DDoS

A10 Networks Launches Full Spectrum Cloud Scrubbing and On-premise Enterprise DDoS Protection Solution

Grazed from A10 Networks

A10 Networks, a Secure Application Services company, today announced the A10 DDoS Protection Cloud, powered by Verisign, and the A10 Thunder 1040 TPS appliance offering advanced on-premise protection. With the availability of the latest A10 DDoS protection solutions, A10 delivers full spectrum enterprise protection to detect and mitigate distributed denial of service (DDoS) attacks.

A10 Networks' hybrid approach to DDoS defenses combines surgical precision on-premise protection with orchestrated cloud scrubbing, delivered in form factors and subscription models that are cost effective. Smart, scalable solutions from A10 to assist with protection against harmful DDoS attacks, helping to ensure availability of enterprise business services while protecting legitimate users on the network.

Unlike other cloud-based DDoS protection services, A10 DDoS Protection Cloud, which is powered by Verisign's cloud-based DDoS Protection Service, is based on legitimate traffic, so enterprises do not pay for the amount of traffic that attacks apply against their network. Traffic diversions, or "swings," to the cloud service are optimized by the on-premise Thunder TPS appliances. The Thunder TPS appliance employs machine learning, traffic profiling and intelligent policy escalation in order to reduce disruption on-premise and alert A10 when redirection to the cloud may be necessary.

Cloud Computing: Complacency about DDoS attacks puts businesses at risk, survey shows

Grazed from ComputerWeekly.  Author:  Warwick Ashford.

Complacency about distributed denial of service (DDoS) attacks is putting businesses at risk, a survey has revealed.  Investment in specific DDoS protection is relatively low, according to a survey by F5 Networks at Infosecurity Europe 2015 in London.

Attention is turning to application data breaches, network attacks and malware, despite 60% of respondents saying they are worried about DDoS attacks and 39% admitting it is likely their organisation has already been targeted.  Similarly to advanced persistent threats (APTs), many DDoS attacks are starting to be characterised by long durations, repetition and changing attack vectors, according to a recent report by Imperva...

Cloud Denial of Service Protection

Grazed from CloudPatterns.org. Author: Editorial Staff.

Cloud denial of service (DoS) attacks are multifaceted and prevent consumers of cloud services from accessing their cloud resources. A cloud DoS protection service is incorporated into the security architecture to shield the cloud provider from DoS attacks. A network DoS protection service updates the domain name service (DNS) to route all cloud provider traffic through the protection service, which filters attack traffic and routes only legitimate traffic to the cloud provider. Alternately, the cloud provider can route traffic to a DoS protection service when experiencing an attack, or create their own DoS protection service.

There are three categories of DoS attacks: volume-based attacks, protocol attacks, and application layer attacks. A volume-based attack is when a DoS forces a cloud victim to use overwhelming amounts of network bandwidth. This causes unsupportable network usage, leaving the cloud services without network resources and causing non-responsiveness...

How free cloud services become free, currency-mining, DDoS-attacking botnets

Grazed from Gigaom. Author: Derrick Harris.

It’s no secret that the cloud has the potential to be a hacker’s paradise, chock-full of all the password-cracking computing power a trove of stolen credit cards can buy. Surely, though, this type of bad behavior can’t be carried out without any direct financial investment. After all, the free tiers on most cloud computing services are pretty minimal — a single core (probably fairly weak) and maybe a few gigabytes of storage. What can anyone do with that? A whole lot, if they’re clever.

At the Black Hat security conference this week, a pair of professional penetration testers, Rob Ragan and Oscar Salazar of Bishop Fox, showed how they built a functional 1,000-node botnet by stringing together resources from a variety of services. They used it to mine some Litecoin and could have done a whole lot more if they weren’t trying to minimize harm to other cloud users (by being noisy neighbors) or cloud providers (by driving up power bills)...

Five DDos Security Issues in Cloud Computing

Grazed from Decoded.  Author: Julie Sinclair.

The need for reliable operations and secure access increase as companies migrate to cloud technologies. Defending your applications from distributed-denial-of-service (DDoS) attacks is a top area of concern for your business. Before moving your company’s important data to a cloud service provider, implement a plan to deal with DDoS threats. When designing your DDoS plan for your business, understand how your cloud service provider protects your data.

Five Top Security Issues

1. Securing a new perimeter:

Moving your data to cloud technologies means your data is distributed to multiple data centers. How can you effectively create a new security perimeter for your company and protect your data from attacks? Understand what tools your cloud provider uses to protect your data against DDoS attacks. Check the comprehensive detection tools your cloud provider uses for detection of DDoS attacks. Understand the inline deployment used for examining all inbound and outbound traffic for DDoS attacks...

NSA Website Attacked, Knocked Offline

Grazed from NewsFactor.  Author: David Holmes.

The U.S. National Security Agency's website, nsa.gov, was knocked offline Friday afternoon, and as of Friday evening, it was still unavailable. Only a browser message indicating that the serverwas not responding appeared.

Sources quoted by various news agencies have speculated that the site has apparently fallen victim to a DDoS (distributed denial-of-service) attack, and that it was believed that the hacker group Anonymous would claim responsibility. However, as of the time of publication of this report, the group has not claimed responsibility...

Google offers DDoS defenses to human rights, elections websites

Grazed from ITWorld. Author: Jeremy Kirk.

Google is lending its vast infrastructure to websites that may be targeted by distributed denial-of-service (DDoS) attacks because of their content. The program, called "Project Shield," is invite-only and accepting applications from websites dealing with news, human rights or election-related content.

Those accepted will benefit from Google's DDoS defenses, which help repel barrages of traffic designed to cause websites to stop responding. DDoS attacks are an effective, low-cost way to disrupt companies and organizations. The attacks are difficult to counter even for well-resourced organizations that can afford separate security services specializing in DDoS mitigation...

Layer 7 DDoS Attacks on Sharp Rise—BYOD Makes Matters Worse

Grazed from PRWeb.  Author: PR Announcement.

With Internet connectivity and mobile devices becoming ubiquitous and cloud computing and big data continuing to advance in leaps and bounds, "online activity" has come to mean so much more than just sitting at a desk clicking through hyperlinks. In this new age of personal computing, enterprises must understand the risks and threats they face.

Nexusguard Information Security Manager Ronald Pong's talk in an Information Security Showcase 2013 seminar—The Impact of DDoS in Corporate Cloud with "Bring Your Own Device" Environment— highlights the implications of "Bring Your Own Device" (BYOD) in corporate environments...

As cloud use grows, so will rate of DDoS attacks

Grazed from InfoWorld. Author: David Linthicum.

The eighth annual Worldwide Infrastructure Security Report, from security provider Arbor Networks, reveals how both cloud service providers and traditional data centers are under attack. The report examined a 12-month period and asked 200 security-based questions of 130 enterprise and network operations professionals. The key findings follow:

  • 94 percent of data center managers reported some type of security attacks
  • 76 percent had to deal with distributed denial-of-service (DDoS) attacks on their customers
  • 43 percent had partial or total infrastructure outages due to DDoS
  • 14 percent had to deal with attacks targeting a cloud service

The report concluded that cloud services are very tempting for DDoS attackers, who now focus mainly on private data centers. It's safe to assume that, as more cloud services come into use, DDoS attacks on them will become more commonplace...

NIST: Use Cloud to Repel DDoS Attacks

Grazed from BankInfoSecurity. Author: Eric Chabrow.

Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST's Matthew Scholl.

By using cloud computing services, Scholl says in an interview with Information Security Media Group, enterprises no longer are completely dependent on their own physical infrastructure because they can add processing capabilities from the cloud to keep up with DDoS attacks...