Infradata is a recognised leader and authority in DDoS protection solutions.
Any organisation that uses the Internet to conduct its core business runs the risk of loss of business, revenue and reputation if its systems are no longer available. DDoS attacks pose an ever-increasing threat to businesses that are reliant on the Internet for service availability. Some types of online business are more likely to suffer from such attacks than others. However, all will recognise that without some sort of DDoS protection service there is a risk that their business and its revenue will be compromised.
‘Distributed Denial of Service’, aka DDoS, attacks are attempts to make a computer or network device unavailable, or at least to disrupt its function or service. They are categorised as ‘distributed’ because the attacks aren’t generated by a single attack host, but distributed over several hosts, usually a so-called botnet.
Botnets consist of a large quantity of Internet-connected, often by malware-infected devices. A small piece of software on the infected computer will ‘call/phone home’ via reaching out to a central computer, operated by an attacker, often called a ‘command & control server’ (c&c server). It then keeps a list of all known infected computers and how to reach them. When an attack begins the c&c server will instruct these infected computers to send specific traffic to one or more hosts. Even if the individual machines have low performance and only limited bandwidth to the internet, the sheer volume of traffic and connections this aggregated number of machines can create - its attack force - can be immense.
There are three main categories of attack.
A state attack bombards the target with massive numbers of connection attempts and may try to keep them active. The target host and infrastructure cannot cope with such a large number of sessions, limits are reached, and it simply stops responding to requests, rendering it useless.
A volumetric attack sends extreme volumes of traffic in an attempt to completely saturate the target’s connections, effectively muscling out further legitimate traffic.
Sometimes other, often legitimate servers on the Internet are co-used for these types of attack. This is becoming an increasingly popular method of attack. In such cases special requests are sent to the target servers. It then uses specific functions to have the legitimate host send massive amounts of traffic back in response to what it believes is the requesting source, but it is in fact the attack destination. These are known as amplification or reflection attacks.
Application attacks identify weaknesses in applications and are used to either retrieve sensitive information, crash applications or abuse them for nefarious purposes such as gaining full access to the host on which the application resides or other hosts within the set-up.
For over ten years, attackers have been intelligently mixing multiple attack-types within one attack on a host, hosts or services. This is to keep the attack victim busy trying to defend against the most obvious attack methods while the real, less obvious attack, slips by and reaches its intended result. Introducing variations in specific attack streams over time is also becoming more common.
The entire attack and combination of methods used forms a so-called kill chain. These different attack types are also referred to as ‘attack vectors’, hence the newly popular term ‘multi-vector attacks’.
The reasons for DDoS attacks vary. Common motivations are political, corporate, criminal, social activism or even payback. The party wanting to attack a specific individual or organisation (the sponsor) is rarely the same as the party that actually conducts the DDoS attack. The sponsor typically pays an unrelated attacker to initiate and manage the attack.
Talk to Sales
Speak with an industry expert. Give us a call or leave a message. Our team is ready for your business.
Implications of DDoS attacks
DDoS attacks are unfortunately a fact of life, with the frequency, size and sophistication of attacks increasing each year. It is not unusual to see packet requests of between 2.4m and 7.5m per second. DDoS attacks can have serious implications for both service providers and enterprises.
From the victim’s perspective a DDoS attack can render their Internet connection or targeted host(s) useless within seconds, effectively disconnecting them from their customers, prospects and partners.
An online company’s business is all about being able to reliably and consistently deliver an increasing array and volume of content types to its users without any degradation to service quality.
DDoS Protection for High Performance Networks.
Organisations have multiple ways to defend their business and assets against DDoS attacks. Some of them choose an on-premise solution; some prefer the combination of an on-premise solution and a cloud-based anti-DDoS service, while others opt for the cloud service only. In combined set-ups, the on-premise protection is used for first attack mitigations, often in-line based, where it can ‘call for help’ from the cloud service in the case of a volumetric attack which is usually threshold-based and user-defined.
Nowadays multi-layered on-premise solutions exist as well, whereby more granular, quick in-line mitigation solutions can be deployed. When an attack occurs, the faster in-line solution can then ‘call for help’ from the on-premise solution to assist in mitigating the attack. Compared to commercial cloud solutions this can be more cost-effective and can be combined with cloud solutions if required.
It is important to realise that a sound solution involves a thorough review of the total set-up. The best anti-DDoS solution may still be ineffective if other weaknesses exist. Also, an effective set-up usually requires a multi-layered approach. This means implementing security best practices and using modern technologies such as Flowspec, intelligent use of external upstreams and the functionalities on offer, proper hardening of systems and services, eventual fallback or back-up setups and strategies, operational processes and more.
Solutions tailored to your industry.
Every customer has specific needs and requirements. This can be on a functional level, and the type of solution required is often specific to the type of organisation. Some deviations seen in practice:
Content Delivery Networks (CDNs) tend to have a detailed view of their traffic and manual programming of the anti-DDoS solution is accepted practice. Protection against volumetric and state attacks is of high importance and in-line solutions are usually preferred, often with cloud services.
Enterprise networks, depending on their size, tend to vary between either more comprehensive data centre protection or are focused on the full mix of data centre and office. Usually in-line solutions are preferred although some cases provide more efficiency when they are redirect based. Cloud services are relatively popular amongst larger organisations.
Service Provider Networks
Service provider (SP) networks usually require holistic solutions and are redirect based due to high or very high capacity. When hosting critical services within their own data centres or delivering connectivity for customer data centres, some SPs like to expand this with an additional layer of inline solutions in front of these deployments. Also, in some cases DDoS protection is offered as a paid or managed service.