Humor and Quirks Humor and Quirks
Wed, December 11, 2024
Tue, December 10, 2024
[ Tue, Dec 10th 2024 ] - The New Yorker
The Dawn of the Bionic Man
[ Tue, Dec 10th 2024 ] - Mercury News
California News
[ Tue, Dec 10th 2024 ] - ABC News
Entertainment News
Mon, December 9, 2024
[ Mon, Dec 09th 2024 ] - BBC
Beds, Herts & Bucks
[ Mon, Dec 09th 2024 ] - Uproxx
The Best TV Shows Of 2024
[ Mon, Dec 09th 2024 ] - Paste
The 25 Best PC Games of 2024
[ Mon, Dec 09th 2024 ] - CNET
Top News Stories
Sun, December 8, 2024
Sat, December 7, 2024
[ Sat, Dec 07th 2024 ] - Newsweek
Russia-Ukraine War
[ Sat, Dec 07th 2024 ] - imdb.com
Canada's 30 Funniest TV Shows
[ Sat, Dec 07th 2024 ] - Daily Mail
UK Celebrity News
[ Sat, Dec 07th 2024 ] - Food Safety News
Food Safety News
Fri, December 6, 2024
[ Fri, Dec 06th 2024 ] - Graphic
Latest Ghana News Headlines Today
[ Fri, Dec 06th 2024 ] - The Columbian
Clark County News
[ Fri, Dec 06th 2024 ] - who13
Cyclones react to 10 wins
[ Fri, Dec 06th 2024 ] - TravelPulse
Hotels and Resorts News
[ Fri, Dec 06th 2024 ] - Business Standard
Share Market Today
[ Fri, Dec 06th 2024 ] - Reuters
Aerospace & Defense
Thu, December 5, 2024
[ Thu, Dec 05th 2024 ] - Interest
All news stories
[ Thu, Dec 05th 2024 ] - Stereogum
When Comedians Make Serious Music
[ Thu, Dec 05th 2024 ] - Paste
The 30 Best TV Shows of 2024
[ Thu, Dec 05th 2024 ] - Phil Bruner
Featured News Stories
[ Thu, Dec 05th 2024 ] - Phil Bruner
Swattie Survival Guide
Wed, December 4, 2024
[ Wed, Dec 04th 2024 ] - Phil Bruner
California News
[ Wed, Dec 04th 2024 ] - Phil Bruner
President Joe Biden
Tue, December 3, 2024
[ Tue, Dec 03rd 2024 ] - Phil Bruner
The 40 Best Games of 2024
[ Tue, Dec 03rd 2024 ] - Phil Bruner
Boku No Roblox Codes
[ Tue, Dec 03rd 2024 ] - Phil Bruner
Yonhap News Agency
[ Tue, Dec 03rd 2024 ] - Phil Bruner
Beds, Herts & Bucks
[ Tue, Dec 03rd 2024 ] - Phil Bruner
Transfer news and rumors
Mon, December 2, 2024
[ Mon, Dec 02nd 2024 ] - Phil Bruner
Watch Samaa News Live
[ Mon, Dec 02nd 2024 ] - Phil Bruner
UK Celebrity News
[ Mon, Dec 02nd 2024 ] - Phil Bruner
The 100 Best Albums of 2024
[ Mon, Dec 02nd 2024 ] - Phil Bruner
From the Newspaper
[ Mon, Dec 02nd 2024 ] - Phil Bruner
South Australia
[ Mon, Dec 02nd 2024 ] - Phil Bruner
Whanganui Chronicle
Sun, December 1, 2024
[ Sun, Dec 01st 2024 ] - Phil Bruner
Wildlife Oddities of the Week
Sat, November 30, 2024
Fri, November 29, 2024
[ Fri, Nov 29th 2024 ] - Phil Bruner
Hotels and Resorts News
[ Fri, Nov 29th 2024 ] - Phil Bruner
The Best Jokes of 2024
Thu, November 28, 2024
[ Thu, Nov 28th 2024 ] - Phil Bruner
Climate and Environment
[ Thu, Nov 28th 2024 ] - Phil Bruner
December 2024 Issue
Wed, November 27, 2024
[ Wed, Nov 27th 2024 ] - Phil Bruner
Decoding Gen Z's content diet
Tue, November 26, 2024
[ Tue, Nov 26th 2024 ] - Phil Bruner
Illustrated Humor in the News
[ Tue, Nov 26th 2024 ] - Phil Bruner
World News
[ Tue, Nov 26th 2024 ] - Phil Bruner
Alexandra Petri
Mon, November 25, 2024
[ Mon, Nov 25th 2024 ] - Phil Bruner
Legal IT's Leading News Source
[ Mon, Nov 25th 2024 ] - Phil Bruner
All Kent news
Sun, November 24, 2024
Mon, December 15, 2008
[ Mon, Dec 15th 2008 ] - Market Wire
fasdfasddva s gfg h

Radware Security Report Debunks Prevailing Myths About Distributed Denial of Service (DDoS) Attacks


Published on 2012-02-06 03:01:10 - Market Wire
  Print publication without navigation


Radware Security Report Debunks Prevailing Myths About Distributed Denial of Service... -- MAHWAH, New Jersey, February 6, 2012 /PRNewswire/ --

Radware Security Report Debunks Prevailing Myths About Distributed Denial of Service (DDoS) Attacks

[ ]

In the "2011 Global Application and Network Security Report", Radware's Emergency Response Team Finds That Size Doesn't Matter and Smaller Attacks can be Deadlier

MAHWAH, New Jersey, February 6, 2012 /PRNewswire/ --



Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at [ Radware ] (NASDAQ: [ RDWR ]) a leading provider of [ application delivery ] and [ application security ] solutions for virtual and cloud data centers, instead found that bigger problems usually come in small packages.  That is one of the conclusions published today in the "2011 Global Application and Network Security Report", a compilation of security findings providing a view of the state of cyber security worldwide.  

The findings bust several myths about the way the industry views the impact of distributed denial of service (DDoS) attacks.  In particular, it challenges the belief that while a cyber attack may feel catastrophic at the time, most organization may never experience an intense attack.  Also, a smaller, less intensive attack (76 percent of the attacks surveyed were under 1 Gbps) can cause more damage than DDoS attacks that gobble ten times the amount of bandwidth.

The report, prepared by Radware's [ Emergency Response Team ] (ERT), is the product of a security survey sent to a wide variety of organizations, as well as an analysis of selected cases that were handled by the ERT that focus on DoS and DDoS attacks and their mitigation.  Combined, they provide an informative and educational look at the types of attacks experienced, the victims and an overview of mitigation technologies.  

Radware's ERT is a group of dedicated security consultants who are available around the clock.  As literal "first responders" to cyber attacks, Radware's ERT members gained their extensive experience by successfully dealing with some of the industry's most notable hacking episodes, providing the knowledge and expertise to mitigate the kind of attack a business's security team may never have handled.  Through the report, the ERT reveals how their in-the-trenches experiences fighting cyber attacks provide deeper forensic analysis than surveys alone or academic research.

Myth Busting

Although some organizations do incur massive DDoS attacks, many more never experience a high-magnitude attack, according to the report. Instead, these organizations are brought down by less intensive, but equally serious attacks.  As mentioned earlier, 76 percent of attacks were less than 1Gbps in bandwidth, with 32 percent less than 10Mbps. Only nine percent of attacks in 2011 were over 10Gbps.

A review of cyber attack cases reveals that industry reports capturing public attention perpetuate a myth that only size counts. The thinking goes that if the bandwidth is bigger, then the attack is more severe.  In fact, Radware's ERT found that the type of attack is also significant. A much smaller HTTP flood on the application level may do more damage than a larger UDP flood on the network. When evaluating DoS attacks it is important to understand both the size and type of attack.

Other security myths that fall by the wayside in Radware's security report include:

  • Firewalls or IPS alone can stop DDoS attacks -- Despite being designed to provide network security, firewalls and intrusion prevention systems (IPS) are impacted by DDoS attacks. Often the firewall is the weakest link.  The report shows that in 32 percent of DDoS attacks, the firewall or IPS became the bottleneck.  To stop DDoS attacks you need dedicated hardware solutions, not IPS and firewall technologies.
  • Content Delivery Network (CDN) providers protect a business against DDOS attacks -- The CDN occasionally can handle the less sophisticated, large-volume attacks by simply absorbing them (while the target customer will pay for that bandwidth, of course, as it was recognized as legitimate traffic).  However, as seen by the recent cyber attacks that tried to bring down the Israeli financial system and national airline, the CDN was easily bypassed by changing the page request in every Web transaction.  These random request techniques force CDNs to "raise the curtain" and forward all the attacks directly to the customer premise, in essence making the CDN act as a proxy unloading the attack traffic directly at the target servers.
  • The core DoS attack mitigation strategy is to defend and absorb - Businesses can and should have the ability to be proactive in their mitigation steps to stop malicious traffic or Website degradation with a strategy for going on the offense.  This changes the rules in which the attacker always has the edge, and instead, levels the playing field. This can be done by identifying the attack tool used as the vehicle to carry the attack campaign and expose and exploit its inherent weaknesses to neutralize the attack tool in a "passive", non-intrusive way.

"As the cyber security landscape continues to change with each new wave of attacks, DoS and DDoS attacks are changing as well and will continue to target organizations with more gusto than even before," said Avi Chesla, chief technology officer, Radware.  "For example, Radware's 2011 Global Application and Network Security Report proves that in the past two years all serious cyber attack campaigns include volumetric as well as the low and slow attacks vectors, both generated simultaneously.

"Most Internet sites are inherently vulnerable, making it a major challenge for the average organization to predict whether or not their site will be attacked and what the volume of that attack might be.  The fates of their organizations depend on utilizing the most advanced defensive and offensive maneuvers against these determined cyber criminals, and understanding all the intricacies of the current attack landscape," Chesla said.

Other Report Findings:

  • 56% of cyber attacks were targeted at applications; 46 % at the network.
  • Financial Services (28%), Government and eGaming (25% each) sites were targeted most.
  • In half of the attacks, companies did not know why they were targets.  'Hacktivists' with a political or social agenda accounted for 22% of the attacks; 12% came from angry users; 7% from the competition and 4% wanted a ransom in exchange for freeing the website.
  • DoS attacks became much more organized, professional and complex in 2011 with attackers using as many as five different attack vectors in a single attack campaign. No one point security tool could effectively block this sophisticated multi-level type of attacks.  What is needed is a cocktail of techniques that together provide full protection.

Recommendations:

Radware's ERT recommends these ways businesses can protect against DoS and DDoS attacks:

  1. Collect information about attacks such as type of attacks, size and frequency. Use the correct measures for the attack type. For example, the proper measurement for UDP floods is in bandwidth and PPS, while the measurement scale for HTTP floods is in transactions per second, concurrent connections, and new connections per second.  The UDP flood may seem larger and more dangerous, but the HTTP connection-based attack can cause more damage with much less traffic than the UDP attack.
  2. Perform risk analysis at the business level to determine the budget you should allocate to improve your business resilience against DDoS attacks.
  3. For bandwidth saturation attacks, make sure your service provider can mitigate volumetric attacks that may saturate your bandwidth.
  4. For application attacks, deploy anti-DoS and network behavioral technologies on site.
  5. Have a consolidated or "context aware" view into enterprise security with a security event information management (SEIM) system.  An SEIM system can build a centralized architecture that simplifies such tasks as monitoring the millions of messages and log records generated by security edge devices.  Also, an SEIM is essential when prosecuting a perpetrator.
  6. Education and internal security policies are important defense tools, too.  Regularly refresh technical skills and practical experience within the security group; but also help employees be aware of how hackers can exploit opportunities throughout the enterprise, especially in the age of 'bring your own device'.

About the "2011 Global Application & Network Security Report"

Information for the report came from two sources -- the Radware Security Survey and an analysis of 40 select cases of cyber attacks conducted by the ERT.  The Radware Security Survey was distributed in the fall of 2011 to security professionals ranging from security and network managers to executives.  The survey consisted of 23 questions on respondents' DoS experiences, the impact of the DoS attacks they experienced, mitigation techniques, and in-depth information about the three most severe attacks they experienced.  Radware received 135 responses, most of which were not from current customers.  

The 40 select cases studied by Radware's ERT complemented the survey by providing deeper, forensic information.

For more information on Radware's "2011 Global Application & Network Security Report", go to:

[ http://www.radware.com/2011globalsecurityreport ]

ADDITIONAL RESOURCES

Report:  "2011 Global Application & Network Security Report"

[ http://www.radware.com/2011globalsecurityreport ]

Infographic:  "2011 Global Application & Network Security Report"

[ http://www.radware.com/Resources/callout_b.aspx?content=1628920 ]

Blog Article:  "DDoS Attacks Myths: Does Size Really Matter?"

[ http://blog.radware.com/security/2012/02/ddos-attacks-myths/ ]

ERT Video:  "Fight Cyber Attacks with Radware's Emergency Response Team"

[ http://youtu.be/BWl0cmeiVMc ]

SlideShare Presentation:  "2011 Security Report - Emergency Response Team"

[ http://www.slideshare.net/Radware/ert-2011-annualreportfinal

About Radware

[ Radware ] (NASDAQ: [ RDWR ]), is a global leader of [ application delivery ] and [ application security ] solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit [ http://www.radware.com ].

Radware encourages you to join our community and follow us on; [ LinkedIn ], [ Radware Blog ], [ Twitter ], [ YouTube ] and the [ Radware Connect ] app for iPhone®.  

This press release may contain statements concerning Radware's future prospects that are "forward-looking statements" under the Private Securities Litigation Reform Act of 1995.  These statements are based on current expectations and projections that involve a number of risks and uncertainties.  There can be no assurance that future results will be achieved, and actual results could differ materially from forecasts and estimates.  These risks and uncertainties, as well as others, are discussed in greater detail in Radware's Annual Report on Form 20-F and Radware's other filings with the Securities and Exchange Commission.  Forward-looking statements speak only as of the date on which they are made and Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made.  Radware's public filings are available from the Securities and Exchange Commission's website at [ http://www.sec.gov ] or may be obtained on Radware's website at [ http://www.radware.com ].

Corporate Media Relations:
Michael Lordi
+1-201-785-3206  (office)
+1-201-574-3840  (cell)
[ mikel@radware.com ]

SOURCE Radware Ltd

[ Back to top ]


Publication Contributing Sources