WebRTC Solutions Industry News

TMCNet:  Nexusguard Predicts an Evolving Trend of Targeted Attacks Against Mission Critical Web Companies

[February 14, 2013]

Nexusguard Predicts an Evolving Trend of Targeted Attacks Against Mission Critical Web Companies

(PR Web Via Acquire Media NewsEdge) Hong Kong (PRWEB) February 14, 2013 According to a recent media report, an increase in online retail sales is expected in 2013, especially in China. Business-to-consumer (B2C) transactions may even double the amount seen in 2012. E-business giants- such as Google, Amazon and Apple Inc.- have brought about a revolution of Online shopping. Since the age of Dot-com bubbles, online purchases have become increasingly user friendly. New, web-based business models have enabled enterprises to tap into different segments of customer bases, and create higher profit margins than traditional, land-based business model.

Unfortunately, web attacks are concurrently evolving with the growing trend of e-businesses, and has already posed real threats to them. This is of particular concern to mission critical web companies, whereby web business - dependent on uninterrupted uptime- represents their lifeline.

Nexusguard, a premium end-to-end anti-DDoS service provider, protects numerous mission critical web companies, ranging from online gaming, stocks trading and bullion trading since 2008. Tony Miu, the Security Researcher of Nexusguard, has predicted an evolving trend of targeted attacks that could cause significant damage to a website’s Domain Name and Uptime.

“Domain names represents the reputation of a online business,” shared Tony. “Through DDoS attacks, the availability of a website will be damaged, bringing about collateral damages to its reputation, as well as millions of dollars lost due to lack of availability. This may adversely affect web businesses, which may end up being bought over by their business competitor”.

“Research at Nexusguard has shown that more than 50% of DDoS attacks towards mission critical web companies were targeted DDoS attacks. These attacks can last up to 168 hours, and the targets can only keep rebooting their machines until the attacks cease,” said Tony. (See more in appendix on targeted DDoS attack) “Attackers will spend 3 months to research and test the victims IT infrastructure for a targeted attacks. In some cases, the sources of attacks can come from normal customers. We suspect that attackers hack into, or even own, authorized customer logins for researching, testing and launching attacks.” “In the face of such skillful attacks, enterprises should rely on a professional anti-DDoS service provider, who is able to provide a customized mitigation plan; knowing one’s weakness allows for strength.” Tony added.

Nexusguard’s in-the-cloud, anti-DDoS service - ClearDDoS - delivers enterprise level DDoS mitigation to its customers. For more details please visit http://www.nexusguard.com/ Appendix 3 Key DDoS attacks to Enterprises Type:         Bandwidth Attacks Description:     A volume based attacks on victim’s bandwidth. These attacks do not have a significant impact on larger companies; as bandwidth cost has decreased in recent years, companies with the resources are able to employ more bandwidth as a buffer against bandwidth attacks.

Review:     Most DDoS Mitigation devices or service providers are able to mitigate bandwidth attacks.

Type:         Application Attacks Description:     An attack that targets a victim’s application layer (such as Http Get flood). Though not a complicated attack, enterprises with weaker IT infrastructure will suffer from application attacks.

Review:    Some DDoS Mitigation devices or service providers are able to mitigate application attacks.

Type:         Targeted Attacks Description:     An attack that combines bandwidth attacks, application attacks and new attack methods. In order to terminate a website in seconds, attackers employ detailed research and tests on a web’s infrastructures and vulnerabilities (with research and tests lasting up to 3 months). Once the attack has succeeded, the only solution is to restart the server, which may cause significant losses in the victim’s revenue and reputation.

Review:     Only several DDoS mitigation service providers offer a highly customized mitigation plan that employs both detection and mitigation.

Read the full story at http://www.prweb.com/releases/2013/2/prweb10337763.htm (c) 2013 PRWEB.COM Newswire

[ Back To WebRTC Solutions's Homepage ]

FOLLOW US

Featured Podcasts

Oracle in Enterprise Communications

Most in the industry have heard of the acquisition of Acme Packet by Oracle. What you may not know is that Oracle has a number of telecommunications products including a UC suite, WebRTC Session Controller, and Operations monitoring tools. Oracle is pursuing both the enterprise and service provider.

Featured Whitepapers

WebRTC Security Concerns

This whitepaper covers two of the most relevant topics in communications industry today: WebRTC and security. We will introduce the problem of security in WebRTC including those traditional VoIP attacks that are going to be present in WebRTC services. Later we will mention ad-hoc WebRTC attacks and protection mechanisms, to close with an overview of identity management solutions.

Migrating Real Time Communications Services to the Web

In the Internet age, businesses that own fixed and mobile communication networks, including traditional Communications Service Providers (CSPs) of all kinds, are being challenged with some tough questions: How do we stay relevant to our customers?

Delivering Enterprise-Class Communications with WebRTC

WebRTC is an emerging industry standard for enabling Web browsers with real-time communications capabilities. It enables enterprises to enhance Web sites, empower BYOD users, and improve video collaboration and on-line meetings, to name but a few examples.

WebRTC Report Extract Reprint

This document examines the growing important of WebRTC, both generally and for telecom service providers. It considers the expanding range of use-cases, the multiple layers of interoperability likely to be desired by telcos, and some implications in terms of network integration and mobility.

WEBRTC SOLUTIONS PAPERS, SLIDES, COLLATERAL

Robust Enterprise Grade WebRTC Systems and Services


The emerging WebRTC standard has become one of the industry's hottest topics – and with good reason. Being able to "communications enable the web" has Communications Service Providers as well as Enterprises busily making plans for deployment. But, as these plans unfold, reality is starting to intrude on those plans. Our expectations of telephony services are much higher than web browsing. We expect the phone to connect instantly, operate with minimal disruption, and work seamless across any network, anywhere, at any time. There is also an understanding that phone service is inherently secure. With WebRTC, the expectation is for these applications to behave in the same manner.

This session looks at the user experience and expectations of a WebRTC Enterprise service. It will also cover how a WebRTC enterprise handles security, reliability, and interoperability within browsers and networks.

ORACLE COMMUNICATIONS WEBRTC SESSION CONTROLLER

The Oracle Communications WebRTC Session Controller enables communications service providers (CSPs) and enterprises to offer WebRTC services – from virtually any device, across virtually any network – with carrier-grade reliability and security.

Sales Presentation: Oracle Communications WebRTC Session Controller

Agenda:
- WebRTC Market and Opportunities
- WebRTC Challenges
- Oracle Communication WebRTC Session   Controller
- Summary

ORACLE COMMUNICATIONS WEBRTC SESSION CONTROLLER SOLUTION

Communication Service Provider (CSP) voice service revenues continue to face pressure due to shifts in communication preferences and competition from non-traditional service providers. Voice communications are now often embedded into applications outside the domain of traditional telephony voice usage. CSPs have been challenged to effectively leverage and monetize new web-oriented communications technologies.