Subscribe to CIO Magazine »

DDoS attacks, mobile traffic visibility top security concerns: Arbor

Political hacktivism strongest motivation behind DDoS attacks, according to an Arbor Networks report

More than 90 per cent of data centre operators are experiencing distributed denial of service (DDoS) attacks, according to Arbor Networks’ 8th Annual Worldwide Infrastructure Security Report.

A further 60 per cent of mobile providers have no visibility of traffic on their mobile evolved packet core, the framework for providing converged data and voice services on their 4G LTE networks, the report said.

Arbor surveyed 130 security professionals across different market segments globally, 20 per cent which are in the Asia-Pacific region, and found 83.3 per cent of respondents are experiencing between one and 50 DDoS attacks on their data centres every month. A further 88 per cent were experiencing operational expense as a result.

Nick Race, Arbor’s country manager for Australia and New Zealand, said the high number of DDoS attacks is particularly a concern in Australia as more and more organisations are moving their infrastructure to the cloud.

“It’s a real concern for Australia because we’re adopting the cloud in such great numbers and it’s not clear which hosting providers offer that kind of protection, it’s not something that they are heavily marketing at the moment. That, I guess, is an area of concern,” he said.

“There were a number of hosting providers last year who went public on the fact that they were being attacked and their infrastructure was taken off air so it’s definitely happening in Australia.”

The report also found 28.6 per cent of respondents are seeing attacks targeting mobile users, radio access network (RAN), back-haul or packet core connections.

“On average I think it’s over 70 per cent of people experience between one and 10 attacks per month, and that includes the mobile operators as well. So the numbers of attacks are definitely on the rise,” Race said.

Race said although this is a growing concern, most Australian mobile operators offer broadband services and therefore have the relevant experience to better analyse their mobile networks.

“The skills [in broadband technology] that some of the operators have here in Australia [means] they can apply that to the mobile network. But other mobile operators just don’t have the visibility, they don’t have the tools to actually see what’s going on in their network and therefore they don’t know what levels of attacks are going on.

“I think it’s just the maturity of the market. They are so busy rolling out coverage that maybe their security is not always front of mind, I guess.”

Political hacktivism is the strongest motivation behind DDoS attacks, the report found. Race recognised the importance of the Gillard government’s cyber security initiative announced last week in fighting hacktivism and cyber warfare.

“12 months ago there were a number of attacks on some of our financial institutions, slightly different attacks to what we saw in September in October last year against the US banks.

"But it just goes to show that our institutions here in Australia are not immune to these types of attacks and they are certainly on the radar of the ‘bad guys’.”

Follow Rebecca Merrett on Twitter: @Rebecca_Merrett

Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Arbor Networks, Facebook
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: DDoS attacks, arbor networks, hacktivism, mobile traffic visibility, data centre security, infrastructure security, mobile security, 8th Annual Worldwide Infrastructure Security Report
Latest Blog Posts
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • All Flash and Databases - Storage Switzerland
    This webcast explores how All-Flash enterprise storage compares to traditional disk-centric arrays. Learn how to best leverage Flash so databases thrive and limitations of I/O disappear, while exploring the pitfalls and peculiarities of Flash, and how to optimise its performance as a storage solution to ensure reliance, predictability and cost savings for a variety of enterprise workloads.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments