Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronize the clock on your laptop, smartphone, tablet, and network infrastructure devices — would be abused to cause so much damage? NTP reflection/amplification DDoS attacks are the current weaponized DDoS technique of choice for DDoS attacks, especially those 1 Gb/sec and larger – with some now exceeding 300 Gb/second. Attacks of 100 Gb/second have become fairly common, as tools have armed slews of copycat attacks. Even small DDoS attack volumes are able to impact availability and disrupt the performance of servers, applications, or services that are brittle, fragile and non-scalable. Large attacks generate significant collateral damage en route to their target due to their extreme bandwidth consumption on ISP networks and at their various interchange points.Read more
Topics Trending in Cyber Security, DDoS, and Advanced Threat Detection
In a world in which the threats get smarter every day, how do organizations defend against what they can’t see?
In my previous two posts looking at some of the findings from the Arbor Networks-sponsored Economist Intelligence Unit (EIU) report Cyber incident response: Are business leaders ready?, I explored the increasing number of threats facing organizations around the world and their readiness to respond to those issues.
The report – based on a survey of more than 360 senior execs from around the globe – reveals that while more than three quarters of organizations have suffered a cybersecurity incident of some kind in the past two years, 65% have created a formal incident response team to deal with those threats, with almost a fifth preparing to do so soon.
In this final blog on the EIU report, I wanted to touch briefly on the net result of advance preparation; what are the business benefits to being better prepared against IT security threats?Read more
In my blog post yesterday, I discussed some of the headline findings from the new Arbor Networks-sponsored Economist Intelligence Unit (EIU) report Cyber incident response: Are business leaders ready?
The report (which can be downloaded free of charge here), is based on a survey of 360 senior executives from across the world. In my last post, I discussed the finding that – while security threats are on the rise across the board – many organizations believe that defending successfully against those threats represents a chance to enhance the corporate reputation of that business.
Naturally, that wasn’t the only line of questioning. The EIU also explored exactly how well prepared those firms are when it comes to incident response. So what did they discover?Read more
It seems like we joined Arbor years ago, what with everything that has been happening and the progress we have made, but the reality is that it has only been a few months! Since September, we have been busy on many fronts including setting up new facilities, growing our incredible development team and readying the Packetloop product for launch under the Arbor banner as Pravail Security Analytics. This level of activity is equal parts exhilarating and stressful, but is only possible when integrating into a world-class team like Arbor.Read more
If you’re a regular visitor to our blog, or just have a keen eye on IT security generally, then you’ll already know that barely a day goes by without a new attack emerging to challenge businesses around the globe.
With organizations of all kinds falling prey to data loss, hacking and other malicious attacks on a daily basis, cybersecurity has moved from niche area of interest to mainstream news.
One of the consequences of this heightened awareness around cyberthreats is that it now takes something truly gigantic to make headlines.Read more
DDoS attacks are larger than ever. Our 9th annual Worldwide Infrastructure Security Report illustrates this point very clearly with the largest reported DDoS attack in 2013 clocking in at 309 Gbps. ATLAS data corroborates the report, with 8x the number of attacks over 20Gb/sec monitored in 2013 (as compared to 2012). And, 2014 is already shaping up to be a big year for attacks with a widely reported NTP reflection attack of 300Gbps+, and multiple attacks over 100Gbps, in early February.Read more
Despite the NSA controversy, RSA this year was packed with 25K attendees and a global gathering compared to the event even 5+ years ago. While last year was focused on APT and sandboxes, this year’s key themes were centered on how to “connect the dots of an attack” with incident response, analytics and machine learning, authentication and monitoring of Cloud apps and resources and securing the “Internet of Things;” all were themes heard among the major show floor and coffee shop chatter.Read more
As I write this, I’m surrounded by 70,000 others who conduct the yearly pilgrimage to Barcelona, Spain for Mobile World Congress (MWC). What’s different for Arbor Networks at this year’s show is we announced and showcased our new Peakflow Mobile Network Analysis product. As many of you know, MWC is HUGE as it draws everyone and anyone associated with massive ecosystems of mobility. As you walk through the miles of exhibit halls, you are bombarded with all sorts of messages ranging from mobile device vendors promoting their latest and greatest smartphones and “phablets,” to TEM vendors showcasing their virtual Evolved Packet Cores (vEPCs) to mobile operator’s plans for 5G! (can you believe it?)
Sophisticated and persistent targeted network attacks have challenged today’s enterprise security teams— and searching for the root cause of the attack often feels like looking for a needle in a haystack.
Monitoring network traffic remains a crucial component of an enterprise’s security strategy, but gaining context into the massive amounts of data collected from your network, in a timely fashion, is still a hurdle for many enterprise security teams. Incident responders are ultimately looking for ways to definitively identify threats so they can assess the risk of infection and take the necessary steps to remediate.
Today’s big data capabilities are being harnessed to address this challenge. Arbor Networks invites you to attend a webinar hosted by Scott Crane, founder of Packetloop, recently acquired by Arbor Networks. Scott will discuss today’s network forensic analysis tools that enable security teams to flag suspicious activity faster, focusing on the critical few, and identify the threats within their network environment before they impact business.
Attend this webcast to learn:
• The advantages of using big data and security analytics to detect incoming or planted threats and prepare for incident response
• Ways to deploy security analytics tools that work best with your current infrastructure and optimize your security team’s time
• Using security analytics to store data to reconstruct attack timelines, extent and impactRead more
As we’ve just put the finishing touches on the 9th annual Worldwide Infrastructure Report (WISR), we invited the three authors to share their thoughts on what key findings were most intriguing and/or surprising this year.
If you’d like to review the full report, feel free to download it here. You can also download infographics and select charts from this years’ report on our Pinterest page or download the presentation of key findings at Slideshare.
For a deeper dive into the key findings, join today’s webinar at 1pm ET.