The Next Generation of DDoS Protection is Hybrid

F5 Ecosystem | June 15, 2016

The term hybrid, in technology, has come to mean composing some thing from two or more seemingly disparate things. Hybrid cloud, for example, brings together SaaS, IaaS, and on-premise as the basis for a new, diversified corporate computing environment. While diverging from the traditional, scientific definition, the use of “hybrid” to describe these new entities is nonetheless commonplace, if not entirely accurate for those of us whose superpower is, in fact, pedantry.

Security, too, is experiencing the pressure associated with “hybrid”, particularly when it comes to DDoS attacks. That’s because the attacks themselves are largely hybrid; comprised of both traditional volumetric and application-focused attacks, as was noted by SANS Institute back in 2014:

The most damaging DDoS attacks, which mix saturated attacks with targeted, application-specific attacks, have much the same frequency (39%) as targeted (42%) and volumetric (41%) alone. DDoS attacks tend to use a small set of Internet ports, but a variety of techniques to cause damage. DDoS attacks are rapidly evolving in severity, complexity and sophistication. According to one recent report, 64% of attacks employed multiple attack types. This moves the needle on the scale of difficulty companies face in identifying and defending against denial of service attacks. Combined multi-layered attacks employ volumetric, bandwidth saturation, authentication-based and application level attempts to disrupt, deny, degrade or destroy internet facing information or application resources. Defending todays’ attacks requires multi-pronged approach with a combination of on-prem, out-of-band and cloud technologies along with centralized management, analytics and advanced methods to detect increasingly sophisticated attackers. How quickly organizations discover and stop these threats is key to ensuring continuity of services and reducing the financial impact on business.

This trend has remained largely the same, with the technique now often referred to as smokescreening, which in other industry surveys has been experienced by 55% of DDoS targets. Nearly 26% of those lost customer data, and nearly half wound up with malware/viruses installed as a result.

With success rates like that you can bet this hybrid attack model will continue to put into play.

So how do you defend against these attacks? You fight fire with fire and go with a next-generation hybrid DDoS protection approach. That means a solution that marries traditional volumetric defenses with application-specific protection as well as adopting the ability to leverage both on-premise and cloud-based scrubbing to fend off those attacks that might otherwise overwhelm the corporate Internet connection. Basically, you need on-premise protection that can detect an imminent bandwidth saturating attack and activate an on-demand, cloud scrubbing service capable of absorbing the volume to prevent disruption of business.

But a modern approach is more than just having a cloud-based option readily available. Next-generation hybrid security architectures must streamline the process of moving seamlessly from on-premise to cloud-based scrubbing in the face of an attack. This new breed of hybrid DDoS protection should be able to detect attacks and act automatically, shifting scrubbing duties from on-premise to cloud when business disruption is imminent as defined by technical and business parameters.

The result is a multi-layered approach to defending corporate apps, data, and networks. It’s a next-generation solution combining the power of a specialized appliance with the expertise of a built-for-DDoS protection cloud-scrubbing service. It’s a comprehensive solution that takes advantage of on-premise dynamic behavioral analysis to identify and mitigate attacks, machine-learning to detect evasive threats or traffic anomalies, and powerful automation capabilities to boost efficiency. Application- specific threats are discovered based on data stream logic, aggregated signals from HTTP, and the boundaries of TCP requests, transactions, server health, and similar characteristics.

And when the volume peaks on-premise, threatening to disrupt business by slowing down or stopping access to apps both corporate and consumer, volumetric attack traffic can be seamlessly redirected to an on-demand, cloud-based scrubbing service with nearly infinite scale to alleviate the pressure created by such frontal assaults on the business.

That’s the power of specialization. By combining a focused on security DDoS protection appliance

with a focused on DDoS protection cloud service, you get the best of both worlds. Which is really the point of a hybrid approach: combining the best attributes of two different models to form a single, comprehensive and efficient solution. Welcome to the new normal.

Share
Tags: 2016

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

Architecting for AI: Secure, scalable, multicloud
F5 Ecosystem | 01/20/2026

Architecting for AI: Secure, scalable, multicloud

Operationalize AI-era multicloud with F5 and Equinix. Explore scalable solutions for secure data flows, uniform policies, and governance across dynamic cloud environments.

Rein in API sprawl with F5 and Google Cloud
F5 Ecosystem | 01/20/2026

Rein in API sprawl with F5 and Google Cloud

Find out how F5 and Google Cloud can help you secure and manage your ever-increasing API integrations.

Nutanix and F5 expand successful partnership to Kubernetes
F5 Ecosystem | 01/09/2026

Nutanix and F5 expand successful partnership to Kubernetes

Nutanix and F5 have a shared vision of simplifying IT management. The two are joining forces for a Kubernetes service that is backed by F5 NGINX Plus.

AppViewX + F5: Automating and orchestrating app delivery
F5 Ecosystem | 12/19/2025

AppViewX + F5: Automating and orchestrating app delivery

As an F5 ADSP Select partner, AppViewX works with F5 to deliver a centralized orchestration solution to manage app services across distributed environments.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us