A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Dr. Vincent Berk

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah


August 15, 2019

GTP and The Evolution of Roaming

Mobile traffic using GPRS Tunneling Protocol (GTP) has exploded over the last couple years, largely due to elimination of international roaming price barriers that previously discouraged subscribers from using the service. Global international roaming traffic – voice and data – is expected to grow 32X by 2022 and to reach over 1.5 Mb per subscriber annually. How will GTP and roaming change with 5G and what will operators need to do to secure that traffic and their network? This blog post describes roaming and its use of GTP and discusses the evolution of GTP and roaming in 5G, rise of Read more

August 14, 2019

The State of DDoS Weapons, Q2 2019

DDoS attacks continue to grow in frequency, intensity and sophistication. However, the delivery method–using infected botnets and vulnerable servers to perform these attacks–remains the same. That said, we are seeing some new attack threats on the horizon in IoT and 5G. Read on to learn more. Where DDoS Attacks Are Originating Although DDoS weapons are globally distributed, you can find the highest concentration where internet-connected populations are denser. Our research found the following to be the top seven countries hosting DDoS weapons: China USA Russia Italy Republic of Korea India Germany We tend to see the same countries competing for Read more

August 13, 2019

The Top 7 Requirements for Optimized Traffic Flow and Security in Kubernetes

According to a 2018 survey from Portworx, four out of five enterprises are now running containers, and 83 percent are running them in production. Given that only 67 percent were doing so in 2017, it’s clear that containers are more than a fad. With containers’ newfound popularity, though, some companies are struggling to establish an efficient traffic flow and effectively implement security policies within Kubernetes, one of the most popular container-orchestration platforms. As a container orchestrator and cluster manager, Kubernetes focuses on providing fantastic infrastructure, and has been adopted by countless companies as a result. It just had its five-year Read more

August 12, 2019

What Service Providers (and Enterprises) Need to Know About DDoS Scrubbing Services

There are a number of considerations that service providers must make when implementing DDoS scrubbing services for their subscribers. In general, those considerations fall into three categories: business, technical and economic. In this article, we’ll cover all three of those categories. You’ll learn about: Business Considerations – DDoS Trends Technical Considerations – DDoS Defense Deployment Options Economic Considerations – Deploying Profitable DDoS Scrubbing Solutions Then, we’ll look at a couple of case studies that show how these considerations have helped service providers improve their services, increase adoption and improve subscriber stickiness. Keep reading to discover what service providers should be Read more

July 30, 2019

Mayors of America, Beware! – Ransomware is coming to town

Ransomware attacks have been around for a long time. We saw a huge spike in ransomware attacks, and the resulting damages, from 2016 to 2017, including the devastating WannaCry attack of 2017 that cost organizations as much as $4 billion in damages. There was a slight lull in ransomware activities in the 2018 but in 2019 ransomware is back with a quarter-over-quarter increase of around 195 percent at the start of the year. There is also a new, disturbing trend on the rise: American cities are specifically being targeted with ransomware attacks and the numbers, as well as the damages Read more

July 29, 2019

Beat Gaming Cheaters and DDoS Spoilers with Real-time Packet Watermarking

Gaming, for entertainment or gambling, seems to bring out the worst in the worst people. Cheaters leverage an ecosystem of nefarious tool developers to get a competitive edge with new ways to unfairly advance, obstruct competitors, or attack the hosting platforms. How prevalent is the problem? A study by Irdeto provides some interesting insights into the issue. 60% of gamers have had their multiplayer gaming experience negatively impacted by other players cheating   Source: Irdeto Global Gaming Survey Distributed Denial of Service (DDoS) defenders need new approaches to balance the operations in favor of fair and continuous play because everyone Read more

July 24, 2019

How Zones Facilitate a Proactive DDoS Defense that Protects Real Users

The primary objective of DDoS defense is to ensure availability of services to legitimate users. Secondarily, protecting the service’s infrastructure from being overwhelmed aligns with safeguarding a user’s access. Sometimes, DDoS defenders miss the nuances of this priority because IT gets graded on a measurable five-nines uptime, but rarely on user experience. When the user experience matters, a proactive in-path (L3 or L2) DDoS defense is most effective. An always-on proactive defense has the benefits of instant response to policy violators and packet-level application-layer visibility for full-spectrum multi-vector DDoS protection. That said, proactive deployment cost is a primary concern for Read more

July 23, 2019

Multi-cloud and Cloud-native Applications Drive Need for ADC Transformation

Organizations are increasingly adopting hybrid IT and embracing multi-cloud environments, and they are doing so to increase business agility and competitiveness. They are modernizing application delivery infrastructures, including application delivery controllers (ADCs), to support traditional and modern applications both on-premises and in public clouds. The cloud, as both a destination and an operational model, is a critical means to that end, and multi-cloud environments are increasingly prevalent for a growing number of enterprises. In its IDC Technology Spotlight, sponsored by A10 Networks, “Multi-cloud and Cloud-native Applications Drive Need for ADC Transformation,” IDC notes that although the benefits of multi-cloud infrastructures Read more


July 22, 2019

5G is About to Change the World. Here’s How it Works

5G at a Glance Several aspects of 5G technology allow mobile operators to create a faster, larger network than ever before while maintaining lower latency than was previously possible. Just how fast are we talking? Up to 20 gigabits per second downlink speed, compared to 4G/LTE’s maximum speed of 150 megabits per second. Here’s a more detailed breakdown of 5G’s capabilities: Exploring the 5G Fundamentals There are five key technology aspects that contribute to achieving 5G objectives in mobile networks. If we look at each aspect of 5G technology separately, we can see precisely how it uses new innovations to Read more

July 19, 2019

Five Questions to Ask Before Delivering Your Applications to the Cloud

The time has come for enterprises around the world to face the truth: the traditional data center is dead and gone. In its place, multi-cloud, hybrid and container-based infrastructures have risen. According to research from Aberdeen shared in the ebook, “Five Questions to Ask Yourself Before You Deliver Your Applications to the Cloud,” (a collaboration between A10 Networks and Aberdeen),” 33 percent of businesses have implemented a hybrid cloud, and 23 percent plan to within the next year. What’s more, 80 percent of businesses using the cloud have a multi-cloud strategy. While cloud migration offers an abundance of benefits, from Read more

July 18, 2019

New Approaches to DDoS Protection Offer Better Security and Economic Scale

Distributed denial of service (DDoS) attacks are only going to increase over time and attackers have an ever-expanding opportunity to use new device types, like IoT to mount even larger attacks. Attacks sizes have jumped an order of magnitude in just the last five years. 41 percent of companies surveyed by IDC faced DDoS attacks more than 10 times per year; 3 percent were attacked over 100 times. Over 20 million total devices have been found to be exploitable as DDoS reflectors. Enterprises are challenged with detecting and mitigating DDoS attacks in-house and attackers are rapidly adapting their methods to Read more