DDoS attacks can be prevented
With the Cyber Security Hysteria on the rise, many organisation are simply ignoring the basic security requirements that can be implemented to prevent Denial of Service attacks. Off course, no network is fully secure but organisation need to do more to secure these sort of attacks.
DDoS or Denial of Service is a type of attack where the target is flooded with uncontrollable number of packets generated from multiple computers. These days these kind of attacks are initiated by creating ‘fuzzing techniques’ that generate hundred of thousands of data packet requests. These are pieces of scripts coded by malicious programmers to bring a particular network down.
The hackers are making use of insecure IoT (Internet of Things) or smart devices to launch DDoS attack. This is another problem worth addressing as many of our devices are migrating to cloud based smart access but there is a little mention of security.
Everyday hundreds and thousand of these DDoS attacks are initiated, but only few are successful. There are theories about DDoS being unstoppable but in my view these attacks can be prevented.
Instead of wasting time worrying about the unknown, businesses should be implementing the full range of protections against what can be stopped. Adding multiple layer of protection to the network also known as ‘Defense in Depth’ approach in security terms. Moving secure devices away from public access behind multiple layers of security that includes firewalls, Intrusion Detection Systems, Intrusion Prevention Systems and Honeypots are vital in achieving maximum security of a network.
Honeypots are networking devices that appear to be real, have their own Internet working Operating System (IOS). Honeypots are not connected to the live networks. In fact they are mainly used by the network administrators to note the behavior and techniques hackers are using to scan a network prior to launching any network attack. Several Honeypot systems can be deployed in the Demilitarized Zone (DMZ) that has a series of public facing servers and devices. Honeypots can lure the hackers to penetrate into these fake servers or networking devices, their techniques and behavior can be recorded. The data recorded from any unusual activity can be used to quarantine any suspicious traffic.
Control over Bandwidth – Organisation should only subscribe to required bandwidth of networks, any extra bandwidth is a potential pipeline that can be used to flood the networks.
Close Packed Monitoring – Continuous security monitoring of the data generated by routers and switches coupled with DDoS mitigation tools is very important.
Hardening Devices – Ensuring the right number of nodes on Linux or Apache servers can make it harder for attacker to bring the services down.
To recapitulate, cyber security should be a top priority for every business and a foolproof security and layered design is required to combat cyber attacks.