Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

DDoS protection, mitigation and defense: 7 essential tips

George V. Hulme | Sept. 18, 2017
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

"They are resolute and they will hit you on some different port, protocol, or from a new source. Always changing tactics," he says. "Enterprises have to be ready to be as quick and flexible as their adversaries."

 

3. Enlist DDoS protection and mitigation services

John Nye, VP of cybersecurity strategy at CynergisTek explains that there are many things enterprises can do on their own to be ready to adjust for when these attacks hit, but enlisting a third-party DDoS protection service may be the most affordable route. “Monitoring can be done within the enterprise, typically in the SOC or NOC, to watch for excessive traffic and if it is sufficiently distinguishable from legitimate traffic, then it can be blocked at the web application firewalls (WAF) or with other technical solutions. While it is possible to build a more robust infrastructure that can deal with larger traffic loads, this solution is substantially costlier than using a third-party service,” Nye says.

Chris Day, chief cybersecurity officer at data center services provider Cyxtera, agrees with Nye that enterprises should consider getting specialty help. “Enterprises should work with a DDoS mitigation company and/or their network service provider to have a mitigation capability in place or at least ready to rapidly deploy in the event of an attack.”

“The number one most useful thing that an enterprise can do — if their web presence is that critical to their business — is to enlist a third-party DDoS protection service," adds Nye. "I will not recommend any particular vendor in this case, as the best choice is circumstantial and if an enterprise is considering using such a service they should thoroughly investigate the options."

 

4. Don't rely only on perimeter defenses

Everyone we interviewed when reporting on the DDoS attacks that struck financial services firms a few years ago found that their traditional on-premises security devices — firewalls, intrusion-prevention systems, load balancers —were unable to block the attacks.

"We watched those devices failing. The lesson there is really simple: You have to have the ability to mitigate the DDoS attacks before it gets to those devices. They're vulnerable. They're just as vulnerable as the servers you are trying to protect," says Sockrider, when speaking of the attacks on banks and financial services a few years ago. Part of the mitigation effort is going to have to rely on upstream network providers or managed security service providers that can interrupt attacks away from the network perimeter.

It's especially important to mitigate attacks further upstream when you're facing high-volume attacks.

"If your internet connection is 10GB and you receive a 100GB attack, trying to fight that at the 10GB mark is hopeless. You've already been slaughtered upstream," says Sockrider.

 

Previous Page  1  2  3  4  Next Page 

Sign up for Computerworld eNewsletters.