Home / Blogs

The Human Factor in DDoS Attacks

Mark F. Bregman

Ripped from the headlines: A recent DDoS attack lasted an entire 60 days. In other news, a single site was attacked 218 times in Q2 alone.

To those of us in the business of protecting Web infrastructure, these stories are hardly surprising. What's notable, though, is where they were reported, in The Financial, whose focus is banking and financial services, not technology. The reporters used the term "DDoS" as if it were as common as "hedge fund," something everyday business people, not just techies, grasp. It's this human element that caught my interest and got me thinking a little.

Do a quick GOOGLE search of "DDoS attack" and you mainly find two things: news items of companies and governments rocked by large attacks and a proliferation of ads for various mitigation services (including those offered by my company, Neustar). In many of the stories the targets weren't nearly prepared enough.

As for the ads, they predictably push technology and solutions. On-premises hardware vs. cloud-based services, traffic cleaning capacity, etc. Rarely do they mention the talented and dedicated people manning the machines, often in the middle of the night, as they creatively respond to crisis. Their expertise comes from years of training and countless trials by fire. They're the ones on the front lines, helping victims of attacks stay up and running.

So, real people are reporting attacks and real people are responding. That's worth remembering as bankers — or retailers or ad agencies — come to us for assistance. They're being attacked with technology, but for all too human reasons: customer anger, cutthroat competition or the desire to protest some perceived injustice. The more we can explain the problem (and the ways we resolve it) in basic human terms, the better for everyone.

By Mark F. Bregman, Senior Vice President and CTO at Neustar

Related topics: Cyberattack, DDoS, DNS, Security

 
   
WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

It's true, most people aren't prepared for Alexander DeLuca  –  Oct 10, 2011 5:43 AM PDT

It's true, most people aren't prepared for DDoS attacks. To be truly prepared, you need to have robust DNS services. With effective traffic shaping rules in place and a hybrid network, you can survive a DDoS attack with minimal damage.

To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Industry Updates – Sponsored Posts

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Radix Adds Dyn as a DNS Service Provider

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Dyn Partners with the Internet Systems Consortium to Host Global F-Root Nameservers

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

Domain Management Handbook from MarkMonitor

i2Coalition to Host First Ever Smarter Internet Forum

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

What Holds Firms Back from Choosing Cloud-Based External DNS?

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

Data Volumes and Network Stress to Be Top IoT Concerns

DKIM for ESPs: The Struggle of Living Up to the Ideal

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Sponsored Topics

Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Afilias

DNS Security

Sponsored by
Afilias
Port25

Email

Sponsored by
Port25
Verisign

Security

Sponsored by
Verisign