Westcon highlights Arbor Networks 8th annual worldwide infrastructure security report
Arbor Networks Inc., a leading provider of network security and management solutions for enterprise and service provider networks, released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s network operators. Among the key findings this year, advanced persistent threats (APTs) are top of mind for both service providers and enterprises; distributed denial of service (DDoS) attacks have plateaued in size but become more complex; data center and cloud services are especially attractive targets; and mobile operators continue to be reactive in terms of network visibility. The report also covers the impact of BYOD as well as infrastructure issues such as VoIP and IPv6.
Based on survey data provided by network operators from around the world, this annual report is designed to help network operators make more informed decisions about their security strategies as they relate to the integrity of mission-critical Internet and other IP-based infrastructure. Arbor’s long-standing customer relationships and reputation as a trusted advisor and solution provider make this report possible each year.
Middle East IT security veteran, Lakshman Nalvade states that the findings of the report accurately reflect the region's threat landscape. Mr. Lakshman who is the Divisional Manager of Westcon Emerging Technologies, a value-added distributor for Arbor Networks in the Middle East, said, “DDoS attacks are becoming a prime concern for many enterprises in the Middle East. Consumers are demanding that more services be made available though online portals and attackers are recognizing the damage they can inflict upon the businesses by targeting these channels.”
He believes the WISR report can help CIOs and IT managers make better informed decisions regarding their long term IT plans, “Cloud computing is set to become the next big trend in the region which is why telcos, government and private organizations are starting to closely examine the readiness of their networks both from the point of view of performance as well as security. The Arbor Network report is an excellent tool to help them identify the key areas that they need to focus upon.”
Advanced Persistent Threats (APTs) a Top Concern for Service Providers and Enterprises.
61 percent named ‘botted’ or otherwise compromised hosts as top concern.
55 percent named Advanced Persistent Threats (APTs) as top concern.
Advanced threats are a well-established problem for enterprise network operators. This year’s survey found an increased level of concern over ‘botted’ or compromised machines on provider networks. The increase in botted hosts is not surprising given the number and complexity of malware variants that exist, their rate of evolution and the consequent inability of Intrusion Detection Systems (IDS) and Anti-Virus (AV) systems to fully protect them. Looking ahead, there is even more concern about APT, industrial espionage, data exfiltration and malicious insiders.
DDoS: Attack Sizes Plateau; Complex Multi-Vector Attacks on the Rise
Largest attack reported was 60 Gbps, same as 2011; 2010 attack peak was 100 Gbps.
46 percent reported multi-vector attacks.
This year’s results confirm that application-layer and multi-vector attacks are continuing to evolve while volumetric attacks are starting to plateau in terms of size. While 86 percent reported application-layer attacks targeting Web services, most concerning is that multi-vector attacks are up markedly. Attackers have now turned to sophisticated, long-lived, multi-vector attacks – combinations of attack vectors designed to cut through the defenses an organization has in place – to achieve their goals. Multi-vector attacks are the most difficult to defend against and require layered defenses for successful mitigation. This year’s report includes a case study on the ongoing attacks against U.S. financial services organizations, a great example of a multi-vector attack.
Data Centers and Cloud Services are Increasingly Victimized
94 percent of data center operators reported attacks.
90 percent of those reported operational expenses as a business impact.
As more companies move their services to the cloud, they now have to be wary of the shared risks and the potential for collateral damage. This correlates directly to the types of companies being targeted by attackers, with e-commerce and online gaming sites increasingly targeted, according to survey results this year.
Mobile Providers Continue to be Reactive
60 percent do not have visibility into the traffic on their mobile/evolved packet cores.
There has been limited improvement in visibility or investment in detection and mitigation solutions specific to the mobile network since the last survey. The economics of consumer subscriber networks do not incent providers to implement security until a problem occurs.
The number of mobile devices, along with the sophistication and power of these devices, continues to increase year over year. We believe it is only a matter of time before botnets and DDoS become more prevalent within mobile infrastructure.
Bring Your Own Device (BYOD) Trend Creates New Challenges
63 percent allow BYOD devices on the network.
However, only 40 percent have the means to monitor those devices.
In the growing trend commonly referred to as BYOD, half of respondents now allow personal devices on their networks. However, only 40 percent have a means to monitor usage of these devices. Additionally, only 13 percent actively block access to social media applications and sites. Clearly, BYOD is creating more entry points for hackers to enter the network.
DNS Infrastructure Remains Vulnerable
27 percent experienced customer-impacting DDoS attacks on their DNS infrastructure—a significant increase over the 12 percent of respondents from last year’s survey.
71 percent of respondents reported good visibility at Layers 3 and 4 but only 27 percent reported Layer 7 visibility. This lack of visibility coupled with a lack of dedicated security personnel create an ideal environment for attackers to exploit. Attackers now have many targets from which to create reflection attacks.
IPv6 Deployments Becoming Pervasive
80 percent indicated that they either have already deployed IPv6 or have plans to deploy within the next 12 months
In last year’s WISR, survey respondents acknowledged the first reports of IPv6 DDoS attacks on production networks. Even though IPv6 DDoS attacks were being reported, IPv6 security incidents were still relatively rare at that time. Considering that 75 percent of survey respondents are Service Providers, it’s no great surprise that IPv6 deployments are accelerating today. This opens new opportunities for attackers to bypass network controls by switching between IPv4 and IPv6 networks.
Background Information
Westcon-Comstor
Westcon-Comstor is a value-added technology distributor of category-leading solutions in Security, Collaboration, Networking and Data Center. We are transforming the technology supply chain through our global capabilities in Cloud, Global Deployment and Services. Through a unique physical and digital distribution network, we extend our partners’ global reach while providing the local expertise needed to successfully navigate worldwide opportunities. We combine expert technical and market knowledge with industry-leading partner enablement programs. Collaborating with our partners in a unique engagement model, we strive to provide an exceptional partner experience by delivering results together. Westcon-Comstor goes to market under the Westcon and Comstor brands.