• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

The Evolving DDoS Landscape, According to Fastly

January 13, 2018 By TheNewsTeam

Fastly recently published its end-of-year post looking at the evolving DDoS landscape.  

Fastly has scaled rapidly since its founding in 2011 as a CDN into an edge cloud platform serving more than 10% of all Internet requests worldwide, putting it in a strong position to track global traffic patterns and provide cyberdefense services for its customers. It has fast been developing its cybersecurity side, and recently noted its goal to provide virtual patches to web applications before security breaches occur.

In the recent post on the evolving DDoS landscape, researchers Ryan Landry and Jose Nazario looked back at the history of DDoS attacks and noted that over the last 20 years, DDoS attacks have become front page news that have everyone talking. This is often because they’re linked to big stories such as the Olympics or the 2016 election. They are an easy way for people to achieve their goals – whether creating a fuss, silencing opposition or putting a rival out of business.

Fastly observed that the most significant recent DDoS attacks have all involved harnessing the power (and vulnerable security) of multiple IoT devices to link to big networks and thus create massive botnets. The most notorious of which involved the Mirai open source malware used against security blogger Brian Krebs and in a separate attack against infrastructure provider Dyn, both in Q3 2016. Both were launched via a large number of connected hacked IoT devices, including CCTV security cameras and digital video recorders.

They also noted that the nature and complexity of DDoS attacks is subject to extreme variance – based on whether you’re being attacked directly or indirectly, and at what area the attack is aimed at i.e. the application, the kernel, or the network itself. Sometimes they morph into a different type of DDoS as they are taking place as attackers try to evade defenses.

In addition, Fastly notes “an uptick in bitcoin-enabled extortion”, which offers ample opportunity for attackers. Industry researchers are closely tracking the new IoT Reaper botnet, which has not yet launched a DDoS attack of note, even though it has infected over a million devices.

Fastly also point out the way in which DDoS attacks are becoming more complex and that attacks can even change tactic midway through as attackers attempt to evade defenses.

 As attackers become more sophisticated in their attack strategies, thus CDNs like Fastly must also become more adept at defense. As Fastly says, “each side must expect different amounts of work to achieve their aims, with the defender typically paying more money than the attacker”.

Filed Under: DDoS Landscape Tagged With: botnets, Brian Krebs, cyberdefence, DDoS, DDoS landscape, Dyn, Fastly, IoT, Mirai, RDoS, Reaper

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.