Consortium Partnership Project To Attack DDoS

Last December, a continuous distributed denial of service (DDoS) attack against Janet, a high-speed computer network used by numerous institutions in the United Kingdom, brought Web sites and other systems down and forced much of the academic community across that country offline for multiple days.

Now a consortium of colleges and universities in the United States will be working with a security company to help create a mechanism that enables multiple organizations to work together to defend against DDoS attacks. Members of the Northwest Academic Computing Consortium (NWACC) information security initiative will be working with Galois (pronounced "gal-wah") to help define the strategy and try out the technology to be developed.

Galois in January received a $1.7 million contract by the Department of Homeland Security Science and Technology Directorate to create the technology. The project, DDoS Defense for a Community of Peers (3DCoP), involves the creation of a peer-to-peer collaboration mechanism through which organizations can work together to detect and mitigate DDoS attacks.

The partnership started, according to NWACC President Martin Ringle, when a Galois representative gave a presentation at a security workshop held by the organization. "This specific project that Galois had in mind intrigued the information security community in NWACC," he said. "And the staff member at Galois was very impressed by the fact that you could collect so many IS security officers from higher education who were talking to each other and willing to work with each other."

The collaboration comes at an opportune time, as the number of DDoS attacks continues to rise, according to a number of sources. As an example, Verisign, which sells a DDoS protection service, reported 53 percent more attacks in the third quarter of 2015 than in the second quarter among its customers and mitigated more attacks in Q3 2015 than any other quarter from the previous two years.

"When they occur, [these attacks] can be incredibly crippling to an institution," said Ringle. One of the "biggest problems" with DDoS attacks, he explained, "is that it takes time to figure out what the nature of the attack is, what the targets are, how many different sites are being impacted by it, possibly what the route is it's taking, where it's originating and how to defend against it and remediate it."

An institution that becomes a victim of DDoS spends all of its resources defending against the attack, "many of which may be crippled by the attack itself," he added. "Having colleagues to work with means that you can do the analysis in real time across a number of sites... The chances that you're going to be able to zero in on the attack vectors and remediate them quickly and effectively is much, much higher."

NWACC, which counts numerous large institutions among its membership, including the universities of Washington, Oregon, Alaska and Hawaii, also has many other smaller members that are "simply not equipped — don't have the staffing, don't have the depth of expertise — to really defend against a concerted denial of service attack," said Ringle. "So really, the only effective way to deal with this is by collaborating."

Under the arrangement 10 members of NWACC's information security group will provide conceptual feedback and perform beta testing. "But over time that could evolve into anything," Ringle noted. "We're sort of taking a wait-and-see approach. I don't think anything is ruled out."

Goals for the Galois contract with Homeland Security include the reduction of mitigation response time by 50 percent, resulting in peak traffic reduction of 75 to 90 percent; and the reduction of the time between the start of the attack and the detection of the attack by 25 percent. The company said that as a result of those reductions, organizations would be able to detect and block DDoS attacks before they reached "complete network saturation."

The project is important, Ringle emphasized, because it will help "change the balance between the aggressors and the defenders." "We are sitting ducks in a way. By banding together, by having these colleges and universities work with another and with Galois, it gives us a leg up. We can't make the gap disappear entirely, but if we can close it so that we can react almost as fast as they can launch attacks, then that mitigates the damage that their attacks can do, and that makes us much more powerful in terms of defending our campuses and all the data that we manage."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.