Connect with us
huawei Y7 Prime 2018

Enlisting blockchain technology in the war against DDoS onslaughts

Blockchain

Enlisting blockchain technology in the war against DDoS onslaughts


Distributed Denial of Service (DDoS) attacks are certainly on the rise. Arbor’s 13th Annual Worldwide Infrastructure Security Report showed that 33 percent of surveyed organisations suffered a DDoS attack in 2017 (this is sharply up from the previous year’s 17 percent).

The modus operandi is elegantly simple: DDoS attackers infect large numbers of devices with malware (it could be smartphones, computers, or any other form of connected device), mutating them into bots that are then used to flood the servers of the victim organisation.

The aim of a DDoS attack is to overwhelm the target website’s server with massive volumes of traffic and cause it to crash. Companies that rely heavily on their digital presence experience a loss of business, and of course the reputational damage associated with ‘being down’.

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, says that technology like Arbor’s has been continually refined over the years, “to deal with each subtle new DDoS tactic and stay one step ahead of the attackers.

“Today, blockchain represents an exciting new technology that could have a huge impact on how we as a security industry go about protecting clients from DDoS threats,” he explains.

Distributing bandwidth

Blockchain, also called ‘distributed ledgers’, is essentially a computing platform that has no single point of failure, where records of transactions and interactions can be stored across vast numbers of computers. Nobody ‘owns’ the database. No one person is able to control or manipulate it.

The distributed ledger is dispersed throughout the internet, allowing for the fluid (but also secure) sharing and validating of information. Due to the very structure of the platform, only authorised parties are able to create records for the part of the ‘chain’ that relates to their transactions. The broader blockchain community then witnesses and verifies the transaction – preventing it from being lost, tampered with or corrupted in any way.

It allows for the sharing of value and information through a nearly-incorruptible digital ledger.

Hamman says that “one such asset could be unutilised bandwidth that a company could ‘rent’ to other companies that are suffering from DDoS attacks at a given moment, to help absorb the effects of the malicious traffic.”

In this way, organisations could purchase additional bandwidth only when they need it to defend against attacks.

“A number of innovative start-ups are exploring how the blockchain can be harnessed, to enable thousands of computers across the world to share their excess bandwidth across peer-to-peer networks, while facilitating seamless cryptocurrency payments for these transactions,” he clarifies.

Reducing the attack vectors

Others are exploring how blockchain infrastructure could enable us to build global databases of all the IP addresses that are used in the various DDoS attacks taking place on any day, Hamman says.

“Using smart contract enabled by distributed ledger technology, this verified database could help DDoS defence software to identify emerging threats, and keep up to date with real-time insights into the addresses that are currently being used to launch attacks.”

Even within the enterprise, blockchain technology can be applied to create a decentralised network of servers – with each one providing extra bandwidth resources when a particular server comes under pressure from DDoS traffic. Industry website BlockchainCan.com* explains that “because blockchain is a decentralised service, it’s harder for attackers to target a specific vector to attack to take a particular service offline.”

Hamman says that, in general, security professionals have been very quick to imagine and start capturing the advantages of distributed ledger technology.

“It is a network construct that combines some very powerful innovations – sequential hashing and cryptography, combined with a decentralised foundation – which make distributed ledgers a very attractive proposition for cyber-security experts.”

In the specific area of DDoS, he says specialists like Arbor are actively exploring how blockchain (as well as other ‘frontier’ technologies like artificial intelligence) can further bolster the defences that they provide to clients.

“As DDoS threats continually morph, we’ll make use of the very latest available technologies, to always remain one step ahead of the threats.”

Register for the Finnovation Africa Summit here: Happening at the Radisson Blu in Nairobi, Kenya on the 31st of May 2018.

Facebook Comments

We're a news site covering Technology and Business trends in Kenya, East Africa and across the Globe. For products and service reviews, tips, story ideas, guest posts, sponsored content or advertising inquiries, email techtrendske@gmail.com or info@techtrendske.co.ke. You can also call us on +254 727 503 198

Click to comment

Leave a Reply

More in Blockchain

Be notified of new posts by email!

Join 12,742 other subscribers

PODCAST: 24BIT

LATEST DEALS

LISTEN TO OUR LATEST PODCAST ON 24BIT HERE

Subscribe to our mailing list

* indicates required

Latest News

Advertisement
To Top