Guarding Against DDoS Attacks

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix, GitHub, Twitter, the New York Times, and many others. Overloading Dyn with spurious domain name lookups kept it from responding to legitimate requests.

DDOS Attack

DDoS attacks have been around for a long time. The attacker gets control of a large number of machines and coordinates them to flood the target with data packets. 2016 saw attacks of unprecedented scope.

The reason is the Internet of Things. Smart devices perform simple tasks with the aid of an Internet connection. The owner can control them or get information from them remotely. Most of them have very poor security. They have default user names and passwords which are difficult to change. Some have their own Wi-Fi access points, without adequate security. Criminals use software such as the infamous “Mirai” to take control of these devices by the thousands and build botnets from them.

Traditional computer security measures provide little protection against these attacks. New approaches, designed to meet an attack of a million pinpricks, are necessary.

Monitoring traffic for changes from the normal pattern is the first line of defense. The more quickly you can detect an attack, the more quickly you can stop it. Specialized software can dynamically analyze traffic patterns and distinguish bogus from legitimate data packets, giving a quicker indication that an attack is under way.

Standard firewalls give very limited protection against DDoS attacks. A Web application firewall (WAF) provides more help by using application-specific rules to block malicious and malformed requests, but it won’t stand up against a heavy attack.

A cloud-based mitigation service is the strongest defense against serious DDoS attacks. The people running the service are specialists, and they constantly update their service as new forms of attack appear. These services have large amounts of reserve processing power and can put multiple machines on a single IP address. This extra capacity lets a site absorb a much larger amount of traffic without exceeding its capacity.

Website owners can never stand still. New threats develop and require new defenses.

Contact us at info@offsiteIT.com to learn more about our services, or call OffSite IT in Chicago, IL and Southern California at (866) 828--6674 .

Alexssa

I first hired John directly as an employee back in 1999.
He was an excellent addition to a growing team at a small technology company. Subsequent to the sale of the company, John branched out on his own and started an IT consulting firm. Since that time, I have not used anyone else. John is capable, personable, has integrity and is also very likable. I would recommend him without reservation.”

  Kevin DiCerbo   

Connect With OffSite IT

  • Los Angeles / Orange County 22607 La Palma Avenue Suite 409 Yorba Linda, CA 92887
  • Chicago 6912 Main Street Suite 214 Downers Grove, IL 60516
  • 1-866-828_-6674 info@offsiteIT.com