Neustar Announces Its 2016 Top 4 Trends in DDoS Security

Photo: Shutterstock

Neustar (NYSE:NSR), a real-time provider of cloud-based information services, with its services also including DDoS protection, DNS packages and website performance solutions, looks ahead to what’s in store for 2016, examining some emerging trends that are likely to affect DDoS security requirements.

Trend 1: IoT Security
As more and more devices become tied into the Internet every day, the security threat will continue to expand to new industries and areas. As such, there needs to be a core focus on security practices before any other. This is not yet happening, however, which makes the IoT space scary as it is not yet well versed in building secure applications or defining the controls.

Through 2016, the proliferation of IoT connected devices will put pressure on manufacturers of these devices to get to grips with IoT security control, because the bottom line is, if it isn’t secure we shouldn’t purchase it no matter how amazing the connectivity is – the Jeep Cherokee hack is a good example of connectivity overtaking security without a positive outcome.

Trend 2: Attacks through Apps
Apps are now collecting a huge amount of data, which means Application security must take a leading role in IoT device security. An attack entry point via an app on a mobile device may well be able to access a whole company network.

2016 will see many more companies recognizing this threat and applying for a professional vulnerability assessment that identifies potential security holes in networks, wireless networks and applications, including patch levels, router configuration issues and other potential problems such as user verification.

Trend 3: New Methods for Old Cons
When it comes to crime, it is true to say ‘there is nothing new in the world’. In the world of cybercrime, the kudos from being able to take down a high profile website is changing into the old fashioned desire to achieve simple financial gain.
Cybercriminals are using the old but tried and tested scams such as extortion and blackmail and repurposing them for the Internet. 2016 will continue to see more of the type of DDos attacks that are on a small scale, not enough to take a site down but enough to work as a distraction whilst a hacker is uploading malware to exploit a vulnerability such as exploiting a server or to steal Personal Identifiable Information (PII), Credit Card numbers, Banking Account numbers, etc.

Another new method for an old con is the extortion ransom note. Again a DDoS attack might not be large enough to crash a website but just large enough to get noticed. This is then followed-up with an email claiming responsibility and threatening a worse attack if money isn’t paid.

Trend 4: TCP Amplification Attacks

A possible new wave of DDoS attacks that could cause very large scale disruption in 2016 are UDP Amplification attacks whereby relatively small requests, with spoofed source addresses, are sent to public hosts (e.g., NTP servers), which then reflect significantly larger responses to the victim of the attack.

This UDP Amplification attack, just like the more traditional type of DDoS attack, could cause a great amount of disturbance unless professional DDoS mitigation is in place ahead of time.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

Quis autem vel eum iure reprehenderit qui in ea voluptate velit esse quam nihil molestiae consequatur, vel illum qui dolorem?

Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet.

Copyright © 2015

To Top