5 DDoS Myths Debunked

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 DDoS Myths Debunked-3 Next

DDoS Evolution

Myth: There was a DDoS attack problem, but it has been fixed.

Fact: Yes, this may be true. DDoS is not a new problem and many organizations have some form of protection in place. What many organizations fail to recognize is that the modern-day DDoS attack is much more complicated than the simple flooding attacks from years ago.

The modern day DDoS attack uses a dynamic combination of volumetric, TCP-state exhaustion and application-layer attack vectors. Industry best practices recommend that for the most comprehensive protection, a hybrid/layered approach is required. That is, 1) stop large volumetric attacks in the cloud, 2) stop smaller, stealthier application-layer attacks on premises, and 3) have an intelligent form of communication between these two mitigation methods to deal with the dynamic nature of multi-vector DDoS attacks.

In many cases, the old methods of DDoS attack protection (i.e., ISP or firewalls) simply are not adequate to protect the modern day DDoS attack. In fact, more than half of enterprises reported a firewall failure as a result of a DDoS attack, up from one-third from a year earlier, according to the 11th annual Arbor Worldwide Infrastructure Security Report (WISR).

Another disturbing trend is how DDoS attacks are being used as smokescreens or diversionary tactics to cover up other malicious activity such as fraudulent wire transfers or exfiltration of confidential data. The point is, don't think of a DDoS attack as a one-off, independent event, but potentially part of a well-organized threat campaign against your organization.

Enterprises and service providers worldwide, across every industry, face a never-ending deluge of distributed denial-of-service (DDoS) attacks that continue to rise in size, frequency and complexity. Unfortunately, not all companies realize the danger that DDoS attacks pose, or have insight into their own risk profile. The bottom line is that you first need to understand the facts about both in order to determine the right amount of insurance and risk you're willing to live with. In an effort to shed more light on these issues, Tom Bienkowski of Arbor Networks has outlined the five most common DDoS myths that he's heard from customers and prospects in the field.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.