We Shut It Down
Isolate. Mitigate. Deny.
DoS stands for “denial of service” and refers to an attack that overwhelms a system with data.
A DoS attack is performed from a single computer and is less common today than DDoS attacks.
Again, DoS stands for “denial of service” and refers to an attack that overwhelms a system with data.
In a DDoS attack, the first "D" stands for distributed and that simply means that many computer across the internet are engaged, sometimes hundreds or thousands at a time.
More often than not, the computers being used in the attack are not knowingly participating but rather are compromised systems from home computers, routers, and even CCTV cameras that are controlled by hackers as part of what's called a "botnet".
Simply put, a botnet is a number of Internet-connected devices that communicate with other similar devices to complete repetitive tasks and objectives. It is a combination of the words robot and network.
A zombie botnet is the group of hacker-controlled computers and/or devices that can be enlisted by the hacker without their owners knowledge.
A computer can be turned into a "bot" through malware on infected websites, through spam file attachments, and sometimes just through known vulnerabilities in operating systems or devices.
The growth of IoT according to industry experts will triple by 2020 from 10B devices to 34B, and the industry will spend $6T over the same period. IoT devices are lacking the most basic security protocols and continue to be developed without security in mind. It’s possible to hack them in as little as 3 minutes, and the government regulators have not defined any security standards for IoT.
The Mirai code was released to the world in late September on a hacker forum. The malware code uses vulnerabilities within IoT devices to enlist them in a Botnet army to conduct DDoS attacks. The most notable Mirai attack so far has been against the DNS provider, Dyn Inc, that caused widespread internet outages on the East Coast of the US on October 21, 2016.
Traditional DDoS protection is either an appliance at the client location or in the cloud as a service. Most do not have full 7-layer OSI model protection and require additional technology to protect against all DDoS threat vectors.
Axiom Sentinel was designed for enterprise clients who need a complete solution in a single appliance.
Ten years ago DDoS attacks seldom exceeded 10Gbps. On September 20, 2016, the Krebs on Security site was hit with a massive 620Gbps DDoS. Most traditional DDoS protection can only mitigate up to a 1-2 TB attack.
Axiom Sentinel can absorb an attack up to 10Tbps and can be deployed into a cloud service.
Most DDoS protection devices are single-threaded and only handle DDoS attacks.
Axiom Sentinel is a complete full-featured solution that cannot only protect against DDoS attacks, but also is a next generation firewall with IDS/IPS functionality, advanced ransomware protection, and behavioral heuristic analysis capabilities.
Traditional DDoS protection technology requires baseline testing to define “normal” traffic prior to implementation. It can take several days to install the solution.
Axiom’s DDoS protection platform requires minimal support, installs in minutes, and is a fully functional “out of the box” solution.