‘only logical’ to arrive at the next paradigm for DDoS security
— closed-loop automation for DDoS protection, which establishes a tight integration
between analytics and the network itself.

https://www.scmagazine.com/

Figure
1. Closed-loop automation for DDoS security between the analytics and the
network

In this approach,
real-time DDoS detection is made much faster and better by using larger data sets
and better DDoS intelligence. Mitigation becomes almost immediate as the
analytical platform can instruct routers in real-time (by applying ad-hoc or
permanent filters) to take corrective and mitigative actions, filtering out
only the malicious traffic without affecting the network or users.

As a result, service
providers can leverage advanced DDoS intelligence and analytics with intrinsic,
network-based capabilities to monitor, recognize and neutralize the most
complex and volume-intensive threats and attacks as they are happening, while
leaving their network and users intact and their services running.

Effectively, this approach
using network-based DDoS security is allowing unprecedented efficacy and 360-degree protection against
outbound and inbound network-level DDoS attacks and represents a major shift in
security automation towards the self-defending network.

And that’s good – in
the world in which DDoS attacks have become daily news, this future-proof
approach can now relegate it to the past.

By: Kevin Macaluso, VP & General Manager of Deepfield, Nokia



Original Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW