& cplSiteName &

Don't Be the Next DDoS Headline: How Virtualization Can Bolster Service Provider Security

Dilip Pillaipakam
6/14/2017
50%
50%

In this day and age of increasingly sophisticated botnet and malware attacks, today's telcos and communication service providers are more vulnerable to large-scale DDoS attacks than ever.

As DDoS attacks ramp up in volume and scale, it's important that service providers remain vigilant and create safeguards against vulnerabilities. Consumers around the world look to service providers to provide the best-of-breed and most secure connectivity and 24/7 Internet service. The failure to do so can cost providers millions of dollars in lost revenue and brand reputation, not to mention incurring customer wrath and churn. So how can today's service providers protect themselves -- and their subscribers? This can seem like a daunting task, especially as providers already grapple with pressures of mobile device explosion; consumers' always-on expectations; and next-generation demands of flexibility, security and scalability.

Since security is often thought of as a perimeter approach, it may come as a surprise that adopting virtualization technologies can help providers bolster both security and service. By now, we know that network function virtualization (NFV) delivers tremendous benefits as it relates to service agility and improved operating efficiencies leading to lower operating costs; however, one of the less discussed and largely overlooked benefits of NFV is security.

Here are some ways NFV can help improve security in service provider networks:

Distributed security policy enforcement
A key benefit of virtualization is the ability to move functions closer to the subscriber. Not only can this help reduce latency and improve performance of the network, it also improves security by moving the security functions and associated policies closer to the subscribers/users. Via protecting the network at the edge, thwarting attacks closer to the user protects the core from potentially expensive security implementations. Implementing security directly into distributed network functions ensures that security is built in to every virtualized network -- and not bolted on as an afterthought. Minimizing impact at the core is a huge security benefit for NFV.

Scalable, on-demand security
One of the well-established benefits of virtualization is the ability to spin up capacity on the fly. This attribute of NFV can be leveraged to ensure that the security functions also scale up and down as attacks on the networks increase. An often overlooked security vulnerability revolves around DNS-based exploits that bypass traditional security approaches. When thinking about potential DNS-based attacks, many carriers struggle with the challenging decision of over-provisioning the network to be safe or trying to be more cost-conservative. But NFV can help ensure that carriers don't have to make this choice.

As an example, in the event of an attack, an NFV-based network can be architected to add more capacity on demand in response to attack. This can help ensure that networks are not over-provisioned for attacks, thus helping reduce both capex and opex while also providing the flexibility to grow on demand. Additionally, coupling elastic scaling NFV capability with advanced DNS protection can help carriers absorb an initial attack so the security ecosystem can identify flows that need to be blocked or scrubbed.

Using a virtualized DDI (DNS, DHCP and IP Address Management) appliance with elastic scaling capabilities can help providers maintain critical DNS service availability even during malicious attacks. Moreover, it can help providers automate the allocation/de-allocation of IP addresses and DNS host names, cutting down the manual processes for IPAM most providers still rely on. In turn, this boosts efficiencies and lowers costs -- all key benefits of the new NFV paradigm as providers transition from legacy non-dynamic deployments to virtualized ones.

Lower costs to deploy security
Traditionally, advanced security has required specialized hardware and associated software. Thanks to advances in the capabilities of generic processors and virtualization, what was traditionally only possible with proprietary systems is now achievable on generic computing systems with virtualization. This dramatically reduces costs of deploying security and makes security much more accessible to organizations of all sizes -- both for current requirements and future needs.

Moving toward virtualized, secure networks
In summary, utilizing NFV can help service providers 1) Build networks that are distributed to minimize points of failure 2) Deploy networks that are elastic and scale on demand with potential attacks 3) Lower security costs via implementing advanced security capabilities on generic compute architectures.

In today's era of heightened cyberthreats and next-generation network demands, service providers cannot underestimate the importance of keeping subscribers satisfied and safe, and maintaining on-demand service and brand integrity. Fortunately, virtualization can allow today's service providers to keep pace with all of these -- all while boosting security.

Dilip Pillaipakam is vice president and general manager of service provider business at network security company Infoblox. He works closely with Infoblox's large service provider customer base (of more than 200 operators worldwide) to secure and scale their network infrastructures.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
More Blogs from Column
With 5G on the horizon, major new innovations in smartphones and the expansion of IoT devices and services, the cloud is more critical than ever in ensuring operators remain relevant.
To survive and thrive in the future, CSPs must find ways to prepare their employees for the integration of AI, automation, machine-learning and advanced data analytics in their operations.
Don't get tripped up by these myths about the European Union's General Data Protection Regulation (GDPR).
What comes after blazing broadband for the 5G specification?
How well-equipped are European operators to handle a surge in mobile data traffic on their 4G networks?
Featured Video
From The Founder
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
Flash Poll
Upcoming Live Events
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
I'm Back for the Future of Communications
Phil Harvey, US News Editor, 4/20/2018
US Investigating Huawei for Sanctions Violations – Report
Phil Harvey, US News Editor, 4/25/2018
AT&T Exec Dishes That He's Not So Hot on Rival-Partner Comcast
Mari Silbey, Senior Editor, Cable/Video, 4/19/2018
Facebook Hearings Were the TIP of the Data Iceberg
Dan Jones, Mobile Editor, 4/20/2018
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed
Partner Perspectives - content from our sponsors
What's in the Box?
By Huawei
Beginning With the End In Mind
By Kevin Taylor, for Huawei
All Partner Perspectives