Welcome!

SDN Journal Authors: Elizabeth White, Pat Romanski, TJ Randall, Yeshim Deniz, Liz McMillan

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, SDN Journal

@CloudExpo: Article

Maybe the Cloud Can Help Secure the Internet

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed

As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security establishment to the core. Claims of security and privacy for many Web servers were patently false.

We all know a chain is only as strong as its weakest link and the unintended back door information leak that is Heartbleed has undoubtedly allowed countless secrets to escape from secure servers, albeit as random pieces of a puzzle to be reassembled by the hacker. It will undoubtedly go down in history as the most widespread compromise of online services since the advent of the Web. Why? Because we now conduct an unprecedented number of so-called "secure" communications over SSL in every facet of commerce, government and the social web.

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed. Even when corrective fixes or software updates are widely available, the original vulnerabilities live on, continuing to exist in countless systems accessible via the Internet. The risk from Heartbleed is probably increasing as the rise in the number of malicious exploits is likely to be outpacing the speed with which vulnerable resources are being protected or updated.

Another equally dramatic trend is the escalating malicious use of standard Internet services such as DNS (Domain Name System) and NTP (Network Time Protocol) as unwilling attack drones for third-party Distributed Denial of Service (DDoS) attacks. In reflection or amplification DDoS attack scenarios, the legitimate infrastructure of the Internet is tricked into attacking innocent victims. These specific services are just two common examples of Internet services with vulnerable populations of millions of publicly accessible servers that can be easily co-opted as "bots-on-demand" without any security compromise needing to have taken place in advance of the attack. These innocent servers are just sitting out there, waiting to be called into action to attack at a moments notice.

"Heartbleed" and "Amplification DDoS" attacks are just two headline examples of the serious cyber-security problems presented by an unsecured Internet. Malicious traffic carrying these threats flows freely over most service provider networks. Similarly, the cloud is generally agnostic to the intent of the traffic it delivers or serves. Many hosting providers unknowingly accommodate customers who do not practice safe Internetworking, making their public cloud offerings a platform for vulnerable services. Even more worrying is that most customers end up paying their provider for the bandwidth that delivers potentially dangerous Internet content.

What can the service provider industry do to combat these alarming trends? Ideally, we need to flip the commercial equation away from payment for raw (unsecured) Internet traffic and toward subscription services for protected (secured) Internet access. The technology exists today to squash Heartbleed as it transits the service provider network. Likewise, security devices can detect and block DNS and NTP amplification attacks in the network before they coalesce into a perfect storm of unsolicited responses - before raining down on the victim subnet, causing collateral damage to communications for other customers as they become caught up in the network traffic jam that is typical of volumetric DDoS attacks.

The cloud service provider is in a unique position to dramatically improve Internet security. Cloud customers are showing increasing interest in purchasing premium secured Internet access services, free from the malicious threats such as Heartbleed, Amplification DDoS and more. The commercial benefits are becoming even more clear with each successive breach, compromise or attack that impacts unprotected customers, compromises security or damages a brand.

For customers who willingly choose a protected cloud service, the issue of net neutrality is moot. They are explicitly deciding to purchase a network security service that is supposed to remove unwanted traffic. The network security technology is available now that can apply threat detection and mitigation policies on a per-customer basis. The decision to pay for the removal of DDoS attacks and cyber threats does not need to impact the net-neutrality perspective of other cloud customers.

An additional beneficial side effect of secured cloud offerings is the virtual patching of vulnerable Internet Services, such as open DNS resolvers and "monlist" supporting NTP servers. Even if a hosted customer unintentionally deploys a vulnerable service, it is practical to offer them paid protection to prevent those services being leveraged by malicious third parties such as those who are planning to launch DDoS attacks on third parties by leveraging vulnerable cloud resources.

In conclusion, it is clear that technically the cloud can play a significant role in securing the Internet against DDoS attacks and cyber threats. Equally important is the presence of an economic engine for such change driven by customer demand for premium secured cloud services.

More Stories By Ashley Stephenson

Ashley Stephenson is Chief Executive Officer of Corero Network Security. As CEO he leads Corero’s global expansion strategy. A seasoned executive with a proven track record in the technology industry, he brings a notable record, having co-founded or led several technology companies as Chairman or CEO.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application performance guarantees & data privacy.
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with Tintri's web services architecture and APIs. Impress your DevOps team with smart and autonomous infrastructure.
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker containers gain prominence. He explored these challenges and how to address them, while considering how containers will influence the direction of cloud computing.