5 DDoS Myths Debunked

1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 DDoS Myths Debunked-3 Next

DDoS Evolution

Myth: There was a DDoS attack problem, but it has been fixed.

Fact: Yes, this may be true. DDoS is not a new problem and many organizations have some form of protection in place. What many organizations fail to recognize is that the modern-day DDoS attack is much more complicated than the simple flooding attacks from years ago.

The modern day DDoS attack uses a dynamic combination of volumetric, TCP-state exhaustion and application-layer attack vectors. Industry best practices recommend that for the most comprehensive protection, a hybrid/layered approach is required. That is, 1) stop large volumetric attacks in the cloud, 2) stop smaller, stealthier application-layer attacks on premises, and 3) have an intelligent form of communication between these two mitigation methods to deal with the dynamic nature of multi-vector DDoS attacks.

In many cases, the old methods of DDoS attack protection (i.e., ISP or firewalls) simply are not adequate to protect the modern day DDoS attack. In fact, more than half of enterprises reported a firewall failure as a result of a DDoS attack, up from one-third from a year earlier, according to the 11th annual Arbor Worldwide Infrastructure Security Report (WISR).

Another disturbing trend is how DDoS attacks are being used as smokescreens or diversionary tactics to cover up other malicious activity such as fraudulent wire transfers or exfiltration of confidential data. The point is, don't think of a DDoS attack as a one-off, independent event, but potentially part of a well-organized threat campaign against your organization.

Enterprises and service providers worldwide, across every industry, face a never-ending deluge of distributed denial-of-service (DDoS) attacks that continue to rise in size, frequency and complexity. Unfortunately, not all companies realize the danger that DDoS attacks pose, or have insight into their own risk profile. The bottom line is that you first need to understand the facts about both in order to determine the right amount of insurance and risk you're willing to live with. In an effort to shed more light on these issues, Tom Bienkowski of Arbor Networks has outlined the five most common DDoS myths that he's heard from customers and prospects in the field.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.