CAUTION: THE DDOS OF THINGS IS HERE
The Internet of Things (IoT) is the weapon of choice for distributed denial of service (DDoS) attackers. Nefarious actors exploit millions of vulnerable, persistent IoT devices to create sophisticated malware-based DDoS botnets and use them to initiate devastating availability attacks. Legacy defenses are overwhelmed by the scale, sophistication and breath of attacks generated by the DDoS of Things (DoT). DDoS resilience requires fresh new approaches.
New challenges that will crumble legacy defenses
Breath of Attacks
We’re tracking the rapid expansion of IoT botnets, and the continued use of UDP reflection attacks. DDoS a problem that keeps growing in size and strength, and the number of attacks on businesses is nearly double that of a year ago. Denial of Service attacks aren’t limited to certain company types anymore – and we predict 2018 will be the year every company realizes they could be a target.”
THE A10 APPROACH TO SOLVING THESE CHALLENGES
A10 Thunder TPS DDoS defense solutions detect and mitigate multi-vector DDoS attacks at the network edge and in centralized scrubbing centers. Thunder TPS scales to defend against the DDoS of Things and traditional zombie botnets. Unlike outdated DDoS products, Thunder TPS is built on A10’s market-proven Advanced Core Operating System (ACOS®) - the platform that delivers scalable form factors and cost structures that makes economic sense with a complete detection, mitigation and reporting solution.
1. Surgical Precision
When it comes to DDoS defenses, the focus should always be on the protecting availability for legitimate users. Legacy defenses that focus on infrastructure protection leave wakes of collateral damage for users. Thunder TPS tracks more than 27 behavioral traffic indicators to surgically protect users and thwart attacking IoT DDoS bots.
2. Match Performance Against Braun
The geographic breadth of IoT-based attacks can overwhelm legacy defenses. Powered by A10’s ACOS, Thunder TPS tracks users’ and attacking agents’ behavior at internet scale with up to 128 million concurrent sessions.
3. Actionable DDoS Threat Intelligence
The IoT DDoS threat continues to grow. A10 DDoS Threat Intelligence service provides accurate and timely intelligence that includes millions of known DDoS botnets (e.g. Mirai, Reaper) and open servers used for reflection attacks (e.g. DNS). Thunder TPS supports Class-lists that scale up to 96 million entries to make the threat feed actionable to stop DDoS attacks in their tracks.
4. Affordable Scaling
We lead the industry with the highest performance solutions for flow-based detection (1 million flows per second) and mitigation up to 300 Gbps in a single appliance. Thunder TPS also delivers more performance across more form factors than legacy vendors – 2 Gbps -152 Gbps in one RU – to offer DDoS defense that makes economic sense for companies of any size.
Blog by Andrew Hickey
Should You Fear the Reaper?The newly discovered Reaper IoT botnet is poised to swing its sickle. With A10's power and performance, you don't have to fear the Reaper.
featured products for IoT DDoS Threat defence
Available in a wide range of form factors, A10 delivers on-premises and cloud-based DDoS defense solutions for the most challenging environments.