Welcome!

@CloudExpo Authors: Elizabeth White, Yeshim Deniz, Ian Khan, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, SDN Journal

@CloudExpo: Article

Maybe the Cloud Can Help Secure the Internet

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed

As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security establishment to the core. Claims of security and privacy for many Web servers were patently false.

We all know a chain is only as strong as its weakest link and the unintended back door information leak that is Heartbleed has undoubtedly allowed countless secrets to escape from secure servers, albeit as random pieces of a puzzle to be reassembled by the hacker. It will undoubtedly go down in history as the most widespread compromise of online services since the advent of the Web. Why? Because we now conduct an unprecedented number of so-called "secure" communications over SSL in every facet of commerce, government and the social web.

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed. Even when corrective fixes or software updates are widely available, the original vulnerabilities live on, continuing to exist in countless systems accessible via the Internet. The risk from Heartbleed is probably increasing as the rise in the number of malicious exploits is likely to be outpacing the speed with which vulnerable resources are being protected or updated.

Another equally dramatic trend is the escalating malicious use of standard Internet services such as DNS (Domain Name System) and NTP (Network Time Protocol) as unwilling attack drones for third-party Distributed Denial of Service (DDoS) attacks. In reflection or amplification DDoS attack scenarios, the legitimate infrastructure of the Internet is tricked into attacking innocent victims. These specific services are just two common examples of Internet services with vulnerable populations of millions of publicly accessible servers that can be easily co-opted as "bots-on-demand" without any security compromise needing to have taken place in advance of the attack. These innocent servers are just sitting out there, waiting to be called into action to attack at a moments notice.

"Heartbleed" and "Amplification DDoS" attacks are just two headline examples of the serious cyber-security problems presented by an unsecured Internet. Malicious traffic carrying these threats flows freely over most service provider networks. Similarly, the cloud is generally agnostic to the intent of the traffic it delivers or serves. Many hosting providers unknowingly accommodate customers who do not practice safe Internetworking, making their public cloud offerings a platform for vulnerable services. Even more worrying is that most customers end up paying their provider for the bandwidth that delivers potentially dangerous Internet content.

What can the service provider industry do to combat these alarming trends? Ideally, we need to flip the commercial equation away from payment for raw (unsecured) Internet traffic and toward subscription services for protected (secured) Internet access. The technology exists today to squash Heartbleed as it transits the service provider network. Likewise, security devices can detect and block DNS and NTP amplification attacks in the network before they coalesce into a perfect storm of unsolicited responses - before raining down on the victim subnet, causing collateral damage to communications for other customers as they become caught up in the network traffic jam that is typical of volumetric DDoS attacks.

The cloud service provider is in a unique position to dramatically improve Internet security. Cloud customers are showing increasing interest in purchasing premium secured Internet access services, free from the malicious threats such as Heartbleed, Amplification DDoS and more. The commercial benefits are becoming even more clear with each successive breach, compromise or attack that impacts unprotected customers, compromises security or damages a brand.

For customers who willingly choose a protected cloud service, the issue of net neutrality is moot. They are explicitly deciding to purchase a network security service that is supposed to remove unwanted traffic. The network security technology is available now that can apply threat detection and mitigation policies on a per-customer basis. The decision to pay for the removal of DDoS attacks and cyber threats does not need to impact the net-neutrality perspective of other cloud customers.

An additional beneficial side effect of secured cloud offerings is the virtual patching of vulnerable Internet Services, such as open DNS resolvers and "monlist" supporting NTP servers. Even if a hosted customer unintentionally deploys a vulnerable service, it is practical to offer them paid protection to prevent those services being leveraged by malicious third parties such as those who are planning to launch DDoS attacks on third parties by leveraging vulnerable cloud resources.

In conclusion, it is clear that technically the cloud can play a significant role in securing the Internet against DDoS attacks and cyber threats. Equally important is the presence of an economic engine for such change driven by customer demand for premium secured cloud services.

More Stories By Ashley Stephenson

Ashley Stephenson is Chief Executive Officer of Corero Network Security. As CEO he leads Corero’s global expansion strategy. A seasoned executive with a proven track record in the technology industry, he brings a notable record, having co-founded or led several technology companies as Chairman or CEO.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...