Welcome!

Containers Expo Blog Authors: SmartBear Blog, Elizabeth White, John Basso, Pat Romanski, Steven Lamb

Blog Feed Post

Hybrid DDoS Needs Hybrid Defense

#DDoS  #infosec #cloud #F5 acquires Defense.Net

Everyone, no doubt, can easily find one of the myriad articles and reports indicating that the volume of DDoS attacks is on the rise. Not just the frequency of but the sheer size of these attacks are growing year over year at a frightening rate.

It should be no surprise, then, that surveys like TechTarget's 2014 IT Priorities Survey indicate that 45% of respondents will be adding new capacity in network security and 35% plan on adding threat detection and management, and financial institutions are now being required by regulators to have DDoS mitigation solutions in place.

Problematic, of course, is the sheer volume in terms of bandwidth that can be consumed by an attack. With bandwidth consumption often measured in the hundreds of gigabits per second thanks to the deadly combination of amplification and reflection attack techniques, many organizations targeted by such an attack will find that their Internet connectivity is a serious obstacle in mitigating these attacks. While emerging technologies software-defined architectures and network virtualization promise to address the immediate need for additional capacity for network-related services, the reality is that if connectivity is compromised, additional capacity that lies beyond the corporate perimeter is unlikely to provide the relief needed.

Put simply: if an attacker can throw enough malicious traffic at you to completely saturate your Internet pipe, there’s simply not much an on-premise solution can do by itself.

That's why many top analysts recommend as best practices a hybrid approach to preparing for (what we're told is the inevitable) DDoS attack.

The Hybrid DDoS Approach

A hybrid approach combines an off-premise (cloud) based DDoS detection and mitigation service with on-premise protections. Such an approach allows organizations to take advantage of the greater bandwidth capacity that lies along the Internet backbone where most cloud-based DDoS providers reside when attacks oversubscribe their own connectivity while maintaining a strong security posture on-premise that can handle most volumetric attacks and is better suited to addressing more insidious application-layer DDoS attacks.

Hybrid solutions provide the resilience and scale of cloud-based solutions with the granularity and always-on capabilities of on—premise solutions. More importantly, a well-integrated hybrid DDoS architecture enables organizations to more effectively and cost-efficiently deal with threats that occur infrequently but are far more dangerous. A SANS 2012 survey on Log and Event Management indicated that for the first time respondents reported they were "unable to detect active attacks in their networks." This frightening statistic is brought to you by attackers whose goal is to overwhelm systems using network-based attacks whilst hiding more advanced, application-layer attacks amidst the noise such volumetric attacks generate.

Moreover, these attacks are made more dangerous because of the way in which organizations (naturally) respond to a DDoS attack. It's quite common for organizations that find themselves under attack to focus on preventing service outages. As computationally expensive security network services start to fail in the face of overwhelming traffic, the response is often to shut them down. That means IPS, application firewalls and anti-fraud detection systems, among others, are eliminated from the critical path. The network DDoS traffic may be detected and rejected, for the most part, but suddenly the application-layer attacks hiding in the volumetric network attack are free to make their way back to applications. Basically, the application-layer defenses are treated as ballast and tossed aside in favor of keeping the network boat afloat.

A hybrid approach can take advantage of the additional capacity available in the cloud to ensure organizations aren’t overwhelmed by the excessive volume generated by some attacks while enabling the organization to protect itself against the more frequent but easily managed attacks. A pure cloud DDoS solution can be cumbersome to implement if used to mitigate every single DDoS attacks, but worth the cost in the face of an overwhelming attack. 

A hybrid approach is certainly the best architectural approach available today for organizations to cost-efficiently mitigate the risk associated with DDoS overall, and an integrated solution that provides both a cloud and on-premise solution ensures the onboarding process is seamless.

Complementary Technology for a Hybrid DDoS Architecture

F5 sees in Defense.Net the ability to provide just such a hybrid approach to mitigating DDoS attacks whether traditional bandwidth-consuming attacks or more modern, multi-vector attacks. By combining the cloud-based services of Defense.Net with an on-premise F5 Application Delivery Firewall (ADF), organizations will be better armed to detect and mitigate DDoS attacks at the network and application layers simultaneously. 

While Defense.Net supports traditional architectural deployments - asymmetric GRE configuration and a symmetric proxy configuration - it also supports a destination NAT configuration that eliminates GRE MTU and other challenges. This approach requires only inbound traffic to be inspected, which dramatically decreases its bandwidth requirements compared to symmetric DDoS technology. It further benefits organizations in reducing the latency incurred by traditional approaches, which means less of an impact on application performance and the quality of experience demanded to keep customers and employees satisfied. 

Defense.Net's multilayer approach to scrubbing and architectural flexibility is highly complementary with F5's technology as well as our architectural vision, Synthesis. By bringing together both a cloud-based and an on-premise solution, F5 is extending its portfolio of security services to include cloud-based DDoS as a service or in the cloud as part of a broader security architecture designed to provide comprehensive DDoS coverage for applications deployed anywhere, accessed at anytime from any device.

We are excited to have the Defense.Net team and its technology join the F5 family. 

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

@ThingsExpo Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.