Hello IoT, Goodbye Security Innocence

F5 Ecosystem | February 14, 2017

2016 showed us that the Internet of Things (IoT) is a game-changer when it comes to service provider networks.

I am not only referring to the control plane or traffic filters but also the havoc a larger, herded botnet of IoT devices can cause.

Mirai is a standout example of the latter, demonstrating in devastating fashion the power of a strategically orchestrated attack – in this case harnessing 620+ Gbps of malicious traffic.

The scale by far exceeded by far the imagination of many. Would anyone beyond the security community have had expected DVRs or connected cameras to become weaponized?

With the proliferation of networking in everyday devices, the re-use of operating systems and the ongoing component price wars, it was only a matter of time.

With this reality in mind, is anyone fixing the problem at the device level?

And we better get accustomed to another inevitable reality: the fixes have to come from the network, more precisely service provider networks, as they host potentially vulnerable devices and are closer to the source of the attacks.

This is especially true as attacks of scale and rapidly evolving complexity become increasingly common. Late last year, the Leet botnet provided another alarming case in point by attacking a security company using hashed and changing payloads, evading detection and generating a crippling 600+ Gbps of attack traffic.

Looking ahead, the security industry is in agreement that 600+ Gbps is not near the maximum we will see. It is going to get worse.

So what does it all mean for service providers and what can they do to get ready and future-proof both profit and innovation?

The good news is that the vast majority of service providers F5 Networks works with are taking the challenge extremely seriously – a stance I suspect is replicated across the industry.

Encouragingly, network defense is on the rise. Today, it is a given – or at the very least an expectation – that service providers will have to analyze traffic leaving their networks, identify problems as they emerge and deal with issues like botnets with speed and substance.

This is the dawn of a new alliance fighting denial of service attacks, whether they are caused by individuals or nations.

For example, service providers are now forced to cooperate and honor things like Border Gateway Protocol (BGP) flowspec announcements. BGP is the protocol that manages how packets are routed across the Internet through the exchange of routing and reachability information between edge routers.

The bottom line is that we need better weapons to stand a fighting chance.

Processing power is useful but we need more intelligent ways of dealing with attacks. SSL offloading is key here in terms of protecting control plane and data center resources, helping to prevent evasion through encryption whereas behavioral analysis enables us to detect new attacks, automate the generation of signatures and share these across local and/or global communities.

As attacks target both Open Systems Interconnection (OSI) layers and compute power itself, it is vital to have a comprehensive understanding of applications and protocols. The ability to distinguish good from bad traffic is now essential to ensure adequate defenses are in place and crucial services remain operational. Another direct result of the new cyber-threat landscape is a growing need for solutions that harness field-programmable gate array (FPGA)-based processing power to help absorb massive amounts of data.

The landscape for service providers is shifting at lightning pace and the opportunities and pitfalls of IoT are forcing them to rethink how they operate.

This is reflected in a strong surge in customers coming to us to make sense of it all, whether it is S/Gi firewall solutions to protect both their infrastructure and subscribers from attacks, or safeguarding the data center perimeter (protecting the application, protecting the protocols and acting as a gatekeeper to identify and repel attacks).

At F5, we are also witnessing a greater demand for the protection of IoT-based applications and protocols. Beyond this, security infrastructure consolidation is the next step, aiming to reduce cost and latency while increasing efficiency and manageability.

Furthermore, we are quickly adapting to develop functionalities that will allow for load sharing and collaboration of DoS mitigation devices. The cyber-criminals and their methods of attack are changing but so are companies like F5. We are bringing not only the tools but also the intelligence to the network to defend itself.

Sitting on the sidelines is no longer an option. The problems are out there and evolving at pace. Now is the time to attack them head on.

Share

About the Author

Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

The Internet of (Increasingly Scary) Things
F5 Ecosystem | 12/16/2015

The Internet of (Increasingly Scary) Things

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us