Click here to close now.



Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Pat Romanski, Harry Trott, Jenny Fong

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, Microsoft Cloud, @CloudExpo, Cloud Security

Containers Expo Blog: Blog Feed Post

Directed DDoS Attacks as Screens

Hiding behind that DDoS attack is a nightmare. Stop it before the nightmare comes true

Military science has a simple mechanism utilized at almost every level of both tactical and strategic thinking: Pin the enemy down with a distraction (a feint or an actual attack, either way), and then hit them where they’re not looking. This maxim has worked very well from squad level tactics where you pin them down with a base of fire while half the squad creeps around the enemy to hit them from the side to strategic tactics like when you attack on the entire front, but keep a massive reserve to push through any point that shows weakness. While the correlations of security to warfare can grow rather tiresome, sometimes, they are the correct correlations. The manner in which DDoS attacks are increasingly being used is well defined by this military maxim.

Picture from ArmChairGeneral.com Kursk, 76 years ago the day this blog was posted. The space in the middle between the darker red lines is where the Soviet army found weakness in the German lines around Prokhorovka. After a general counter-offensive, this weak spot is where they poured their reserves and ended the last major German offensive of WWII.

Why is that? The trend for DDoS attacks is to use the DDoS to mask some other intention – literally using it as a massive assault, so a few targeted attacks can be hidden within to try and break through the defenses of the organization being attacked. The methods range from highly sophisticated to pretty straight-forward, but there is a lot of sense in utilizing this tactic. First off, if the security team is focused on the DDoS, there’s a chance they’ll miss the more targeted attacks. Second off, with millions of connections occurring, the attack of a few packets might be overlooked, and third, while adjusting things to deal with the DDoS, security or other IT staff might well make a change that opens the door to one of these targeted attacks.

The aim is to get inside and steal data, the distraction is the DDoS, which is a very real attack, but forces the defender to split resources, or even dedicate all resources to defending against the DDoS. As in warfare, sometimes this tactic is staggeringly successful, and sometimes not. Even when not successful, the damage done to business can be immense. In the month before this blog post was written, nearly every major US bank had experienced DDoS attacks, with most suffering some form of reduced service or even outage during the attacks. The linked to article does not include others who were targeted after the date of publication, so the total number of US banks is pretty large.

And if you think that banks are being targeted enmasse for some random outside reason, I’ve got a highly influential spot on the Anonymous board of directors to sell you.

The DDoS attacks being waged against banks are for some other, more nefarious reason, and while I don’t know what that is at the moment, they’re banks. That does make it easy to speculate “financial gain” in one form or another.

The thing is, there are a variety of ways to stop such attacks, including utilizing our own BIG-IP (meant to handle outrageous volumes of requests, and able to identify most DDoS methods before they reach your servers) to stop DDoS dead in its tracks. The problem is that we often don’t treat security seriously until it is a problem. If you’re a large enough organization, at this point you should be able to determine that you will at some point be the target of a DDoS attack. If you’re a financial institution, no matter how small, you should be able to come to that same conclusion. So stop waiting for services to go down, find some money in the budget, do some research, and put something in place. Most major banks started to address DDoS last year, and took a closer look at it again in April – the last two targeted waves of attacks – but not all. There are a ton of reasons why some didn’t, but the trend is now obvious, procrastinating may hurt.

My co-worker David Holmes has written about mitigating a lot of these attacks here, and his approach is just one of several. In fact, if you search his blog for DDoS or Attack Mitigation, you get a ton of valuable information.

The thing is that pretty clearly there’s an ulterior motive to these attacks, and stopping the DDoS stands a good chance of either exposing or stopping whatever the ulterior motive is. And in banking, blocking ulterior motives is a way of life, no?

Many banking websites disabled logins during the attacks on their premises, but this alone can cause customer flight for the people who do all of their banking online. It’s their money, they tend to get testy if you won’t let them at it. Rumors abound, for example, that Citibank blocked logins for days and only slowly returned functionality. Meanwhile, customers were stewing. That’s a problem they will have to resolve outside the technological realm, but is also a proof that the easy answers – take the website down, protect customers’ money by disabling logins, etc – are not good enough. I’m not picking on Citi here, they were just the one I was pointed at by online friends, other big financial firms did much the same thing while under these attacks.

The security of our financial information is of tantamount importance to all of us. Banks do a very good job of protecting that information (consider number of breaches versus number of transactions or accounts as a measure), but in a changing environment they must consider doing even more. DDoS prevention appears to be a staple of FSI security moving forward. And as is always the case with security and the Internet, that will solve the current round of problems, but with billions of people on the internet, another challenge is just a mouse-click away.

Here’s hoping that none of the hidden agendas were realized while those attacks were going on, and here’s to security folks who now have to be more alert about other parts of security while defending against a DDoS. Thanks for doing what you do, most of the people out here have no idea how effective you are at keeping our data safe. And that’s probably for the best.

Read the original blog entry...

More Stories By Don MacVittie

Don MacVittie is currently a Senior Solutions Architect at StackIQ, Inc. He is also working with Mesamundi on D20PRO, and is a member of the Stacki Open Source project. He has experience in application development, architecture, infrastructure, technical writing, and IT management. MacVittie holds a B.S. in Computer Science from Northern Michigan University, and an M.S. in Computer Science from Nova Southeastern University.

@ThingsExpo Stories
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...