Attacks/Breaches
2/2/2011
12:20 PM
50%
50%

DDoS Targeting Firewalls, Intrusion Prevention

Stateful firewalls and intrusion prevention systems placed in front of a Web server can create an effective distributed denial of service attack vector, reports network security vendor Arbor Networks.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Distributed denial of service (DDoS) attacks have broken the 100 Gbps barrier, increasing in bandwidth by 102% over the past year, and by 1000% since 2005.

That finding comes from an infrastructure security report, released on Tuesday by DDoS protection and network security vendor Arbor Networks. The company surveyed 111 self-classified Tier 1, Tier 2, and other IP network operators from around the world, and found the volume and severity of attacks continues to increase.

"Network operators are facing a global Internet insurgency driven by the ubiquity of botnets. This has led to rapidly escalating DDoS attack size, frequency, and sophistication," said Roland Dobbins, a solutions architect at Arbor Networks, in a statement. "Adding to the challenges facing operators is the increasing number of attack vectors, including applications and services, not to mention the proliferation of mobile devices."

Historically, DDoS attacks involved flooding Web servers with so many fake packets that they choked. But Arbor says that attackers are increasingly targeting specific network weaknesses, such as misconfigured domain name servers (DNS), which require relatively fewer resources to knock offline. Last year, according to the report, 77% of network operators detected DDoS attacks targeted at their application layer, including DNS and Web portals.

Surprisingly, placing a stateful firewall (which attempts to track the state of network connections when filtering packets) or intrusion prevention system (IPS) in front of a Web server can create another effective DDoS attack vector. "These devices can render networks more susceptible to attacks as the state tables on even the most scalable versions available can be overwhelmed with a moderate size DDoS attack," said Arbor. Indeed, half of the Internet data center operators surveyed said they'd experienced a firewall or IPS outage as the result of a DDoS attack.

As the sophistication and scale of DDoS attacks continues to increase, the report finds network operators struggling to keep up. In particular, they face insufficient security team funding, a shortage of skilled talent, poorly defined employee responsibilities, and incomplete security policies.

Interestingly, when network operators do experience a security breach, they're unlikely to report it to law enforcement. "This is due to both a lack of network operator resources and a lack of confidence in the ability of law enforcement to successfully investigate these incidents, especially in a multijurisdictional context," said Arbor.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2001-1594
Published: 2015-08-04
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, an...

CVE-2002-2445
Published: 2015-08-04
GE Healthcare Millennium MG, NC, and MyoSIGHT has a default password of (1) root.genie for the root user, (2) "service." for the service user, (3) admin.genie for the admin user, (4) reboot for the reboot user, and (5) shutdown for the shutdwon user, which has unspecified impact and attack vectors.

CVE-2002-2446
Published: 2015-08-04
GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors.

CVE-2003-1603
Published: 2015-08-04
GE Healthcare Discovery VH has a default password of (1) interfile for the ftpclient user of the Interfile server or (2) "2" for the LOCAL user of the FTP server for the Codonics printer, which has unspecified impact and attack vectors.

CVE-2004-2777
Published: 2015-08-04
GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002...

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!