Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Pat Romanski, Carmen Gonzalez, Yeshim Deniz, Liz McMillan

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Feed Post

Denial-of-Service Attacks and the Cloud

Cloud computing offers unique opportunities to recover quickly from DOS attacks

denied resized 600Denial-of-Service attacks are nothing new, and they’ve been a thorn in the side of data center managers and IT staff for decades now. For most organizations a decade ago, DOS attacks were often little more than an annoyance, and meant restricted email or Internet access for a short time. Unless your organization depended greatly on an ecommerce portal, a DOS attack probably wouldn’t rate in the list of top five causes of a loss of service for your organization.

Today, however, the world has changed. Organizations are relying in an increasing fashion on cloud computing solutions, which means that more than just your external email is at risk. Here are some of the trends you can observe right now when it comes to DOS attacks and the cloud:

• Distributed DOS attacks currently pose a serious threat to the cloud. There was a time when DDOS attacks were almost always the result of a single worm. Clean the worm, and you end the attack. Today, however, botnets are being used in increasingly creative ways to deny service, which makes it much more difficult to troubleshoot and resolve this sort of attack.

• Today’s denial of service attacks focus on specific apps. A hacker doesn’t need to attack your entire infrastructure anymore. They can simply choose the most resource-intensive app that you’re running on the cloud and use simple low-bandwidth attacks to take out your access to that service. Secure HTTP is a good example of this. Knock out the application in the cloud, and you cripple the organization.

• Co-location poses other unique threats. When your cloud services reside with a provider, you need to worry not only about attacks on your cloud resources, but on the resources of other tenants. It becomes even more critical to make sure that your cloud service providers have sufficient facility protection. You might not know your neighbors, but you should definitely know your landlord.

• Cloud computing offers unique opportunities to recover quickly from DOS attacks. Because cloud computing has the ability to rapidly provision resources, DOS attacks can be easier to recover from. The much-touted agility of the cloud really comes into play during a DOS attack.

Read the original blog entry...

More Stories By Unitiv Blog

Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.

CloudEXPO Stories
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a significant part of their IT budgets in the very near future. As IoT solutions are growing rapidly, as well as security challenges growing exponentially, without a doubt, the cloud world is about to change for the better. Again.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.