What You Should Know About the Digital Transformation Imperative

By Nominum

Posted on April 25, 2016 in: General, Marketing, Network, Security

Tags: , , ,

Guest post by Sue Rudd, Director, Service Provider Analysis, Strategy Analytics

Digital transformation means many things to many people—but to communication service providers (CSPs) today, it means not only moving to ‘All-IP’ networking and the Cloud, but also digitally transforming their networks and businesses to add value with more customer-centric innovative new services. While most CSPs around the globe appreciate this imperative, many are not sure how to achieve it. To help providers sort through the digital transformation maze, Strategy Analytics just published a new whitepaper that outlines some initial thoughts on the necessary technology and business strategy CSPs must adopt to remain competitive.

Read more

Huge Spike in DDoS Activity for the Holidays

By Hongliang Liu

Posted on December 15, 2015 in: Network, Security

Tags: ,

Nominum Data Science detected a huge wave of malicious DNS queries rolling across the Internet Dec 14 and 15 2015, adding to stress for service providers already have around the holidays.  Since it’s one of the peak buying seasons on the Internet most networks are locked down and operations teams are on alert.   Many unfortunately were probably not expecting a huge surge in DNS DDoS as it has been fairly consistent the past few months.  ThreatAvert customers were protected but many other networks likely experienced adverse impact – substantial slowdowns or even outages for servers that saw high volumes of queries.

Read more

Ghosts Haunt Internet II: Android Malware

By Hongliang Liu

Posted on September 30, 2015 in: Network, Security

Tags: , , ,

Android fans were probably chuckling over the XcodeGhost malware news – hackers don’t often penetrate Apple’s defenses. This provoked the Nominum Data Science team to take a look at what’s happening with malware targeting Android. Common wisdom is Android is exposed because there’s less rigor in the development and supply chain, and third party app stores with no protections are popular. Determined hackers can allegedly subvert defenses and get various kinds of exploits placed on mobile devices running the highly popular operating system. But what does the data show?

Read more

XCodeGhost Haunts the ‘Net

By Hongliang Liu

Posted on September 23, 2015 in: Network, Security

Tags: ,

The DNS offers visibility into many kinds of Internet trends including various security threats. We’ve reported extensively on DNS DDoS and Nominum Data Science also tracks botnet activity. In this case queries for Command and Control (C&C) domains for the recently disclosed XcodeGhost malware were observed in September. Infected development tools were reported to have been used for the popular iOS app WeChat.

Read more

Abuse in New gTLDs

By Ali Fakeri-Tabrizi

Posted on September 4, 2015 in: Network, Security

Tags: ,

Nominum Research continues to refine algorithms, working toward more generalized methods to quickly detect “anomalous” activity that might represent DDoS, bots, or various other undesirable behaviors.  To simplify somewhat, algorithms examine high speed, real-time, data streams and compare a small window of incoming queries to a very large “normal” historical sample on a continuous basis.   Unexpected variations are flagged and relevant data is captured for further analysis.

Read more

DDoS Holiday?

By Bruce Van Nice

Posted on August 28, 2015 in: Security

Starting in late July 2015 there was a noticeable drop in the DNS-based DDoS activity that Nominum Data Science has been tracking for the last 18 months. As reported earlier, the beginning of 2015 saw a tactics change from large periodic bursts that attracted lots of attention at the end of 2014, to steadier traffic that took down targets with measured efficiency.

Read more

Move over silos: Breaking down the barriers of innovation

By Mike Tuttle

Posted on August 13, 2015 in: Marketing, Security

Tags: , , ,

Working in Product Management allows me to travel around the world visiting with customers and prospects alike to identify and solve challenges facing today’s Internet providers. This typically includes engaging with individuals in a wide variety of domains – including marketing, customer care, product management, legal and network and subscriber security. Throughout these interactions, I have noted the emergence of a common theme – the challenges presented by siloed solutions developed to solve a single problem without consideration for the requirements of other departments and the business as a whole.

Read more

DNS DDoS Mid-Year Summary

By Bruce Van Nice

Posted on June 24, 2015 in: Network, Security

Tags: , ,

 

2014 saw numerous huge spikes in DDoS traffic – some as large as 5 billion queries per day across Nominum worldwide data set which covers around 3% of overall ISP DNS traffic. Extrapolating, this meant more than 150 Billion unwanted queries across the Internet on the peak days.

Read more

New Best Practice: Ingress Filtering to Deter DNS DDoS

By Bruce Van Nice

Posted on June 15, 2015 in: Security

Tags: , ,

DNS DDoS continues on the trend line established in 2014 – with tens of billions of malicious queries Internet-wide every day. Many of the domains attacked are lightly trafficked, but popular (Alexa 5000) domains are commonly targeted. For example alternative news sites, a university, and ecommerce sites have been attacked in the past couple of months. Attacks on popular domains require extra care when mitigating to avoid blocking legitimate queries.

Read more

Death of an Authoritative Server

By Hongliang Liu

Posted on June 13, 2015 in: Network, Security

Tags:

Recent analysis of DNS data revealed some interesting pictures. Drilling down into detailed data for a single resolver showed one of the DDoS attacks that occur every day. In this case a small domain, 888fy.com, representing a gaming site in China (a common category of targets) was attacked. The graph below shows 2 different attacks, each lasting several hours.

Read more

1 4 5 6 7 8 12