Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

Related Topics: @ThingsExpo, Machine Learning , Cloud Security

@ThingsExpo: Article

Layered Defense in the Connected World | @ThingsExpo #IoT #M2M #Security

IoT devices have to be easy to deploy and use, but we should not forget that these devices are really just small computers

Layered Defense in the Connected World

The National Cyber Security Awareness Month is transitory, but many of the decisions we have made around the adoption of technology within our personal and business have brought with them risks that will stay with us for a while. A good example of this is the deployment and proliferation of ‘smart' or ‘connected' devices - IoT.

The Internet of Things (IoT) has promised us more personalized and automated services, optimized resource utilization, and added convenience, but we haven't always stopped to consider the risks that come with the benefits?

The number of connected devices has grown at an unprecedented rate with current estimates at between 6-12 billion devices. This number seems enormous but if you doubt it, I suggest you login into your home router and look at how many devices are registered - you may be surprised when you see your TVs, amplifiers and heating thermostats featuring on the list.

We already have cars that can drive themselves and buildings that can configure their environmental control systems based on your presence. The amount of machine-to-machine communication going on around us is growing all of the time, but in many cases we haven't considered ‘security' as part of our buying or implementation processes.

IoT devices, by their very nature, have to be easy to deploy and use, but we should not forget that these devices are really just small computers. How many of us would plug a computer straight into the Internet using the (old) original, un-patched version of an OS, with no firewall or security devices to protect it, using the default username and password? Not many, but this is what is happening in many cases with IoT devices.

The evolving threat-landscape
2016 brought the darker side of the connected world more sharply into focus, with the proliferation of botnets, and weaponized DDoS services, based on IoT devices. If we think back to the early noughties DDoS attacks were often generated by large botnets of compromised end-users workstations, because of multiple vulnerabilities and a lack of security awareness. Cyber-criminals have realized that IoT devices offer a significant capability, just waiting to be exploited in a similar way, and we all saw how thousands of relatively small, innocuous CCTV cameras and DVRs could be leveraged to generate Distributed Denial of Service (DDoS) attacks at 500Gbps or greater, affecting the availability of Internet services from a number of well-known Internet brands.

Many IoT devices have good connectivity on unmonitored network segments, and enough processing capability to drive a significant volume of DDoS attack traffic. Attacks from these devices are responsible for some of the increased scale and frequency of DDoS activity reported in Arbor Networks' annual Worldwide Infrastructure Security Report (WISR). And, DDoS is just one use-case for compromised IoT devices - more on that later....

Layers-layers-layers
Compromised IoT devices offer attackers a new way to threaten the availability of the Internet services we use, but the best way to protect our businesses has stayed the same. Most businesses today are reliant on the data and application services they utilize via the Internet, and availability issues can be very costly. To combat today's DDoS threat, businesses and governments alike need to implement a multilayer DDoS protection strategy.

Multi-layered defenses incorporate both an on-premise and cloud or ISP-based component. The on-premise component allows businesses to detect and mitigate attacks immediately, before there is any service impact. However, the on-premise solution can't deal with increasingly common, large attacks that can saturate Internet connectivity, and this is where the cloud or ISP-based service steps in - to deal with the higher magnitude attacks. The good news is that many more enterprises are adopting layered defense. Arbor's WISR showed that 30% of enterprise organizations had adopted this model in 2016, up from 23% in 2015.

Putting the right defenses in place does require investment, and there are many competing priorities in businesses for both an IT and security budget. But given the dependence most businesses now have on connectivity for interaction with customers, partners and suppliers, these kinds of defenses are essential. Incorporating availability threats into business and IT risk assessment processes can help to quantify the potential impact of a DDoS attack, helping to prioritize investment, and the WISR report shows that around two-thirds of enterprises have now taken this step.

A broader problem
The combination of DDoS and IoT devices has largely disappeared from the news headlines in 2017, but they haven't gone away. Weaponized IoT botnets are still being used to generate DDoS attacks, but more sophisticated, stealthy application layer attacks are now more of a focus than the large volumetric attacks we saw last year. But, DDoS is only one of the ways in which IoT devices can be exploited. Arbor is already seeing compromised IoT devices being used as proxies to obfuscate the original source of traffic. If you are thinking that the risk to IoT is limited to those devices that are exposed to the Internet - think again. Windows malware that looks to scan local networks for IoT devices to infect is already a reality. This would allow attackers to gain a foothold within a network, using our IoT devices, so that they could then move on to target other resources inside or outside of our networks.

The connected world brings with it huge potential, some of it good and some of it bad. IoT devices can be used to amplify existing threats and create new ones. One thing we can all do is try to avoid becoming a part of the problem, and the solution here is simply to implement good risk management process and IT security hygiene when we deploy IoT devices.

Improving the security of IoT devices and preventing their compromise are key goals of the security industry and the manufacturers of these devices, but until that is done (and it may take some time), everyone needs to protect themselves from the threats we know that are out there - and DDoS is a significant and growing threat.

More Stories By Darren Anstee

Darren Anstee, Chief Technology Officer at Arbor Networks, has 20 years of experience in pre-sales, consultancy and support for telecom and security solutions. In his position, he works across the research, strategy and pre-sales aspects of Arbor’s traffic monitoring, threat detection and mitigation solutions for service providers and enterprises around the world. Prior to joining Arbor, he spent over eight years working in both pre- and post-sales for core routing and switching product vendors. Follow Darren Anstee on Twitter ‏@cadernid

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
Digital Transformation (DX) is not a "one-size-fits all" strategy. Each organization needs to develop its own unique, long-term DX plan. It must do so by realizing that we now live in a data-driven age, and that technologies such as Cloud Computing, Big Data, the IoT, Cognitive Computing, and Blockchain are only tools. In her general session at 21st Cloud Expo, Rebecca Wanta explained how the strategy must focus on DX and include a commitment from top management to create great IT jobs, monitor ...
"Digital transformation - what we knew about it in the past has been redefined. Automation is going to play such a huge role in that because the culture, the technology, and the business operations are being shifted now," stated Brian Boeggeman, VP of Alliances & Partnerships at Ayehu, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...