An Updated Guide to DDoS Attacks – Interconnections – The Equinix Blog


Nevertheless, politically motivated DDoS assaults are additionally on the rise. The current occasions in Ukraine have led to an ongoing improve in government-sponsored cyberattacks from Russia and counterattacks from Ukraine’s worldwide supporters. The DDoS assaults in opposition to Ukraine have primarily been directed at public broadcast and media corporations, whereas these in opposition to Russia are most frequently focused at banking, monetary providers and cryptocurrency corporations.

Though these assaults are centered in a single explicit area, the broader implications for enterprises and governments in different elements of the world shouldn’t be ignored. The Nationwide Cyber Safety Centre (NCSC) has warned organizations within the U.Okay. to organize for an prolonged interval of heightened threats as a result of Russia-Ukraine battle, and has supplied steering on preserve a strengthened safety posture whereas additionally avoiding workers burnout.[6]

The size of the most important DDoS assaults continues to develop, pushed by new forms of botnets. In November 2021, Microsoft Azure efficiently mitigated the most important DDoS assault ever recorded, at 3.45 Tbps of throughput.[7] Whereas these sorts of super-attacks get a number of consideration within the press, they continue to be comparatively uncommon. Because the graph under reveals, greater than 95% of the 13.9 million DDoS assaults Cisco predicts for 2022 [8] will likely be lower than 500 Mbps. Nevertheless, these smaller assaults can nonetheless be very dangerous to organizations with poor safety postures and unprotected internet-exposed property.

Selecting the perfect interconnection methodology on Platform Equinix

The threats introduced by DDoS assaults are fixed and all the time evolving. To assist our clients construct a safety posture that protects in opposition to these threats, we at Equinix have developed our interconnection product portfolio in step.

From the earliest days Equinix has promoted and nurtured public web providers in our services, however in later years we have now invested considerably in evolving personal interconnection providers for our enterprise clients. By selecting the best mixture of public web and personal interconnection for his or her many alternative use circumstances, our clients can function a globally distributed structure that reliably and securely strikes information the place it’s wanted and protects digital infrastructure, even within the face of accelerating DDoS assaults.

The diagram above illustrates the Equinix interconnection perspective. There needs to be a transparent division between:

  • Public web providers that ship shopper providers similar to streaming, brief and long-form video content material, gaming, social media, cell apps, electronic mail, and extra.
  • Non-public interconnection providers supporting enterprise-grade functions similar to delicate information trade, hybrid or multicloud workloads, edge computing and administration of vital (presumably nationwide) infrastructure.

The results of a denial-of-service assault on enterprise-grade functions or vital infrastructure could also be dire, even existential, for a company. Connecting such property privately reduces publicity of the “assault floor” to the general public web. The black line by means of the middle of the diagram represents a zero-trust security posture that separates personal providers from public providers. It’s there to make sure that personal property stay personal, and that vital IT infrastructure is protected in opposition to cyberattacks.

Equinix Fabric™ is a world on-demand digital providers provisioning platform that helps personal distributed IT and community infrastructure for a lot of of our enterprise and authorities clients. It will probably play a key position in serving to these clients defend themselves in opposition to DDoS assaults and different web vulnerabilities. As an example, clients can use Equinix Cloth to create geo-redundant multicloud infrastructure, permitting them to failover seamlessly if entry to property and workloads in a single location is ever compromised.

As well as, Equinix Cloth presents our clients entry to an ecosystem of industry-leading safety service suppliers. These suppliers provide geo-diverse DDoS mitigation providers and AI-enabled visitors filtering, which assist be certain that solely “clear” visitors passes by means of to the enterprise community, and that there is no such thing as a single uncovered web gateway for cybercriminals to assault.

Take step one towards defending in opposition to web vulnerabilities

Avoiding pointless publicity of vital IT and community infrastructure to the general public web by design needs to be a normal safety consideration.[9] Web safety service suppliers play a key position in defending the cloud and IT infrastructure that organizations have come to depend on. At Equinix, we’re proud to host and accomplice with all main safety suppliers, making their providers obtainable to extra clients in additional locations.

For a more in-depth take a look at how Equinix helped one buyer implement personal interconnection providers to protect its infrastructure from pointless publicity to the general public web, read the SBI Sumishin case study. With Equinix Cloth and different digital providers on Platform Equinix, this Japanese financial institution can now hook up with the cloud rapidly and reliably, all whereas assembly the stringent safety necessities of the monetary providers sector.

 

 

[1] F5 Labs, “2022 Application Protection Report: DDoS Attack Trends

[2] Akamai, “The Relentless Evolution of DDoS Attacks

[3] Netscout, “DDoS Attacks in 2020

[4] The Cloudflare Weblog, “DDoS attack trends for 2022 Q2

[5] Zscaler, “Zscaler ThreatLabz 2022 Ransomware Report Reveals Record Number of Attacks and Nearly 120% Growth in Double Extortion Ransomware

[6] Nationwide Cyber Safety Centre, “NCSC urges organisations to prepare for the long haul on Russia-Ukraine”

[7] A10 Networks, “Five Most Famous DDoS Attacks and Then Some

[8] Cisco Annual Internet Report (2018-23) White Paper

[9] Nationwide Cyber Safety Centre, “Vulnerability Management



Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button