Our knowledge to you.


  1. DDoS Attacks: A threat that should not be ignored

    Comments Off on DDoS Attacks: A threat that should not be ignored

    A young student sits in class nervous about an upcoming online exam that will take place third period. He is certainly unprepared, and knows that another unsatisfactory grade could result in summer school. Desperate, he runs through his options: he can take a deep breath and push through the exam, he can fake a sickness and go the nurse’s office, or he can find a way to cause an internet outage that lasts long enough to avoid his test. Although many prior generations might have chosen one of the first options, the current generation is a little more technologically sophisticated. The student opens his school issued iPad and purchases a cheap DDoS (Distributed Denial of Service) attack from a suspicious website. Within seconds, web traffic is sent to the school’s 1 Gbps internet circuit—causing all online resources to become unavailable, allowing the student to avoid his test.

    This is just one example of how a DDoS attack can be disruptive and compromise non-profit or business operations. Other motivations behind these easily created or launched attacks could include a personal vendetta by a disgruntled worker or ex-employee, a case of extortion wherein an attacker requests payment via bitcoin to stop the attack, or even just an act of “Hactivism” where a hacker takes down a website for sport or in support of a cause. Less commonly, DDoS attacks could be a result of a business rivalry, and in rare circumstances DDoS attacks could be state-sponsored or a result of cyber terrorism. Whatever the motivation may be, DDoS attacks are disruptive and create large risks to businesses.

    In the case of the above school, an internet outage could not only disrupt the student and his classmates’ exam, but also the activity of the entire building. All faculty and administrators could suffer from unproductivity, and other planned class activities could be disrupted as well. In businesses where these attacks occur, the organization could literally lose money either from internal unproductivity or external denial of service to customers—especially in relation to ecommerce. According to Arbor Networks’ Worldwide Infrastructure Scrutiny Report, nearly 60% of organizations surveyed estimated their downtime costs to be about $500 per minute. The risk of these costs is certainly nothing to ignore.

    In addition to the cost of downtime, sometimes attackers will use DDoS attacks to tie up the organization’s technology professionals, while they commit data theft. This can be an even larger threat for some businesses—such as banks or hospitals that house very sensitive information. Along with this theft could come negative news coverage and a tarnished security reputation, or even regulatory scrutiny if the data theft is very serious. Thus, all of these risks are just a few reasons why DDoS attacks are such a threat to business operations, and unfortunately many businesses are unprepared when an attack strikes.

    Unfortunately, DDoS attacks are on the rise and cannot be easily prevented. However, they can be mitigated. DDoS mitigation is when malicious traffic is dropped by an internet service provider that regularly monitors a circuit’s web traffic, giving you the peace of mind that your business will not be helpless in the face of an attack. As these attacks become more prevalent and serious, many companies are choosing to use DDoS Mitigation to protect their business from these serious cyber threats.

  2. Emerging Technologies: Autonomous Agents and Things

    Comments Off on Emerging Technologies: Autonomous Agents and Things

    One of the hottest trends in technology is autonomous agents and things. That nebulous-sounding term is actually quite precise – it’s a technology that takes advanced machine learning a step further, so that it can make complex decisions on its own, or autonomously. This is beyond simple automation, where something happens automatically according to hard-and-fast rules. Instead, autonomous agents and things make reasoned decisions based on multiple factors about the current situation – they choose actions designed to meet a certain goal without the involvement of people.

    Examples include technologies like self-driving cars, advanced robotics, certain computer programs (including some viruses), or even something like a smart thermostat that senses when people are home and when they’re not, as well as other environmental changes, and adjusts accordingly – as opposed to one that is merely automated, running on a pre-programmed schedule.

    This is an emerging technology, but we can see its evolution in technology most of us encounter every day. For example, virtual assistants like Siri (Apple), Cortana (Microsoft) and Now (Google) began as little more than voice recognition search functions, but are now much more sophisticated. In fact, in 2016 Apple announced that it is allowing third-party apps to access Siri, so that users will be able to ask Siri to accomplish tasks such as sending payment or searching images. Eventually the user experience of a smartphone will likely have an autonomous agent as the entire user interface, rather than a screen full of buttons for different applications.

    Autonomous agents and things builds on the Internet of Things, in which devices are connected to the internet so that actionable data can be gathered. But the deluge of data provided by the IoT is becoming so overwhelming that it’s too much for humans to process. That’s where autonomous agents and things comes in — in the autonomous world, many technologies are interconnected and share data, and then act on it without the involvement of people. In fact, we’re now starting to refer to the Internet of Autonomous Things, or IoAT.

    Challenges with the technology

    We’re not close to the point where an autonomous agent could take over the world, as has been depicted in numerous sci-fi movies (2001: A Space Odyssey, or Her). But there are some significant, albeit more pedestrian, challenges to be addressed.

    Data security on the devices themselves is a significant problem, in that data can be easily recovered from decommissioned items such as smartphones – and people upgrade their phones at an extraordinarily rapid rate. And all kinds of IoT devices with capacity for storing and transmitting data are discarded frequently as well.

    But virtual data security is an even more significant issue. As we’ve seen, the IoT is vulnerable to hacks and security breaches. Currently, the most pervasive problem is that devices are inadequately protected by passwords, leaving them open to be recruited into giant, impersonal botnets used in distributed denial of service (DDoS) attacks. But as we move toward the Internet of Automated Things, where decisions are being made based on data collected by these devices, the potential implications of such hacks – either to the devices themselves, or the cloud where the data is stored – could become more directed, and even more serious.

    Furthermore, security issues – perceived as well as actual – might impact the growth of the technology in that they could cause people to distrust automated systems and things. We’ve already seen this effect with the IoT. It will be important for designers of automated consumer goods to learn from the mistakes of the IoT and effectively address security issues early in the technology’s evolution.

    Another potential issue for automated consumer goods is that people might find them too complicated to use. If, for example, consumers pay extra to buy cutting-edge automated thermostats but get frustrated trying to program them, they’ll give up on those advanced features and just use the manual settings – and might think twice before choosing an automated product again. To avoid this, designers will need to pay special attention to the user experience as they roll out new products.

    In the longer-term, liability will become more of an issue as systems become more and more autonomous – in other words, who will be held responsible if the system makes a decision that has harmful consequences? The manufacturer, or the owner of the system? It’s not difficult to imagine a scenario in which an autonomous system makes a decision that truly couldn’t be foreseen, especially as systems become more sophisticated. The regulatory framework will need to evolve along with the technology.

    Current applications of autonomous agents and things

    Computer programs are among the most well-developed applications of autonomous technology right now. For example, sophisticated supply chain management programs are capable of evaluating and reacting to needs such as ordering supplies, scheduling workers and so on without human involvement – going beyond simple automation.

    Driverless technologies are already utilized in cars – for example, cars that can park themselves into tight spaces, or automatically brake when they get too close to another car or object. Evolution of truly driverless cars isn’t far behind — in fact, experts think this is possible by 2021. Ford, Nissan, Google, BMW, General Motors, and Daimler are just a few of the big names working toward this goal. Data security is of particular importance with this potential application, as the implications of hacking could be dangerous or life-threatening.

    The world of autonomous agents and things is ever-changing. Keep up with your business’s advancing bandwidth demands with DQE’s secure fiber optic network services, where scalability is unlimited and customization is key.