& cplSiteName &

When Size Matters

Carol Wilson
10/18/2013
50%
50%

It is easy to get lost in the numbers when discussing distributed denial of service (DDoS) attacks and other network breaches but the figures Arbor Networks released this week regarding DDoS attacks are worthy of special note. They are a strong indication of new threats for which network operators need to be prepared. (See Arbor Sees Alarming Rise in Size of DDoS Attacks.)

Those numbers come from the 275 network operators that are customers of Arbor Networks 's Atlas network security system and regularly report troublesome activity. They show that larger bit-per-second attacks are back in vogue, and have grown so rapidly they threaten to not only cause massive problems for their targeted companies but also for networks in general.

For the past couple of years, larger packet-per-second attacks were more the norm, says Darren Anstee, solutions architect team manager for Arbor. Those tend to exhaust forwarding performance.

Last March, however, the largest single cyber-attack to date was launched against the servers of Spamhaus, a non-profit agency that battles spam. Since that attack, the trend has been to ever larger bit-per-second attacks. The Spamhaus attack, which hit 300 Gbit/s, affected Internet traffic globally and hurt many businesses in the process.

And here are the staggering numbers: There has been more than 350 percent growth in the number of attacks monitored at greater than 20 Gbit/s so far this year, as compared to 2012. The average DDoS attack in 2013 is currently measured at 2.64 Gbit/s, up 78 percent from last year.

That's of particular concern to service providers because attacks of that size will not only swamp the resources of the target company but can also swamp aggregation routers serving that company and others, and create major congestion issues for the network in general.

"There is a much broader range of organizations that are going to get their Internet connectivity completely saturated by an average attack," says Anstee. "They will be dependent on their service providers or on cloud-based protection to deal with that."

These attacks are being launched either by cyber-criminals, who use them as distractions for other activity or as "take-outs" for extortion or other purposes, or by so-called "hacktivists," who for a variety of ideological reasons, target various companies or web operations for attack to make a political point.

Two suspects have been arrested in the Spamhaus attack, for example, one a Dutch participant in countercultural ISP and one a UK schoolboy who was apparently making considerable money from Internet activity. They targeted Spamhaus because of its efforts to identify and stop spam email that poses security threats.

Because it's harder to predict where attacks will come from next, it's become much more important to prepare for them, Anstee says. And that means making sure there are solutions in place to help customers who are attacked, as well as protection for the service providers' infrastructure to prevent or respond to collateral damage from these massive attacks.

"Since we are seeing more very large attacks -- we saw a 191Gbits/sec attack in August -- service providers also need to be looking at capacity planning models for their mitigation infrastructure," he warns. As the size of average and peak attacks grows, network operators must make sure they can deal with these larger threats.

As I said at the outset, it's easy to get lost in such staggering figures, but the latest warnings are not something to glaze over. There have been many other warnings as well, and expressions of concern that service providers aren't taking the rapidly growing threats seriously. Given that Arbor's numbers come straight from the networks themselves, this is proof of what lies ahead, ready or not. (See Security Threat Intensifies for Service Providers.)

— Carol Wilson, Editor-at-Large, Light Reading

(6)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
pdonegan67
50%
50%
pdonegan67,
User Rank: Light Sabre
10/21/2013 | 4:37:48 AM
Re: Are we shock-proof?
I started researching the service provider security space three or four years ago and was immediately struck by the confluence of proven incidents of attacks that have had truly devastating effects alongside some positively steaming shovels full of fear-mongering bullshit on the part of some security vendors. The two really do co-exist.

As my research has gone on, I've found that the pitching of security solutions into the service provider space is typically quite a lot more sober than it is into the enterprise.

Very few service providers fall for the histrionics-based sell, in my experience This is either because they're highly security-savvy and know how to categorize risks according to the threat level they represent.

Or (as is still too often the case) it's because they can't differentiate different threat levels, can't be bothered to, and don't much care about anything beyond the next quarter's revenue target. In the case of these guys, if they invested in the right security solutions they might find that a couple of unexplained outages which suspended their ability to bill during the quarter were actually caused by malicious attacks but hey, why let that interfere with sound accountant-led thinking, right?

I'm actually struck by how sober and business-case oriented most pitching of security solutions to service providers is these days. I'm also struck, not coincidentally, by the relatively high rate of failure among the minority of security solution vendors who shriek with scant evidence that the sky is falling in. They often find that it's actually them that the sky subsequently falls in on where service provider business is concerned.

Where Arbor Networks is concerned I've an interest to declare in that I've done quite a bit of work with them. They have laced my palm with silver. They're one of the sponsors of Light Reading's second Mobile Network Security conference that I'm chairing in New York on December 5th, for example (see our LIve Events listing).

So take this with a pinch of salt if you will, but when I talk to service providers, the feedback I get about Arbor is that they are one of a select few companies whose opinions and solutions for service provider security are nearly always taken very seriously pretty much anywhere in the world.

Better still, ask around yourself, and see if you encounter a different pattern. I'd be very surprised.
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
10/18/2013 | 7:35:35 PM
Re: Are we shock-proof?
Hacktivists are organizations with a political ax to grind - think Anonymous or Wikileaks -- and their wanna-bes - who launch attacks to make a point, and not necessarily for profit. 

That is a trend we should possibly be following more closely. 
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
10/18/2013 | 7:33:54 PM
Re: Are we shock-proof?
I actually did a rather extensive search of the SpamHaus attack and never saw anything that said it was a PR hoax. A number of respected tech sites took this very seriously so if it is a hoax, it was wildly successful, fooling Cnet, Cisco, slashdot, zdnet, reddit and nextweb. 

I assume the organization you are criticizing is Cloudflare? I did find two reports criticizing them for exaggerating the potential impact of the SpamHaus attack, claiming it could have "broken" the Internet. But even critics admit this was a serious attack. 

Arbor isn't saying these larger attacks are breaking the Internet and yes, they have something to sell toe service providers but no one is hiding that, and being aware of ever larger DDoS attacks is still a good idea. 
prtrumpsreality
50%
50%
prtrumpsreality,
User Rank: Light Beer
10/18/2013 | 5:58:27 PM
Re: Are we shock-proof?
You shuld check facts better.  The SpamHaous attack was so small, that nobody (except spamhaus) noticed.

The publicity campaign that was kicked off by the comapny they hired to fix their problem however, made up some numbers so crazy, that everyone saw "largets in history", and that PR has now replaced the truth.

the Spamhaus ISP published their traffic logs for the period in question in response, showing that there was no discernable peak or spike in data.  

It seem nothing can beat a good PR advertising campaign though :-(
pzernik
50%
50%
pzernik,
User Rank: Light Sabre
10/18/2013 | 5:34:53 PM
Re: Are we shock-proof?
Hi Carol.  What exactly are hacktivist groups and what are their motives?  Can LR do an article on this subject? 
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
10/18/2013 | 3:47:42 PM
Are we shock-proof?
Arbor has been tracking this stuff longer than most and while they usually have some shocking numbers to share, this current report is truly disturbing. 
More Blogs from Rewired
AT&T pulls back from offering Gigapower customers a chance to protect their privacy for a price, even as FCC considers making it mandatory.
Don't worry, they say, the code will work it out. There's apparently nothing open source can't tackle.
Level 3 finds enterprise security managers who believe firewalls can save them are getting some nasty surprises.
At one moment in Denver this week, the three largest US operators were very agreeable to the idea of open sourcing APIs to make business easier.
AT&T's former security guru is taking his expertise to a much broader audience – and this time he's giving it away.
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Interviews
ETSI's CTO Talks NFV, 5G & NGP

12|5|16   |   09:45   |   (0) comments


Adrian Scrase, CTO at standards body ETSI, talks about the various initiatives and specifications developments related to NFV, 5G and NGP (next-generation protocols) that will underpin next-gen networks.
Women in Comms Introduction Videos
Korn Ferry Consultant: How to Find, Cultivate & Be the Best Talent

11|30|16   |   4:10   |   (1) comment


Erin Callaghan, a managing consultant for Korn Ferry Futurestep, shares strategies for companies to improve how they recruit and for women to ensure they don't get lost in the pipeline.
LRTV Custom TV
We Can Make the World More Sustainable

11|29|16   |     |   (0) comments


GeSI is a global e-Sustainability Initiative organization bringing together 40 big multinational companies around the world. According to GeSI's report, information and communication technology can make the world more sustainable. Luis Neves, chairman of GeSI, shared with us his opinion at Ultra-broadband Forum (UBBF2016).
LRTV Custom TV
Finding a New Way to Engage Customers & Drive Revenue

11|29|16   |     |   (0) comments


Mobile revenues are declining. Digicel, a player in the Caribbean telecommunications/entertainment space, has found a new way to engage customers and drive revenue. John Quinn, CTO of Digicel, shared with us its story at Ultra-broadband Forum (UBBF2016)
LRTV Custom TV
Do You Really Need Gigabit Infrastructure?

11|29|16   |     |   (0) comments


Altibox is the biggest fiber-to-the-home (FTTH) player and the largest provider of video and TV in Norway. They started out with zero customers in 2002. Now they have close to half a million households and companies attached to their FTTH business. Nils Arne, CEO of Altibox shared with us their story and insight on 5G at Ultra-broadband Forum (UBBF2016).
LRTV Custom TV
BTís Openreach Strategy & Its Updates in 2016

11|29|16   |     |   (0) comments


A lot of developments at Openreach this year in terms of strategy and planned investments. Peter Bell, CIO of Openreach BT, shared with us the updates of Openreach at Ultra-broadband Forum (UBBF2016).
LRTV Custom TV
ITU: The Broadband Is Our Future

11|29|16   |     |   (0) comments


At Ultra-broadband Forum, Houlin Zhao, Secretary General of ITU, discussed how important it is for countries, companies and everybody to be working together to help to build the broadband and digital economies (UBBF2016).
LRTV Custom TV
Tackling 5G in Dallas

11|28|16   |     |   (0) comments


Here are our highlights of the 5G North America show in Dallas, Texas with Light Reading's Dan Jones.
LRTV Interviews
Cox Prepping for Virtualization Trials

11|14|16   |     |   (0) comments


In this video interview, Cox's Jeff Finkelstein discusses MSO's plans to test managed business services in early 2017 and tackle Distributed Access Architectures.
LRTV Custom TV
Drivers & Potential of NGP

11|11|16   |     |   (0) comments


ETSI has created an Industry Specification Group to work on Next Generation Protocols (NGP ISG), looking at evolving communications and networking protocols to provide the scale, security, mobility and ease of deployment required for the connected society of the 21st century. The NGP ISG will identify the requirements for next generation protocols and network ...
LRTV Custom TV
Huawei IP 2020 for Future Networks

11|11|16   |     |   (0) comments


Future Networks should satisfy many requirements such as high throughput, extremely low latency, flexible mobility, intrinsic security, networking automation, and so forth. The Chief Architect of Huawei Future Networks addresses a holistic solution, i.e., IP 2020, to achieve these requirements for various future life scenarios (e.g., autonomous driving, tactile ...
LRTV Custom TV
Digital Object Architecture

11|11|16   |     |   (0) comments


Digital Object Architecture provides a basic information infrastructure that can facilitate interoperability between or among different systems, processes, and other information resources, including different identity management systems. Digital objects are networked objects that are named by digital object identifiers and instantiated by an infrastructure service ...
Upcoming Live Events
December 6-8, 2016, The Westin Excelsior, Rome
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Hot Topics
Cable Nodes Becoming a Choke Point
Brian Santo, Senior editor, Test & Measurement / Components, Light Reading, 12/5/2016
Apple Seeds 5G? Seeks 'Multi-Gigabit' Chip Designer
Dan Jones, Mobile Editor, 11/30/2016
Altice Plans FTTH for Entire US Footprint
Iain Morris, News Editor, 11/30/2016
WiCipedia: After-School Coding, Salary Probing & Pro-Parenthood Companies
Eryn Leavens, Special Features & Copy Editor, 12/2/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Eyal Waldman, CEO of Mellanox Technologies, speaks to Steve Saunders, CEO of Light Reading, for an exclusive interview about the 100 GB cable challenge, cybersecurity and much more.
Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
Animals with Phones
Live Digital Audio

Even when there's a strong pipeline of female talent in the comms industry, it tends to leak all the way to the top. McKinsey & Company says women experience pipeline leakage at three primary points: being unable to enter, being stuck in the middle or being locked out of the top. Each pipeline pain point presents its own challenges, but also opportunities to stop the leak. Wireless operator Sprint is making a conscious effort to improve its own pipeline from new recruits to the C-suite, and it wants the rest of the industry to do the same. In this Women in Comms radio show, WiC Board Member and Sprint Vice President of Enterprise Sales Nelly Pitocco will give us her take on the industry's pipeline challenges. Pitocco, who joined Sprint in May and has spent 20 years in the comms industry, will also offer solutions, share how Sprint is tackling the challenge within its own organization and take your questions live on air.