• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

How To Protect Your Cloud System From A DDoS Attack

Anand Srinivasan / 3 min read.
December 4, 2016
Datafloq AI Score
×

Datafloq AI Score: 82.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/W0Mdd

Cloud systems offer a distinct advantage over on-premise legacy solutions. Hosting your content on a local server makes them vulnerable to cyber-attacks. With the resources available today, it is not difficult to launch an attack on systems that are completely on-premise. With the cloud, your content is distributed across a number of servers; sometimes located across the world. This way, even if a server gets under attack, your content is still safe and the backup systems can kick in to keep your services running.

But cloud systems are slowly losing this edge as well. As the recent attack on Dyn shows, services hosted in the cloud are no-less susceptible to DDoS attacks than the on-premise solutions are. And that is mainly possible because of the cloud itself. DDoS attacks are, in practice, always over the cloud. So no matter how distributed your cloud system is, it is theoretically possible to build a cloud network that can overwhelm this service through a DDoS attack.

In essence, this is a cat and mouse game between the hosting provider and the attackers. While it may be pretty impossible to build a foolproof system that attackers can never breach, you can always make it harder for them economically – build a network that is large enough to take on the providers network.

One of the most popular ways to do this is through a Content Delivery Network (CDN). A CDN is essentially a cloud network that caches your content on to their servers so that most of the incoming traffic is handled by their server and not yours. And since their core purpose is to build a fail-safe server system, they have far more resources to invest in building a distributed cloud system that hackers cant afford to bring down.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

This comes with its own set of problems. With a CDN, you point all your incoming web traffic to an IP address that belongs to your CDN provider. While this works well for all your content on HTTP/S, your private IPs like your email servers does not pass through the CDN still. So if the hacker is able to get hold on your core IPs this way, they may still be able to attack your system regardless of whether you use a CDN or not. You can prevent this by using separate C-Class ranges for your SMTP and web services.

Another way to fix this is by using a proxy-based solution. Such services act as a TCP/UDP proxy and act as a counter against any network layer DDoS attacks. Your users may however face increased latency due to this. Alternately, users may hide their infrastructure IP addresses by pointing them all to a CDN IP. This protects your IP from being exposed to potential hackers.

A number of businesses are also looking at the option of using multiple CDNs for their services. The most viable way to do this is to use an aggregator service that seems like any other CDN service on the front-end for the user to connect to. In the back-end though, the aggregator is connected to multiple CDN providers. This way, the content presented to your website visitors may come from one of the several CDN providers (depending on your location, the media content you are accessing, etc.). Also, in case of a DDoS attack, your service may still be accessible since the aggregator may pull your content from one of several CDN providers. It is going to be very expensive for an attacker to build a network that can scale up large enough to bring multiple CDN providers down.

Categories: Cloud, Cybersecurity
Tags: attack, Cloud, hackers, security

About Anand Srinivasan

Anand Srinivasan is an cloud IT consultant with over 8 years of experience. He has worked with dozens of small and medium sized businesses based in North America and India to help them use cloud technologies to gain better outreach on their customers.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale

March 23, 2023 By Barr Moses

The need for extensive data to make decisions more effectively and quickly

March 23, 2023 By Rosalind Desai

A Beginner’s Guide to Reverse ETL: Concept and Use Cases

March 22, 2023 By Tehreem Naeem

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data blockchain business China Cloud Companies company costs crypto Data development digital environment experience finance financial future Google+ government information machine learning market mobile Musk news public research security share skills social social media software startup strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Digital Marketing World Forum Global 2023
  • Management Communication
  • Digital Transformation and the Impact on Business Models
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale
  • How Blockchain Technology Can Enhance Fintech dApp Development
  • How to leverage novel technology to achieve compliance in pharma
  • The need for extensive data to make decisions more effectively and quickly
  • How Is Robotic Micro Fulfillment Changing Distribution?

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data blockchain business China Cloud Companies company costs crypto Data development digital environment experience finance financial future Google+ government information machine learning market mobile Musk news public research security share skills social social media software startup strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!