Tixzy
  • Home
  • What We Do
    • Cloud Computing
    • Information Security
    • Data Analytics
  • How We Work
  • News
    • Blogs
    • Company News
    • Weekly Executive Roundup
  • Our Leadership
  • Careers
CONTACT US
  • Blogs
  • May 05 , 2015

A true story of successfully defending a DDoS attack

A true story of successfully defending a DDoS attack

Here is an interesting account of how a company successfully defended itself against a massive DDoS attack in 2014. I have provided my thoughts and recommendations based on the story below:

Executive Summary of the Incident

The account was written from the perspective of a web/infrastructure service provider for a healthcare-related firm. This firm experienced a massive Distributed Denial of Service (DDoS) attack right before its annual client meet up with over 12,000 attendees expected. It was obvious the attackers meant to use the attack as a professional embarrassment to the company.

The firm’s website infrastructure was hosted on a public cloud – Amazon AWS in this case. This gave the firm some strategic advantages in defending against the attack.

The first wave of the attack was targeted directly at IP addresses of the web servers instead of (DNS) domain names. This attack was easy to defend by simply changing the Elastic IPs associated with the domain names. Because the website is hosted on a public cloud, changing IP addresses is very easily accomplished. The cloud provider infrastructure is already set up for making changes like this with no user impact.

The second and longer wave of attack targeted DNS domain names of the web servers, so the first defense strategy could not be used in this instance. Two major approaches were used to defend against this second wave of attack. First, the firm implemented a Web Application Firewall (WAF) using HAProxy. This allowed the firm to use a stricter set of rules to define who is allowed to get through to the webservers. Second, the firm implemented autoscaling for the HAProxy servers as well as the web servers. This in effect, gave them ‘unlimited’ capacity to absorb additional traffic.

With auto-scaling turned on, the strategy was to simply absorb all traffic the hackers could possibly throw at the firm. As the attackers scaled up the attacks, the clients scaled up their servers to absorb the attacks.  At some point, the firm was handling 20gbps of traffic which is approximately 40 times the average size of hack attacks in 2014.

Ultimately, the attackers gave up when they realized that the firm was capable and willing to scale up to any amount of traffic the attackers were willing/able to throw at them. And all this was handled without any significant degradation in user experience on the client’s website.

The attack ended almost in the same manner it began. The attack traffic just stopped and monitoring showed that traffic levels went back to historical normal. Another day, another DDoS attack vanquished.

Additional Recommendation and Thoughts

– The timing of the attack is a cause for concern and unfortunately not unusual. CIOs and CISOs need to be cognizant of the fact that they’re susceptible to attack whenever they roll out new/major products, have scheduled client conferences or expect significant positive press coverage. There’s no shortage of bad actors looking to embarass firms in the middle of new successes.

– The defenses that the firm used are not unique to Amazon AWS. Most public cloud providers offer auto-scaling today. It may be tough to replicate this with a private cloud unless the private cloud has a very large pool of under-utilized servers that can be used to auto-scale.

– The company CIO acknowledged that if they had been hosted on a traditional data center, they would have been helpless as they would not be able to scale to match the attack. The unlimited capacity management native to cloud deployments saved the day for the client’s web user experience during this event.

– Cost of defending against the attack in this instance was a paltry $1,500.00 for over 50 additional large-scale compute servers spun up to handle increase in web traffic. This flies in the face of the general belief that DDoS typically causes a massive spike in fees paid to cloud platform providers. In addition, it’s been my experience that Amazon AWS and MS Azure will work with clients whenever they face DDoS attacks and will possibly waive the additional fees incurred in fending off DDoS attacks.

 – The firm used AWS Cloudfront CDN which has some intrinsic scrubbing capabilities. There are other CDN providers that could have been used as well. e.g. CloudFlare or Akamai Prolexic could have been deployed and also used to scrub traffic before getting to the client’s infrastructure on AWS.

Related Posts

Patch or Perish – Lessons of WannaCry Ransomware
Blogs

Patch or Perish – Lessons of WannaCry Ransomware

Last week, we saw one of the largest ransomware incidents in recent memory. Dubbed as WannaCry (also WannaCrypt, Wanna Decryptor), at this time, this malware is known to have infected over 230,000 computers in 150 countries. While…

Tixzy_Admin
  • May 15 , 2017
The (North American) Internet Runs out of Addresses
Blogs

The (North American) Internet Runs out of Addresses

Background American Registry for Internet Numbers (ARIN) announced earlier this week that they have officially exhausted IPv4 addresses. ARIN is the official organization tasked with providing unique network addresses to organizations that need to have a presence on…

Tixzy_Admin
  • Sep 30 , 2015

Subscribe to Our Newsletter

Check your inbox or spam folder to confirm your subscription.

Recent Posts

  • Executive News Roundup – January 14, 2018
  • Executive News Roundup – February 18, 2018
  • Executive News Roundup – February 11, 2018
  • Executive News Roundup – February 4, 2018
  • Executive News Roundup – January 28, 2018

Archives

  • April 2020
  • February 2018
  • January 2018
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • September 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015

Categories

  • Blogs
  • Company News
  • Weekly Executive Roundup

Follows Us

Company

  • Careers We’re Hiring!
  • News
  • Privacy statement
  • Contact us

What We Do

  • Cloud Computing
  • Information Security
  • Data Analytics

Contact Us

  • Icon info@tixzy.com
  • Icon212-380-1435
© 2025. Tixzy Consulting. All Rights Reserved