Todd Taylor, Vice President of Hosted Technologies with NetStandard, delivers an overview on the rise in Denial of Service attacks and what they mean for your business. Taylor has more than 20 years of experience in adapting and applying technology services for business environments, including web-based architectures, server virtualization, SQL Server administration, data center design and network engineering.
What is a Denial of Service attack?
Consider a labor union on strike: picketing in front of a business, clogging entrances and discouraging potential customers. That is the essence of a “Denial of Service” attack. In computer network terms, Denial of Service typically occurs when attackers use malware-compromised PCs (otherwise known as bots) to send huge amounts of disruptive Internet traffic at target systems, such as a web servers or firewalls. The attacks can be directed at specific targets or at random swaths of the Internet. They frequently originate offshore, but onshore sources are not uncommon. Sometimes they are initiated as extortion or for ideological purposes, while other attacks seem to have no clear objective at all.
What do these attacks mean for your business?
Denial of Service attacks are a growing problem worldwide and a significant concern to business whose revenue is dependent on stable and highly available networks. One highly recognized industry authority has published reports indicating that attacks are up nearly 30 percent in the last year and that the average attack is three times greater in size. In a recent survey, respondents reported that Denial of Service attacks against customers remain the number one operational threat.
What can I do about these attacks?
There are firewall features, dedicated appliances and even online mitigation services available to combat Denial of Service attacks. However, each is limited by cost, practicality and physics. Blocking and filtering bad traffic ultimately takes a toll on good traffic just as shutting down a lane of interstate highway creates congestion and latency. If you’re a seasoned network architect, you’re probably already three steps ahead of this article. If not, you probably need help to design and implement the best risk mitigation strategy for your business.
This information is intended to serve both for creating awareness and as a conversation starter for business owners. If your business depends on the Internet and you would like to learn more, contact us to start the discussion.
Additional reading materials: http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf http://pages.arbornetworks.com/rs/arbor/images/AttackSize_final_white.pdf http://media-cache-ec0.pinimg.com/originals/76/ba/e8/76bae8d55e5b86898a4c7b255e04a17e.jpg