Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Pat Romanski, Mehdi Daoudi

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, Microsoft Cloud, @CloudExpo, Cloud Security

Containers Expo Blog: Blog Feed Post

Directed DDoS Attacks as Screens

Hiding behind that DDoS attack is a nightmare. Stop it before the nightmare comes true

Military science has a simple mechanism utilized at almost every level of both tactical and strategic thinking: Pin the enemy down with a distraction (a feint or an actual attack, either way), and then hit them where they’re not looking. This maxim has worked very well from squad level tactics where you pin them down with a base of fire while half the squad creeps around the enemy to hit them from the side to strategic tactics like when you attack on the entire front, but keep a massive reserve to push through any point that shows weakness. While the correlations of security to warfare can grow rather tiresome, sometimes, they are the correct correlations. The manner in which DDoS attacks are increasingly being used is well defined by this military maxim.

Picture from ArmChairGeneral.com Kursk, 76 years ago the day this blog was posted. The space in the middle between the darker red lines is where the Soviet army found weakness in the German lines around Prokhorovka. After a general counter-offensive, this weak spot is where they poured their reserves and ended the last major German offensive of WWII.

Why is that? The trend for DDoS attacks is to use the DDoS to mask some other intention – literally using it as a massive assault, so a few targeted attacks can be hidden within to try and break through the defenses of the organization being attacked. The methods range from highly sophisticated to pretty straight-forward, but there is a lot of sense in utilizing this tactic. First off, if the security team is focused on the DDoS, there’s a chance they’ll miss the more targeted attacks. Second off, with millions of connections occurring, the attack of a few packets might be overlooked, and third, while adjusting things to deal with the DDoS, security or other IT staff might well make a change that opens the door to one of these targeted attacks.

The aim is to get inside and steal data, the distraction is the DDoS, which is a very real attack, but forces the defender to split resources, or even dedicate all resources to defending against the DDoS. As in warfare, sometimes this tactic is staggeringly successful, and sometimes not. Even when not successful, the damage done to business can be immense. In the month before this blog post was written, nearly every major US bank had experienced DDoS attacks, with most suffering some form of reduced service or even outage during the attacks. The linked to article does not include others who were targeted after the date of publication, so the total number of US banks is pretty large.

And if you think that banks are being targeted enmasse for some random outside reason, I’ve got a highly influential spot on the Anonymous board of directors to sell you.

The DDoS attacks being waged against banks are for some other, more nefarious reason, and while I don’t know what that is at the moment, they’re banks. That does make it easy to speculate “financial gain” in one form or another.

The thing is, there are a variety of ways to stop such attacks, including utilizing our own BIG-IP (meant to handle outrageous volumes of requests, and able to identify most DDoS methods before they reach your servers) to stop DDoS dead in its tracks. The problem is that we often don’t treat security seriously until it is a problem. If you’re a large enough organization, at this point you should be able to determine that you will at some point be the target of a DDoS attack. If you’re a financial institution, no matter how small, you should be able to come to that same conclusion. So stop waiting for services to go down, find some money in the budget, do some research, and put something in place. Most major banks started to address DDoS last year, and took a closer look at it again in April – the last two targeted waves of attacks – but not all. There are a ton of reasons why some didn’t, but the trend is now obvious, procrastinating may hurt.

My co-worker David Holmes has written about mitigating a lot of these attacks here, and his approach is just one of several. In fact, if you search his blog for DDoS or Attack Mitigation, you get a ton of valuable information.

The thing is that pretty clearly there’s an ulterior motive to these attacks, and stopping the DDoS stands a good chance of either exposing or stopping whatever the ulterior motive is. And in banking, blocking ulterior motives is a way of life, no?

Many banking websites disabled logins during the attacks on their premises, but this alone can cause customer flight for the people who do all of their banking online. It’s their money, they tend to get testy if you won’t let them at it. Rumors abound, for example, that Citibank blocked logins for days and only slowly returned functionality. Meanwhile, customers were stewing. That’s a problem they will have to resolve outside the technological realm, but is also a proof that the easy answers – take the website down, protect customers’ money by disabling logins, etc – are not good enough. I’m not picking on Citi here, they were just the one I was pointed at by online friends, other big financial firms did much the same thing while under these attacks.

The security of our financial information is of tantamount importance to all of us. Banks do a very good job of protecting that information (consider number of breaches versus number of transactions or accounts as a measure), but in a changing environment they must consider doing even more. DDoS prevention appears to be a staple of FSI security moving forward. And as is always the case with security and the Internet, that will solve the current round of problems, but with billions of people on the internet, another challenge is just a mouse-click away.

Here’s hoping that none of the hidden agendas were realized while those attacks were going on, and here’s to security folks who now have to be more alert about other parts of security while defending against a DDoS. Thanks for doing what you do, most of the people out here have no idea how effective you are at keeping our data safe. And that’s probably for the best.

Read the original blog entry...

More Stories By Don MacVittie

Don MacVittie is founder of Ingrained Technology, A technical advocacy and software development consultancy. He has experience in application development, architecture, infrastructure, technical writing,DevOps, and IT management. MacVittie holds a B.S. in Computer Science from Northern Michigan University, and an M.S. in Computer Science from Nova Southeastern University.

@ThingsExpo Stories
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...