Share

How to beat a DDoS attack - in real time

Cape Town - As individuals increasingly go online, companies face an increased risk of cyber attacks for a number of reasons.

Some groups like Anonymous launch cyber attacks for ideological reasons, while other groups may simply be interested in extorting money.

In either case, companies (and the individuals who work for them) face a threat from cyber gangs who could paralyse networks and compromise user information.

"The threat posed by DDoS attacks is ever growing and is something that continues to be a topic that interests and concerns businesses in equal measure. As the lines between the professional and social use of technology fade, it is even more important for us to recognise the significance of this type of attack, their probability and the damage they can do," said Martin Walshaw, a senior engineer at F5 Networks.

The company helps firms to organise networks to maximise cloud solutions.

Anonymous

The DDoS or Distributed Denial of Service attack overwhelms a targeted server which crashes, impacting on business productivity and often the bottom line.

Anonymous rocketed to fame when the group used this method for attacking the Recording Industry Association of America and the Motion Picture Association of America successfully over their links with an organisation that attacked The Pirate Bay.

Anonymous in 2010 took down the websites of PayPal, Visa and Mastercard which booted Wikileaks from their accounts.

It is estimated that the financial damage to PayPal alone exceeded $5m.

Anonymous on Monday used the same tactic to target Israeli government departments over the country's war with Hamas in the Gaza Strip.

The war has so far cost nearly 2 000 lives, though most of the dead are Palestinian civilians.

Walshaw says that there are clear strategies that companies and organisations should follow when dealing with possible DDoS attacks.

Tips:

1. Verify that there is an attack - rule out common causes of an outage, such as DNS misconfiguration, upstream routing issues and human error.

 
2. Contact your trouble-shooting team - gather the leaders of operations and applications to verify which areas are being attacked and to officially confirm the attack. Make sure everyone agrees on which areas are affected.
 
3. Triage your applications - make triage decisions to keep your high-value apps alive. When you're under an intense DDoS attack and you have limited resources, focus on protecting revenue generators.
 
4. Protect remote users - keep your business running: Whitelist the IP addresses of trusted remote users that require access and mainlist this list. Populate the list throughout the network and with service providers as needed.
 
5. Classify the attack - what type of attack is it: Volumetric? Slow and low? Your service provider will tell you if the attack is solely volumetric and may already have taken remedial steps.
 
6. Evaluate source address mitigation options - for advanced attack vectors your service provider can't mitigate/ determine the number of sources. Block small lists of attacking IP addresses at your firewall. Block larger attacks with geolocation.

7. Mitigate application layer attacks - identify the malicious traffic and whether it's generated by a known attack tool. Specific application-layer attacks can be mitigated on a case-by-case basis with distinct counter measures, which may be provided by your existing solutions.
 
8. Leverage your security perimeter - still experiencing issues? You could be confronting an asymetric layer 7 DDoS flood. Focus on your application-level defences: Login walls, human detection or Real Browser Enforcement.
 
9. Constrain Resources - if previous steps fail, simply constraining resources, like rate and connection limit is a last resort - it can turn away both good and bad traffic. Instead, you may want to disable or blackhole an application.
 
10. Manage public relations - if the attack becomes public, prepare a statement and notify internal staff. If industry policies allow it, be forthright and admit you're being attacked. If not, cite technical challenges and advise staff to direct all inquiries to the PR manager.


- Follow Duncan on Twitter

We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
19.07
+0.5%
Rand - Pound
23.60
+1.0%
Rand - Euro
20.32
+0.3%
Rand - Aus dollar
12.24
+0.5%
Rand - Yen
0.12
+0.4%
Platinum
943.20
-0.8%
Palladium
1,035.50
+0.6%
Gold
2,388.72
+0.4%
Silver
28.63
+1.4%
Brent Crude
87.11
-0.2%
Top 40
67,314
+0.2%
All Share
73,364
+0.1%
Resource 10
63,285
-0.0%
Industrial 25
98,701
+0.3%
Financial 15
15,499
+0.1%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders