How can cloud services survive the next Dyn?

As a result of the massive cyber attacks that took down Dyn’s managed Domain Name Servers (DNS) network on October 21st, hundreds of thousands of websites became unreachable to most of the world.

DNS are like the phone books or roadmaps of the Internet. These services maintain a directory of domain names and their corresponding IP address. It’s easier for people to remember a domain name than an IP address, so when a user types a web address such as Radware.com into their browser they are actually directed to 91.240.147.21.

[easy-tweet tweet=”DNS are like the phone books or roadmaps of the Internet.” hashtags=”tech, DNS, cloud”]

The attack on Dyn has made it feel that no site is immune as it took high-profile cloud services like Twitter, Spotify and Netflix offline. The problem intensified later in the day when the attackers launched a second round of attacks against Dyn’s DNS system.

So how can cloud services survive such destructive attacks?

Researchers have long warned about the risks of a vast majority of Internet clients centralising their networks by using a handful of DNS providers. Coupled with this problem are a large number of Internet clients using only one DNS provider for both their primary and secondary DNS. When DynDNS went under attack, those that did not use redundant DNS services found service unavailable and users unable to reach their website.

In many ways, it is a similar situation to the ‘cyber-domino’ affect that has been a popular method among cybercriminals over the past few years. It involves using a knock on effect tactic where the attacker will take down a company’s website and network operations by launching an attack on the hosting provider or ISP that the company relies on. Take the ISP or hosting company down and the company will be taken offline as well, as will many other companies who use the same provider who become innocent victims in the attack.

The main difference with these new attacks that affected DYN is that they used infected Internet of Things (IoT) devices that became a virtual cyber army for the attacker. Security evangelists have long been talking about the potential for IoT-driven attacks, a message that has often been met with a combination of eye rolls and scepticism. That’s likely no longer the case after these latest attacks, which also-also raised the issue of identifying where the responsibility for technology starts and ends.

Without question, these assaults signal a new age of attacks that will force many businesses to question not only their own cyber security strategies but also those of the service providers who they depend on upon for availability.

Here are three key things to look for when reviewing cloud service providers to help you to establish whether they are prepared to defend against the new wave of attacks:

Hybrid, automated mitigation capabilities

Successfully defending a network from such a major attack requires multi-vector attack detection in an always-on fashion, along with an ability to automate the process of redirection of traffic to cloud-based mitigation resources. Be sure your provider is utilising hybrid mitigation capabilities, ideally leveraging the same technologies on-premise and in the cloud to ease automation and speed time for effective and accurate mitigation.

Layer 7 attack detection

In the past, most large-scale DDoS attacks have leveraged network attack vectors (Layer 3/4). However, new attacks are reportedly sending through massive amounts of HTTP floods, making most Layer 3/4 attack detection methods useless. Be sure your service provider has effective application (Layer 7) attack detection and mitigation capabilities.

[easy-tweet tweet=”Most large-scale DDoS attacks have leveraged network attack vectors” hashtags=”cloud, tech, DDoS”]

Separate network for DDoS mitigation

The ideal architecture features a separate, scalable infrastructure specifically for volumetric DDoS attack mitigation where attacks can be rerouted when they reach predetermined thresholds. These DDoS scrubbing centres should ideally be located close to a major Internet peering point, providing the distinct advantage of not having to backhaul large amounts of traffic across a network backbone, which increases costs to the service provider and results in a necessity to drop certain customers who are under sustained volumetric attacks.

For now, it appears the attacks have abated. However, they should stay in the forefront of the minds of cloud businesses as indicative of the direction of large cyber security attacks. It has become vital to not only reconsider your defence strategy, but also those employed by the providers you rely upon. After all, it’s not just their service that depends on it, but yours too.

+ posts

AI Show - Episode 1 - Clare Walsh

Newsletter

Related articles

From the lab to production: Driving GenAI business success

Generative AI (GenAI) was the technology story of 2023....

AI Show – Episode 1 – Clare Walsh

We invite you to join us on an extraordinary...

Generative AI and the copyright conundrum

In the last days of 2023, The New York...

Cloud ERP shouldn’t be a challenge or a chore

More integrated applications and a streamlined approach mean that...

Top 7 Cloud FinOps Strategies for Optimising Cloud Costs

According to a survey by Everest Group, 67% of...

1 COMMENT

Comments are closed.

Subscribe to our Newsletter