Home / Blogs

New Threats Demand a New Approach to DDoS Protection

Jim Pasquale

In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. Today, sophisticated attackers broadcast their aims to the world, mobilizing participants around socio-political causes. Their aim is to protest, not steal. Of course, if the website of a multinational bank is offline long enough, something has been robbed, be it revenues or public trust.

The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." With protests of all kinds gaining momentum around the world, enterprises should be ready. It's time to forge a plan.

At Neustar we see three key elements to dedicated DDoS protection: people, process and technology.

People: Create a Team of Experts

It's vital to hire credentialed operational and engineering staff with proven experience in DDoS mitigation. Maintain your DDoS swat team as a separate unit practicing a highly specialized and recognized discipline. Be sure to nurture your talent and expertise and, above all, have a round-the-clock presence. Where I work, in the Neustar Security Operations Center, we mitigate attacks from all over the world 24x7.

Process: Document, Automate and Practice

Essential: alerts must be reviewed in real time, given threat assignments and classified per a standard guideline. With an established process, you'll be able to respond faster and more effectively. You'll also want to develop mitigation strategies to blunt the impact of DDoS on your company's services. And remember, if practice doesn't make perfect it beats the heck out of winging it, so run regular drills. Practice your response to different scenarios, so you can assess and fine-tune your incident handling. Your program should involve all stakeholders across the company and be sure to practice regularly — it's how you learn and improve your performance come game time!

Technology: Adapt it to Work for You

Seek-out purpose-built technology that allows some degree of customization to your environment. Whatever you choose, it should allow you to detect and mitigate DDoS attacks quickly. It's also a good idea to implement best practices that restrict all non-business-related traffic to your applications. Finally, deploy multi-layer defenses, giving you comprehensive protection from perimeter to application. (At Neustar, we built this into our DDoS mitigation service 'SiteProtect', knowing sophisticated attackers will probe every point of entry.)

Attacks Are a When, Not If

Of course, such a dedicated approach takes time, money and expertise. Many companies don't have enough of all three, so there's been a surge of interest in affordable, flexible third-party solutions. Our advice: as you do your homework, remember, the best defense is a good offense. With the right people, process and technology, you'll have a winning game plan.

By Jim Pasquale, Jim Pasquale, Sr. Manager, Network and Information Security, Neustar Inc.

Related topics: Cyberattack, Cybercrime, DDoS, DNS, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:


To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Industry Updates – Sponsored Posts

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

Domain Management Handbook from MarkMonitor

i2Coalition to Host First Ever Smarter Internet Forum

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

What Holds Firms Back from Choosing Cloud-Based External DNS?

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud

Data Volumes and Network Stress to Be Top IoT Concerns

DKIM for ESPs: The Struggle of Living Up to the Ideal

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Protect Your Privacy - Opt Out of Public DNS Data Collection

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Measuring DNS Performance for the User Experience

Introducing Verisign Public DNS: A Free Recursive DNS Service That Respects Your Privacy

Sponsored Topics



Sponsored by


Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services

DNS Security

Sponsored by