main

DDoSSecurity

What Do You Know About DDoS Attacks? Here’s The Ultimate Guide

June 22, 2015 — by Ben Desjardins2

Every good hero needs a trusty guide.

Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.

Today at Radware, we’re pleased to provide a new tool to this community with the release of our newly updated DDoS Handbook. The handbook is subtitled ‘The Ultimate Guide to Everything You Need to Know About DDoS Attacks’ and while no single document could be the be-all-end-all of cyber-attack education, it does provide a unique level of foundational knowledge. The handbook is built from the Radware team’s insights gleaned from over 10 years of battling DDoS attacks. Protecting some of the largest, most network dependent, and most targeted organizations in the world from an array of attack campaigns affords this team a truly unique level of knowledge about attack detection, motivation and mitigation.

Foundational Knowledge is Necessary

DDoS_Handbook_glowIf you listen to any number of industry experts, they will tell you that it is nearly impossible for IT or information security staff to keep fully up-to-date on the evolution of cyber-attacks. There is a lot of truth in these statements; especially in the context of real-time threat mitigation against something like Zero-Day Attacks. In response to this challenge, there are many vendors ready to support security operators in maintaining their visibility of the threat landscape. But it is important to keep in mind that these vendors’ products and services don’t replace the need for foundational knowledge within the organization about the general direction of cyber-attacks. Organizations that interpret the purchase of the latest and greatest security product or those that move to a managed security service as an opportunity to relieve themselves of responsibility, will lose in the end.

For those new to the topic of DDoS attacks, this handbook can provide a starting point in understanding. Who, you might ask, would be new to the topic? The fact is that DDoS attacks are targeting entirely new industries and market segments that previously would disregard these attacks as a concern only for big banks or large ecommerce players. Those days are gone. Nearly every day, we find ourselves engaged in discussions with an organization from a new market segment showing concern over this threat, often in response to a specific incident. The DDoS Handbook gives members of these teams a strong foundation in the background and history of DDoS attacks. There is also a wealth of information on the evolution of motives, different attack types and the tools utilized by today’s attackers.

The Expanse of DDoS

Radware has been building and supporting defenses for DDoS attacks for over 10 years. When we got started, DDoS attacks were still a relatively niche segment of security threats and protection was viewed as an isolated tactic within the security operation. This has changed dramatically over the past few years. Protection from volumetric threats has become not only a foundational element for increasingly network-dependent companies but also a strategic pillar as these threats often combine elements of other attack types.
In a recent briefing, I was told that as much as 40% of customer inquiries include a DDoS protection discussion. This rise of strategic focus for DDoS highlights the importance of viewing attacks in the broader context of enterprise security. The handbook supports this, through a chapter devoted to the rapid changes around the network perimeter and its impact on security. Trends related to the increased use of Content Delivery Networks, cloud computing and virtualization are also explored.

Experienced Advice Helps

Background and history are great, but any DDoS handbook would be incomplete without clear and proven advice on preparation and response. The handbook delivers a comprehensive chapter that highlights business and attack trends and provides a set of best practices for organizations to consider when planning for cyber-attacks. Learn the critical points of evaluation for protective measures as well as some valuable Do’s and Don’ts for attack preparation, attack response and post-attack analysis.

An Outlook and a Resource

Where is the DDoS threat headed? The experience our team has we’ve earned in the DDoS space has led to sharpened radar on what new tactics represent a meaningful shift in attack strategy vs. something that is a limited trend that could be addressable through basic protection updates. The updated ‘DDoS dictionary’ is also a great go-to resource for maintaining an individual or organizational DDoS knowledge base. I’m not ashamed to admit that this is a tool I use frequently in my own work on the topic.
There is a saying that “the right tool in the wrong hands” will always lead to failure. In creating and maintaining the DDoS Handbook, we address both the challenge of the tool and the capabilities of its operator. This foundation can support individuals that play a part in the protection strategies and tactics for their organization. Detailed attack profiles and clear advice, are a valuable tool to supplement products and services that comprise an enterprise security strategy.

Download

Radware’s DDoS Handbook: The Ultimate Guide to Everything You Need to Know about DDoS Attacks

Ben Desjardins

Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, WAF and anti-scraping technologies. Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

2 comments

  • anurag chaurasia

    July 16, 2015 at 8:06 am

    I am a security architect looking for ddos solutions for one of my client.

    Reply

  • Joseph Lowe

    March 4, 2016 at 7:22 pm

    Thank you for sharing information on what I find to be an interesting topic. Are firewalls becoming irrelevant with today’s malicious software? I ask because I was summoned to my IT guy’s office today to watch a DDOS attack in progress against one of our site servers. I’ve never seen such a thing occur and I was equally amazed at how these hackers worked. They tied up one of our servers with this attack and at the same time, they took over one of our routers. It was explained to me that these attacks are different but related. The hacker modified our router to send every user to a fake log-in page for my practice. We responded by taking everything offline. I’m sure my IT staff will spend the weekend sorting this all out and prayerful no real damage has been done. Nonetheless, it still costs me money and my staff time. Shame on these folks.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *