Attacks/Breaches
2/2/2011
12:20 PM
50%
50%

DDoS Targeting Firewalls, Intrusion Prevention

Stateful firewalls and intrusion prevention systems placed in front of a Web server can create an effective distributed denial of service attack vector, reports network security vendor Arbor Networks.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Distributed denial of service (DDoS) attacks have broken the 100 Gbps barrier, increasing in bandwidth by 102% over the past year, and by 1000% since 2005.

That finding comes from an infrastructure security report, released on Tuesday by DDoS protection and network security vendor Arbor Networks. The company surveyed 111 self-classified Tier 1, Tier 2, and other IP network operators from around the world, and found the volume and severity of attacks continues to increase.

"Network operators are facing a global Internet insurgency driven by the ubiquity of botnets. This has led to rapidly escalating DDoS attack size, frequency, and sophistication," said Roland Dobbins, a solutions architect at Arbor Networks, in a statement. "Adding to the challenges facing operators is the increasing number of attack vectors, including applications and services, not to mention the proliferation of mobile devices."

Historically, DDoS attacks involved flooding Web servers with so many fake packets that they choked. But Arbor says that attackers are increasingly targeting specific network weaknesses, such as misconfigured domain name servers (DNS), which require relatively fewer resources to knock offline. Last year, according to the report, 77% of network operators detected DDoS attacks targeted at their application layer, including DNS and Web portals.

Surprisingly, placing a stateful firewall (which attempts to track the state of network connections when filtering packets) or intrusion prevention system (IPS) in front of a Web server can create another effective DDoS attack vector. "These devices can render networks more susceptible to attacks as the state tables on even the most scalable versions available can be overwhelmed with a moderate size DDoS attack," said Arbor. Indeed, half of the Internet data center operators surveyed said they'd experienced a firewall or IPS outage as the result of a DDoS attack.

As the sophistication and scale of DDoS attacks continues to increase, the report finds network operators struggling to keep up. In particular, they face insufficient security team funding, a shortage of skilled talent, poorly defined employee responsibilities, and incomplete security policies.

Interestingly, when network operators do experience a security breach, they're unlikely to report it to law enforcement. "This is due to both a lack of network operator resources and a lack of confidence in the ability of law enforcement to successfully investigate these incidents, especially in a multijurisdictional context," said Arbor.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.