Given that Distributed Denial of Service (DDoS) attacks are becoming more frequent, it is a good time to review the basics and how you can fight back.
A DDoS is an attack method used to deny access for legitimate users of an online service. Â This service could be a bank or e-commerce website, a SaaS application, or any other type of network service. Some attacks even target VoIP infrastructure.
An attacker uses a non-trivial amount of computing resources, which they either built themselves or, more commonly, by compromising vulnerable PC’s around the world, to send bogus traffic to a site. Â Â If the attacker sends enough traffic, legitimate users of a site can’t be serviced.
For example, if a bank website can handle 10 people a second clicking the Login button, an attacker only has to send 10 fake requests per second to make it so no legitimate users can login. Â There are a multitude of reasons someone might want to shut a site down: extortion, activism, competitive brand damage, and just plain old boredom.
DDoS attacks vary in both sophistication and size. Â An attacker can make a fake request look like random garbage on the network, or more troublesome, make the attack traffic look exactly like real web traffic. Â In addition, if the attacker has enough computing resources at their disposal, they can direct enough traffic to overwhelm the targetâ€™s bandwidth.
The simplest types of attacks are Layer 3 and 4 attacks (IP and UDP/TCP in the OSI stack). Â These simply flood the network and servers such that they can no longer process legitimate network traffic because the attacks have saturated the network connectivity of the target. Â A more complex Layer 7 attack â€œsimulatesâ€ a real user trying to use a web application by searching for content on the site or clicking the â€œadd to cartâ€ button.
There are four main types of protection from DDoS attacks:
* Do It Yourself. Â This is the simplest and least effective method. Â Generally someone writes some Python scripts that try to filter out the bad traffic or an enterprise will try and use its existing firewalls to block the traffic. Â Back in the early 2000s, when attacks were pretty simple, this could work. But these days, attacks are far too large and complex for this type of protection. Â A firewall will melt quite quickly under the load of even a trivial attack
* Specialized On-Premises Equipment. This is similar to â€œDo It Yourselfâ€ in that an enterprise is doing all the work to stop the attack, but instead of relying on scripts or an existing firewall, they purchase and deploy dedicated DDoS mitigation appliances. Â These are specialized hardware that sit in an enterpriseâ€™s data center in front of the normal servers and routers and are specifically built to detect and filter the malicious traffic. Â However, there are some fundamental problems with these devices:
â€¢ They are costly CAPEX purchases that may sit around and do nothing until you get attacked. Â They also can be expensive to operate. Â You need skilled network and security engineers to work these devices – there is no magic â€œmitigate DDoSâ€ button.
â€¢ They must be constantly updated by the operations team to keep up to date with the latest threats. Â DDoS tactics change almost daily. Â Your team must be prepared to update these devices to the latest threats.
â€¢ They canâ€™t handle volumetric attacks. Â Â Â Â Itâ€™s unlikely that an enterprise would have enough bandwidth coming in to handle the very large DDoS attacks occurring today. These hardware appliances donâ€™t do any good when the attack exceeds network capacity.
* Internet Service Provider (ISP). Some enterprises use their ISP to provide DDoS mitigation. Â These ISPâ€™s have more bandwidth than an enterprise would, which can help with the large volumetric attacks, but there are three key problems with these services as well:
â€¢ Lack of core competency: ISPâ€™s are in the business of selling bandwidth and donâ€™t always invest in the required capital and resources to stay ahead of the latest DDoS threats. Â It can become a cost center to them – something they have to provide, so they do it as cheaply as possible.
â€¢ Single provider protection: Â Most enterprises today are multi-homed across two or more network providers to remove the single point of failure of a provider. Â Having two providers is a best practice to maximize uptime. Â ISP DDoS mitigation solutions only protect their network links, not the other links you might have, so now you need DDoS mitigation services from different providers, doubling your cost.
â€¢ No cloud protection: Â Similar to the above, a lot of Web applications these days are split between enterprise-owned data centers, and cloud services like Amazon AWS, GoGrid, Rackspace, etc. Â ISPâ€™s canâ€™t protect traffic on these cloud services.
* Cloud Mitigation Provider. Â Cloud mitigation providers are experts at providing DDoS mitigation from the cloud. Â This means they have built out massive amounts of network bandwidth and DDoS mitigation capacity at multiple sites around the Internet that can take in any type of network traffic, whether you use multiple ISPâ€™s, your own data center or any number of cloud providers. They can scrub the traffic for you and only send â€œcleanâ€ traffic to your data center.
Cloud mitigation providers have the following benefits:
â€¢ Expertise: Â Generally, these providers have network and security engineers and researchers who are monitoring for the latest DDoS tactics to better protect their customers.
â€¢ Lots of bandwidth: These providers have much more bandwidth than an enterprise could provision on its own to stop the biggest volumetric attacks.
â€¢ Multiple types of DDoS mitigation hardware: Â DDoS attacks are extremely complex. There is a need for multiple layers of filtering to be able to keep up with the latest threats. Â Cloud providers should take advantage of multiple technologies, both commercial off the shelf (COTS) and their own proprietary technology to defend against attacks
Cloud mitigation providers are the logical choice for enterprises for their DDoS protection needs. Â They are the most cost effective and scalable solution to keep up with the rapid advances in DDoS attacker tools and techniques.