SiEM: A Complementary Approach to Addressing DDoS

PinIt

SiEMs are increasingly playing a role in identifying precursors to DDoS attacks and in helping mitigate the root causes of those attacks.

Security information and event management (SiEM) systems have long been relied on to support threat detection, compliance, and security incident management. Traditionally, using SiEMs has not been the primary method security analysts and SecOps teams have gone to when dealing with distributed denial of service (DDoS) attacks. But as the impact of DDoS attacks grows, SiEMs are increasingly playing a role in identifying precursors to attacks and in helping mitigate the root causes of those attacks.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics

DDoS attacks are getting much more attention now. While DDoS attacks can be launched against any target, there is increasing concern about attacks against government entities and critical infrastructure. This is especially true as DDoS is likely to be an element of cyber warfare now and into the future.

See also: Continuous Intelligence Insights

Additionally, the rapidly growing number of smart devices and IoT devices, many of which are inadequately secured, offers malicious actors new opportunities. Compromising a network of such devices gives cybercriminals yet another attack vector. 

Traditionally, the main defense against DDoS attacks has been of a more reactive nature. When a malicious actor launched an attack, organizations would either shut down the links bringing in the high volume of traffic or perhaps rely on a content delivery network partner to help prevent the traffic surge from impacting their sites and servers.

The problem with that approach is that actions are taken after an attack is launched. A better approach would be to identify the telltale signs of a DDoS attack before they impact an organization and automatically take steps to mitigate the issue.

How can SiEMs help? SiEMs collect and analyze (both near real-time and historical) security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).

A SiEM tool could be used to detect different types of DDoS attacks using its incident detection engine. Additionally, if the tool has an inference engine, it could be used to automatically infer potential countermeasures to respond to and recover from DDoS attacks. Such an inference system would need to continuously reason for each reported incident and provide suggestions to keep the system stable.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics
Salvatore Salamone

About Salvatore Salamone

Salvatore Salamone is a physicist by training who has been writing about science and information technology for more than 30 years. During that time, he has been a senior or executive editor at many industry-leading publications including High Technology, Network World, Byte Magazine, Data Communications, LAN Times, InternetWeek, Bio-IT World, and Lightwave, The Journal of Fiber Optics. He also is the author of three business technology books.

Leave a Reply

Your email address will not be published. Required fields are marked *