Attacks/Breaches
2/2/2011
12:20 PM
Connect Directly
RSS
E-Mail
50%
50%

DDoS Targeting Firewalls, Intrusion Prevention

Stateful firewalls and intrusion prevention systems placed in front of a Web server can create an effective distributed denial of service attack vector, reports network security vendor Arbor Networks.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Distributed denial of service (DDoS) attacks have broken the 100 Gbps barrier, increasing in bandwidth by 102% over the past year, and by 1000% since 2005.

That finding comes from an infrastructure security report, released on Tuesday by DDoS protection and network security vendor Arbor Networks. The company surveyed 111 self-classified Tier 1, Tier 2, and other IP network operators from around the world, and found the volume and severity of attacks continues to increase.

"Network operators are facing a global Internet insurgency driven by the ubiquity of botnets. This has led to rapidly escalating DDoS attack size, frequency, and sophistication," said Roland Dobbins, a solutions architect at Arbor Networks, in a statement. "Adding to the challenges facing operators is the increasing number of attack vectors, including applications and services, not to mention the proliferation of mobile devices."

Historically, DDoS attacks involved flooding Web servers with so many fake packets that they choked. But Arbor says that attackers are increasingly targeting specific network weaknesses, such as misconfigured domain name servers (DNS), which require relatively fewer resources to knock offline. Last year, according to the report, 77% of network operators detected DDoS attacks targeted at their application layer, including DNS and Web portals.

Surprisingly, placing a stateful firewall (which attempts to track the state of network connections when filtering packets) or intrusion prevention system (IPS) in front of a Web server can create another effective DDoS attack vector. "These devices can render networks more susceptible to attacks as the state tables on even the most scalable versions available can be overwhelmed with a moderate size DDoS attack," said Arbor. Indeed, half of the Internet data center operators surveyed said they'd experienced a firewall or IPS outage as the result of a DDoS attack.

As the sophistication and scale of DDoS attacks continues to increase, the report finds network operators struggling to keep up. In particular, they face insufficient security team funding, a shortage of skilled talent, poorly defined employee responsibilities, and incomplete security policies.

Interestingly, when network operators do experience a security breach, they're unlikely to report it to law enforcement. "This is due to both a lack of network operator resources and a lack of confidence in the ability of law enforcement to successfully investigate these incidents, especially in a multijurisdictional context," said Arbor.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.