The Crumbling Front Line of Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Previous The Crumbling Front Line of Security-1 Next

Click through for results from an infrastructure security survey conducted by Arbor Networks.

As more bandwidth becomes generally available, network operators are realizing that fatter pipes are a double-edged sword.

A new security survey of 111 network operators conducted by Arbor Networks, a provider of security and monitoring tools for network operators, finds that there has been an over 100 percent increase in distributed denial of service (DDoS) attacks and that for the first time those attacks have exceeded the 100 gigabit-per-second barrier.

According to Paul Scanlon, a solutions architect for Arbor Networks, this increase in both the frequency and size of DDoS attacks means that cybercriminals are relying on brute-force tactics more than ever. However, those attacks are now accompanied by more subtle threats aimed at collecting data from specific files to create a blended attack vector that combines brute force with targeted attacks.

Those brute-force attacks, aimed primarily at DNS servers and HTTP traffic, are overwhelming firewalls and intrusion prevention systems, with 49 percent attributing a firewall or intrusion prevention system (IPS) directly to a DDoS attack.

Scanlon says the study shows that IT organizations of all sizes are going to need more robust security infrastructure just to keep pace with the amount of bandwidth that is available to enable a DDoS attack.

But that could be problematic; as IP4 addresses increasingly become exhausted, networks will rely more on IP6 addresses that could introduce potential security concerns. That’s also especially problematic because 60 percent of the network operators said they have no visibility into the packets on their networks.

In short, if network operators represent the front line of our collective security, the line is getting dangerously close to giving way.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.