Enlisting blockchain tech in the war against DDoS onslaughts

215 total views, 3 views today

Distributed Denial of Service (DDoS) attacks are certainly on the rise. Arbor’s 13th Annual Worldwide Infrastructure Security Report showed that 33 percent of surveyed organisations suffered a DDoS attack in 2017 (this is sharply up from the previous year’s 17 percent).

The modus operandi is elegantly simple: DDoS attackers infect large numbers of devices with malware (it could be smartphones, computers, or any other form of connected device), mutating them into bots that are then used to flood the servers of the victim organisation.

The aim of a DDoS attack is to overwhelm the target website’s server with massive volumes of traffic and cause it to crash. Companies that rely heavily on their digital presence experience a loss of business, and of course the reputational damage associated with ‘being down’.

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, says that technology like Arbor’s has been continually refined over the years, “to deal with each subtle new DDoS tactic and stay one step ahead of the attackers.

“Today, blockchain represents an exciting new technology that could have a huge impact on how we as a security industry go about protecting clients from DDoS threats,” he explains.

Distributing bandwidth

Blockchain, also called ‘distributed ledgers’, is essentially a computing platform that has no single point of failure, where records of transactions and interactions can be stored across vast numbers of computers. Nobody ‘owns’ the database. No one person is able to control or manipulate it.

The distributed ledger is dispersed throughout the internet, allowing for the fluid (but also secure) sharing and validating of information. Due to the very structure of the platform, only authorised parties are able to create records for the part of the ‘chain’ that relates to their transactions. The broader blockchain community then witnesses and verifies the transaction – preventing it from being lost, tampered with or corrupted in any way.

It allows for the sharing of value and information through a nearly-incorruptible digital ledger.

Hamman says that “one such asset could be unutilised bandwidth that a company could ‘rent’ to other companies that are suffering from DDoS attacks at a given moment, to help absorb the effects of the malicious traffic.”

In this way, organisations could purchase additional bandwidth only when they need it to defend against attacks.

“A number of innovative start-ups are exploring how the blockchain can be harnessed, to enable thousands of computers across the world to share their excess bandwidth across peer-to-peer networks, while facilitating seamless cryptocurrency payments for these transactions,” he clarifies.

Reducing the attack vectors

Others are exploring how blockchain infrastructure could enable us to build global databases of all the IP addresses that are used in the various DDoS attacks taking place on any day, Hamman says.

“Using smart contract enabled by distributed ledger technology, this verified database could help DDoS defence software to identify emerging threats, and keep up to date with real-time insights into the addresses that are currently being used to launch attacks.”

Even within the enterprise, blockchain technology can be applied to create a decentralised network of servers – with each one providing extra bandwidth resources when a particular server comes under pressure from DDoS traffic. Industry website BlockchainCan.com* explains that “because blockchain is a decentralised service, it’s harder for attackers to target a specific vector to attack to take a particular service offline.”

Hamman says that, in general, security professionals have been very quick to imagine and start capturing the advantages of distributed ledger technology.

“It is a network construct that combines some very powerful innovations – sequential hashing and cryptography, combined with a decentralised foundation – which make distributed ledgers a very attractive proposition for cyber-security experts.”

In the specific area of DDoS, he says specialists like Arbor are actively exploring how blockchain (as well as other ‘frontier’ technologies like artificial intelligence) can further bolster the defences that they provide to clients.

“As DDoS threats continually morph, we’ll make use of the very latest available technologies, to always remain one step ahead of the threats.”


For more information about Arbor in Africa, please contact Bryan Hamman at bhamman@arbor.net.

About Arbor NetworksArbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context so customers can solve problems faster and reduce the risks to their business.

To learn more about Arbor products and services, please follow us on Twitter @ArborNetworks. Arbor’s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Trademark Notice: Arbor Networks, the Arbor Networks logo and ATLAS are all trademarks of Arbor Networks, Inc. All other brands may be the trademarks of their respective owners.

Ghana News Online

The primary function of GhanaNewsOnline.com.gh is to gather, process and distribute news about Ghana and Africa to the World. To serve as a News Agency with the mandate to present complete, in-depth objective and impartial information, news, and features rooted in investigative journalism.

Leave a Reply

Your email address will not be published. Required fields are marked *