Short, frequent, low-volume DDoS attacks continue to dominate

Stephanie Weagle, VP, Corero Network Security

Service providers, hosting providers and digital enterprises are all impacted by DDoS attacks. But besides the headline-grabbing volumetric attacks, another more sinister DDoS method lies in the shadows.

Typically, less than 10Gbps in volume and less than 10 minutes in duration, sub-saturating DDoS attacks are capable of knocking a firewall or intrusion prevention system (IPS) offline so that hackers can target, map and infiltrate a network to install malware and engage data exfiltration activity. These hidden motives have led Corero to describe this type of attack as “Trojan Horse” DDoS, says Stephanie Weagle, VP, Corero Network Security.

What’s changed?

Today’s DDoS attacks are almost unrecognisable from the early days of attacks, when most were simple, volumetric attacks intended to cause embarrassment and brief disruption. Increasingly in recent months, we’ve seen a shift in the duration and volume of DDoS attacks.

Despite a few massive, high-volume DDoS attacks over the course of the last year, our latest DDoS trends and analysis report found that the majority (98%) of DDoS attacks against Corero customers during Q1 2017 were less than 10 Gbps per second in volume and lasted 10 minutes or less. But don’t be fooled – though these attacks may be small, they can still cause considerable damage to your network.

Rather than showing their capabilities in full view, through large, volumetric DDoS attacks that cripple a website, using short attacks allows bad actors to test for vulnerabilities within a network and monitor the success of new methods without being detected.

Most cloud-based scrubbing solutions will not detect DDoS attacks of less than 10 minutes in duration, so the damage is done before the attack can even be reported. As a result, the raft of sub-saturating attacks observed at the beginning of this year could represent a testing phase, as hackers experiment with new techniques before deploying them at an industrial scale. To ignore these attacks is to effectively leave your door wide open for a more serious malware or ransomware attack, data theft or more serious network intrusion.

The role of the Internet Service Providers (ISPs)

For a long time, ISPs have carried the burden of defending their own networks from threats. However, as the threat landscape has changed, so must their approach. Rather than relying on outdated tools that only defend against the early types of DDoS attacks, ISPs need to modernise their security service offering by taking advantage of real-time DDoS mitigation through emerging and proven deployment models.

It is only by having complete visibility over the network, and the ability to detect and respond to network incursions in real-time, that ISPs can prevent attacks on their networks.

After all, there is a valuable business benefit for ISPs to position themselves as leading the charge against DDoS attacks, both in protecting their own networks and enabling them to offer more comprehensive solutions to their customers as a paid-for, managed service.

ISPs are moving towards a more expansive network architecture, distributed to provide services targeted at specific subscribers. Thus, the opportunity to provide sophisticated DDoS protection to their customers as a service could open up a valuable new revenue stream as well as building on customer loyalty.

Conclusion

These powerful, short duration attacks should not be underestimated. They can impact service availability, cause outages, or act as a smoke screen for other types of cyber-attacks. Thus, it is critical that Internet Service Providers and carriers take proactive measures to eliminate the effects of DDoS attacks.

Effective mitigation solutions must take effect instantly and automatically. Waiting tens of minutes or longer for on-demand scrubbing operations to kick in, or human intervention, could prove to be a costly mistake.

The author of this blog is Stephanie Weagle, VP, Corero Network Security

Comment on this article below or via Twitter: @IoTNow OR @jcIoTnow

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more