Distributed Denial of Service (DDoS) attacks can compromise up to 10 per cent of a countryโs total Internet traffic, according to Cisco Systemsโ latest report on the topic. How do companies cope with that volume? One way might be to sign a partner who has even more Internet muscle than you do.
Earlier this month, Cisco released a document called the Zettabye Era, which predicts IP traffic trends. It said that DDoS attacks are increasing in frequency and size, with the biggest one hitting 500Gbits/sec last year.
Neustar, which provides DDoS mitigation systems, signed a deal last month with Limelight Networks, which is one of the worldโs biggest content distribution networks, alongside competitors such as Akamai. Rodney Joffe, senior vice-president, senior technologist and fellow at Neustar, explained that the companyโs cloud-based DDoS mitigation service is in a constant battle with attackers who flood it with unwanted traffic.
โTo some degree it becomes a battle of bandwidth, because the bad guys are using other peoplesโ resources,โ he said.
Typically, DDoS attacks have been volumetric, meaning that they rely on overpowering targets by pure volume. They send ICMP and UDP packets to targets, flooding their ports with useless information. Botnets are a typical launching point, as they enable attackers to scale their traffic for free.
Services like Neustarโs cloud offering take traffic in the cloud and scrub it by looking for telltale signs of an attack. They can then discard that traffic before sending only the legitimate packets onto the customer. While that saves the customerโs bandwidth, it means that firms like Neustar have to beef up their infrastructure to cope with the increasing loads.
The pressure is likely to increase, said Andy Shoemaker, founder and CEO of Nimbus DDoS, a consulting firm that analyzes and simulates DDoS events.
โAttacks are just going to keep on getting bigger. Nowadays, theyโre measured in hundreds of Gigabits per second, and my suspicion is that in the next five years, based on the trends, weโll definitely see our first Terabit per second attack,โ he said.
Working with a CDN enables Neustar to take advantage of wide area network capacity that isnโt being used, explained Joffe. Limelight has major nodes around the world that it uses to distribute traffic to, which can then be accessed by people from a site closer to their physical location. This cuts down latency times and stops the same traffic having to be sent across the same Internet routes multiple times.
Most of Limelightโs requirements are for outbound traffic as it distributes the large files that its customers want. Its requirements for inbound traffic going the other way are relatively low, meaning that one half of the connection that it uses from an ISP is far less used, Joffe explained.
Neustarโs deal with the firm enables it to use that inbound capacity on Limelightโs network, giving it a pipe for its customersโ traffic, so that it can analyze it before sending it on to them.
Neustar will be moving up to 10Terabits of DDoS mitigation bandwidth from around 1 Terabit, Joffe said. Thatโs more than many large tier-one backbones, he points out.
โWhat weโre now able to do for large companies is always-on capability. We act as a DDoS mitigation service thatโs in the cloud all the time, and the customer only sees traffic that has come through us,โ he added.
Still, this is only one step in the long battle against DDoS attackers. Joffe expects DDoS attacks to become smaller, rather than bigger. โThereโs a point at which when you get to 10 Terabits, it takes so many of the bad guysโ resources that they have to get smarter about it.โ The DDoS attacks will be shorter in duration and size, but more focused on individual organizations based on new motives.
Attacks will increasingly move away from volumetric methods to others, he suggested.
โSince the beginning o the year weโve really seen a drop in the size. Those that used to be 4-500Gbit/sec are becoming more rare,โ he said. โNow weโre seeing smaller ones where you think youโre dealing with an amateur, but you realize that theyโre being far more sophisticated in their work.โ
These kinds of DDoS attacks can target particular applications, for example, or may be used as โsmokescreenโ attacks to evade detection as attackers try to compromise networks and exfiltrate information. The DDoS attack may have been around since the turn of the century, but it shows no sign of fading away yet.