main

Application SecurityAttack MitigationDDoS AttacksSecurity

Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats

June 11, 2013 — by Avi Chesla0

This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE).

Although this brings the promise of relieving traffic jams for mobile operators, it also brings new security risks. As traffic generated by smartphones grow, LTE networks’ fast mobile broadband will assist handling the increased traffic.

However, mobile operators will have to learn how to handle the new threats. New Advanced Persistent Threats (APT) are emerging and mobile carriers and mobile user will find themselves struggling with similar APTs that we see at Enterprises today. For Long Term Evolution networks not to fall short on security, mobile operators must realize the increased threats from malware, fraud, distributed denial of service (DDoS) attacks and many other attacks, and adopt more comprehensive and innovative security strategies.

Although LTE, which is commonly referred as mobile network 4th generation (4G), provides a solid infrastructure to deliver advanced, content-rich applications in real-time, I discuss a few security challenges that should be addressed in order to protect the network from overload and declining quality of service.

The article can be found here. I invite you to read it, and feel free to share any comments or questions you may have for me.

DDoS AttacksSecurity

Security Week Article: The Missing Layer Against Encrypted Attacks

December 5, 2012 — by Avi Chesla1

I recently contributed another column to Security Week about attackers launching attacks over HTTPS more than ever before. With an increased level of encrypted traffic on enterprise networks, attackers are taking advantage of this blind spot within the organization’s security model.

Social Media services and online financial services have become targets. Most will employ different layers of defense for an encrypted attack. However, this approach will not be effective if an attack included an availability-based threat vector such as Denial of Service attack or zero-day advanced threats.

This is because processing an encrypted attack consumes more system resources than processing non-encrypted data. As a result, an attacker is able to make a big impact even at relatively low rates of requests per second. The solutions that can decrypt the traffic can only detect the known low rate attacks rather than the unknowns (zero-day).

To really help mitigate an attack such as this, a network needs to include another layer which is the network wide attack protection.

I share my thoughts on what an organization needs in order to successfully handle these threats and invite you to read this column to learn more about it. You can also tweet about the column to share it with your followers.

Attack MitigationDDoS AttacksSecurity

Security Week Article: The Need for Resource-Aware Mitigation Technology

August 21, 2012 — by Avi Chesla0

Recently, I wrote an article for Security Week on the growing need for security solutions to manage under-the-radar attack tools before they wreak long-term havoc on the network. When first hearing about another lethal DoS (denial-of-service) attack, the first thing that comes to mind is the volume of traffic attackers sent to take down a service, or to flood a victim’s network. Realizing a more “affordable” solution, attackers are now favoring techniques that require very little resources and can slowly occupy a victim’s machine until the resources are spent.

Application DeliveryEventsSDN

Get Ready for “Network Apps”

April 23, 2012 — by Avi Chesla4

I just got back from the 2nd Open Networking Summit (ONS) that took place in Santa Clara. This event was three times bigger than the one held on October last year. Networking innovation was once again the focus of the discussions and demonstrations and it was interesting to see a few examples of production network environments that have fully adopted the SDN (Software Defined Networking) approach and implemented OpenFlow. For example, Google showed that most of its production network is OpenFlow enabled – there’s no better “Proof of Concept” than that.

Application SecurityDDoS AttacksSecurity

Giving Up On Security? How Security Companies Can Gain Trust Back

January 31, 2012 — by Avi Chesla0

Following recent escalation of cyber attack campaigns by the Anonymous group and most recently the pro-Palestinian “hacktivists” (Saudi Arabian hacker “0xOmar”) that tried over three days to bring down the Israeli stock market, national airline website and several major and vulnerable private banks, I am hearing more and more about online companies that are looking for Geo IP blocking capabilities. Not that I have anything against Geo IP analytics and blocking measures, however this specific requirement means that organizations have really decided to deny access to their legitimate audience.  Or, in other words, these companies are giving up as they don’t believe that their current security capabilities can really differentiate between legitimate to non-legitimate users under attack. Under pressure, they choose to simply block everything that is coming from countries they believe are not safe.

Application Acceleration & OptimizationApplication DeliverySDN

Bringing Networking Out of the Stone Age – Insights from the Stanford Open Networking Summit

November 10, 2011 — by Avi Chesla1

I recently returned from the Open Networking Summit (ONS), which took place at Stanford University on October 17-19th. It’s clear from the conference that the networking industry is on the verge of a major transition. And leading that change is OpenFlow (or as it has come to be defined in the industry: SDN – Software Defined Networks), which was the star of the summit.