DDoS protection for applications in a data center
by Rackspace Technology Staff
Attackers target the origin
To protect the origin infrastructure, the edge provider handles Domain Name System (DNS) resolution, so that requests to your domains do not reveal the origin IP addresses. This process mitigates attacks against public-facing resources or websites and absorbs them on the edge. Edge providers can distribute attacks among hundreds of locations around the world before getting anywhere near your servers.
But what if an attacker does know your origin IP address or related blocks? Can they attempt to launch a DDoS attack directly? In a word, yes.
There are plenty of ways an attacker might come to learn your origin IP address, including by exploring
the following avenues:
- Historic DNS records, perhaps from before you implemented the edge security. It’s a good idea to request new IP ranges after such an implementation.
- Similar or generic subdomains, for example, **dev.example.com**, which might point back to your origin.
- Leaks from the application level, perhaps in HTTP headers.
- Secure Sockets Layer (SSL) Virtual Private Network (VPN) endpoints, which might expose a company domain name during the SSL handshake.
- Bad actors with inside knowledge, such as a disgruntled ex-employee.
- Compromise of a development environment or configuration management database.
- Malware on a company laptop.
- Social engineering or another sophisticated attack.
You can mitigate each of those avenues individually, but a persistent attacker might find a way to get through. Let’s assume that they have done so.
First line of defense: Firewalls
Within a data center environment or Private Cloud, perimeter firewalls are the first line of defense. Most people configure firewalls to allow incoming connections only via the edge provider, controlling access from Layer 4 or higher and preventing attempts to bypass a Layer 7 WAF.
But perimeter firewalls have a finite capacity for packet filtering and are connected to the public Internet with finite bandwidth. For many setups, this might be a 1 Gbps switch port or perhaps a 10 Gbps uplink. DDoS attacks, especially reflection attacks, can easily be in the tens or hundreds of Gbps. If bad actors launch an attack against the origin, then the firewall® and everything behind it is offline. You need another line of defense.
Next line of defense: Monitoring and mitigation
Rackspace DDoS Mitigation Services offer comprehensive traffic monitoring, multilayered anomaly detection technologies, and immediate DDoS attack mitigation to help keep your data secure and your business online. Our highly skilled team of DDoS specialists augments the hardware capability with human intuition to fend off attacks in real-time.
Also, consider reducing the attack surface or eliminating it. Tools such as Akamai Enterprise Application Access and Cloudflare Argo Tunnel work by deploying agents and connectors within your origin infrastructure that make secure outgoing connections to the CDN edge. These tools then send legitimate or authenticated requests back through those connections, with no need to expose your website or application to the Internet. These techniques result in no incoming firewall filtering and no access control lists. This powerful solution works exceptionally well with containerized workloads, eliminating the need to manage ingress controllers.
Conclusion
In summary, WAF and DDoS protection are essential for business-critical workloads and websites. Edge providers like Akamai, Cloudflare, and Imperva offer great solutions for performance and security. Despite these options, a sophisticated, persistent attacker can still attempt to attack the origin directly. Rackspace security experts can help with that.
Recent Posts
Patrones de redes híbridas de Google Cloud - Parte 2
Octubre 16th, 2024
Patrones de redes híbridas de Google Cloud - Parte 2
Octubre 15th, 2024
Cómo aprovecha Rackspace AWS Systems Manager
Octubre 9th, 2024
Windows Server impide la sincronización horaria con Rackspace NTP
Octubre 3rd, 2024