Click here to close now.




















Welcome!

Microservices Expo Authors: Ruxit Blog, Elizabeth White, Pat Romanski, Trevor Parsons, Samuel Scott

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, SDN Journal

@CloudExpo: Article

Maybe the Cloud Can Help Secure the Internet

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed

As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security establishment to the core. Claims of security and privacy for many Web servers were patently false.

We all know a chain is only as strong as its weakest link and the unintended back door information leak that is Heartbleed has undoubtedly allowed countless secrets to escape from secure servers, albeit as random pieces of a puzzle to be reassembled by the hacker. It will undoubtedly go down in history as the most widespread compromise of online services since the advent of the Web. Why? Because we now conduct an unprecedented number of so-called "secure" communications over SSL in every facet of commerce, government and the social web.

Ironically, the majority of cyber security problems do not go away once they are discovered or disclosed. Even when corrective fixes or software updates are widely available, the original vulnerabilities live on, continuing to exist in countless systems accessible via the Internet. The risk from Heartbleed is probably increasing as the rise in the number of malicious exploits is likely to be outpacing the speed with which vulnerable resources are being protected or updated.

Another equally dramatic trend is the escalating malicious use of standard Internet services such as DNS (Domain Name System) and NTP (Network Time Protocol) as unwilling attack drones for third-party Distributed Denial of Service (DDoS) attacks. In reflection or amplification DDoS attack scenarios, the legitimate infrastructure of the Internet is tricked into attacking innocent victims. These specific services are just two common examples of Internet services with vulnerable populations of millions of publicly accessible servers that can be easily co-opted as "bots-on-demand" without any security compromise needing to have taken place in advance of the attack. These innocent servers are just sitting out there, waiting to be called into action to attack at a moments notice.

"Heartbleed" and "Amplification DDoS" attacks are just two headline examples of the serious cyber-security problems presented by an unsecured Internet. Malicious traffic carrying these threats flows freely over most service provider networks. Similarly, the cloud is generally agnostic to the intent of the traffic it delivers or serves. Many hosting providers unknowingly accommodate customers who do not practice safe Internetworking, making their public cloud offerings a platform for vulnerable services. Even more worrying is that most customers end up paying their provider for the bandwidth that delivers potentially dangerous Internet content.

What can the service provider industry do to combat these alarming trends? Ideally, we need to flip the commercial equation away from payment for raw (unsecured) Internet traffic and toward subscription services for protected (secured) Internet access. The technology exists today to squash Heartbleed as it transits the service provider network. Likewise, security devices can detect and block DNS and NTP amplification attacks in the network before they coalesce into a perfect storm of unsolicited responses - before raining down on the victim subnet, causing collateral damage to communications for other customers as they become caught up in the network traffic jam that is typical of volumetric DDoS attacks.

The cloud service provider is in a unique position to dramatically improve Internet security. Cloud customers are showing increasing interest in purchasing premium secured Internet access services, free from the malicious threats such as Heartbleed, Amplification DDoS and more. The commercial benefits are becoming even more clear with each successive breach, compromise or attack that impacts unprotected customers, compromises security or damages a brand.

For customers who willingly choose a protected cloud service, the issue of net neutrality is moot. They are explicitly deciding to purchase a network security service that is supposed to remove unwanted traffic. The network security technology is available now that can apply threat detection and mitigation policies on a per-customer basis. The decision to pay for the removal of DDoS attacks and cyber threats does not need to impact the net-neutrality perspective of other cloud customers.

An additional beneficial side effect of secured cloud offerings is the virtual patching of vulnerable Internet Services, such as open DNS resolvers and "monlist" supporting NTP servers. Even if a hosted customer unintentionally deploys a vulnerable service, it is practical to offer them paid protection to prevent those services being leveraged by malicious third parties such as those who are planning to launch DDoS attacks on third parties by leveraging vulnerable cloud resources.

In conclusion, it is clear that technically the cloud can play a significant role in securing the Internet against DDoS attacks and cyber threats. Equally important is the presence of an economic engine for such change driven by customer demand for premium secured cloud services.

More Stories By Ashley Stephenson

Ashley Stephenson is Chief Executive Officer of Corero Network Security. As CEO he leads Corero’s global expansion strategy. A seasoned executive with a proven track record in the technology industry, he brings a notable record, having co-founded or led several technology companies as Chairman or CEO.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
Docker containerization is increasingly being used in production environments. How can these environments best be monitored? Monitoring Docker containers as if they are lightweight virtual machines (i.e., monitoring the host from within the container), with all the common metrics that can be captured from an operating system, is an insufficient approach. Docker containers can’t be treated as lightweight virtual machines; they must be treated as what they are: isolated processes running on hosts....
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
The pricing of tools or licenses for log aggregation can have a significant effect on organizational culture and the collaboration between Dev and Ops teams. Modern tools for log aggregation (of which Logentries is one example) can be hugely enabling for DevOps approaches to building and operating business-critical software systems. However, the pricing of an aggregated logging solution can affect the adoption of modern logging techniques, as well as organizational capabilities and cross-team ...
DevOps has traditionally played important roles in development and IT operations, but the practice is quickly becoming core to other business functions such as customer success, business intelligence, and marketing analytics. Modern marketers today are driven by data and rely on many different analytics tools. They need DevOps engineers in general and server log data specifically to do their jobs well. Here’s why: Server log files contain the only data that is completely full and accurate in th...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
In his session at 17th Cloud Expo, Ernest Mueller, Product Manager at Idera, will explain the best practices and lessons learned for tracking and optimizing costs while delivering a cloud-hosted service. He will describe a DevOps approach where the applications and systems work together to track usage, model costs in a granular fashion, and make smart decisions at runtime to minimize costs. The trickier parts covered include triggering off the right metrics; balancing resilience and redundancy ...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Early in my DevOps Journey, I was introduced to a book of great significance circulating within the Web Operations industry titled The Phoenix Project. (You can read our review of Gene’s book, if interested.) Written as a novel and loosely based on many of the same principles explored in The Goal, this book has been read and referenced by many who have adopted DevOps into their continuous improvement and software delivery processes around the world. As I began planning my travel schedule last...
Several years ago, I was a developer in a travel reservation aggregator. Our mission was to pull flight and hotel data from a bunch of cryptic reservation platforms, and provide it to other companies via an API library - for a fee. That was before companies like Expedia standardized such things. We started with simple methods like getFlightLeg() or addPassengerName(), each performing a small, well-understood function. But our customers wanted bigger, more encompassing services that would "do ...
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
What does “big enough” mean? It’s sometimes useful to argue by reductio ad absurdum. Hello, world doesn’t need to be broken down into smaller services. At the other extreme, building a monolithic enterprise resource planning (ERP) system is just asking for trouble: it’s too big, and it needs to be decomposed.
The Microservices architectural pattern promises increased DevOps agility and can help enable continuous delivery of software. This session is for developers who are transforming existing applications to cloud-native applications, or creating new microservices style applications. In his session at DevOps Summit, Jim Bugwadia, CEO of Nirmata, will introduce best practices, patterns, challenges, and solutions for the development and operations of microservices style applications. He will discuss ...