Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Mitigating DDoS attacks with network function virtualization

By Itay Glick
Limiting Access Is the First Step to Securing Networks, cyber security news, NIST Cybersecurity Framework, access management
December 3, 2020

Distributed denial of service (DDoS) attacks are more than an inconvenience; they paralyze operations and cause significant direct and indirect costs to those affected. Over 23,000 DDoS attacks are recorded per day, leaving companies to deal with disrupted online services. Recently, New Zealand’s Stock Exchange (NZX) was hit by a large DDoS attack for four consecutive days which led to a stock market closure that barred many from trading.

While DDoS attacks similar to New Zealand’s aren’t specifically targeting communication service providers (CSPs), CSP services are collateral damage as attacks pass through their networks to reach their victims. Bursts of extreme DDoS traffic can prevent service delivery and even cause high infrastructure costs due to failures of routers, servers, and other network elements.

Currently, there are two common approaches to DDoS detection and mitigation for both CSPs and enterprises: inline solutions and scrubbing centers. Scrubbing center solutions typically sample the traffic flows. When they detect attacks, they reroute all of the traffic to areas where the attack is removed, and the clean traffic is routed back into the CSP network via virtual private network (VPN) or generic routing encapsulation (GRE) to avoid routing loops. Inline solutions, on the other hand, detect and stop DDoS attacks at the edge of the CSP network without regard for the size or duration of the attack, allowing only clean traffic to pass through. However, both solutions must be implemented at every point of the network for complete visibility and protection, which often leads to high costs.

Luckily, network function virtualization (NFV) is a game-changer that is more cost-effective at addressing DDoS with its demand-based utilization of virtualized resources for 5G and LTE services.

 

Growing DDoS Attacks

With vast increases in data traffic expected from 5G, new vectors open for cybercriminals to conduct DDoS attacks. This problem is exacerbated by the growing number of IoT devices and their limited cybersecurity measures, which provides cybercriminals with a wider landscape for launching attacks to hack and trigger DDoS assaults. Coupled with the fact that DDoS attacks are easy to launch using for-hire DDoS botnets, which can cost as little as 100 dollars per attack, businesses face more frequent and diverse threats than ever before.

The main motivator of deploying these attacks is financial gain. For example, in the case of NZX, they were given a ransom demand that threatened a shutdown of the stock market. But other motivators do exist. Cybercriminals may simply want to inflict harm on a company by slowing down their business operations or create distractions to steal business secrets.

 

Scrubbing Centers Solutions are a Thing of the Past

As mentioned earlier, the two main approaches to mitigating DDoS traffic are scrubbing centers and inline solutions. Scrubbing centers can be inefficient since they must route all the traffic. For this reason, network monitoring processes, such as Cisco NetFlow, are often used to sample traffic and send it to a scrubbing center to detect attacks. However, enabling these types of network monitoring processes involves additional overhead.

Scrubbing centers also have multiple disadvantages, largely due to the process of tunneling back clean legitimate traffic into the CSP network. Rerouting traffic adds an IP overhead and can cause lower performance with increased latency and packet fragmentation resulting in slow applications, VPN failures, and more. This latency negatively affects user experience, especially in data-heavy applications such as video streaming and online gaming. Rerouting also requires network routers to publish and propagate new routes e.g. BGP/OSPF), which can take two to three minutes during a large attack where every second is critical. Additionally, third-party solutions are not one-hundred percent effective since they only sample and inspect incoming traffic, not outbound.

 

NFV Offers a Scalable and Efficient Inline DDoS Solution

Unlike scrubbing centers, inline solutions are more accurate because the attack pattern is formed from processing information extracted from deep packet inspection (DPI) instead of aggregate statistics resulting in general patterns that may lead to over-blocking legitimate traffic users. However, since inline solutions monitor all traffic and stop attacks at the point of detection, they require a greater capital expense compared with scrubbing centers to guarantee reliability, throughput, capacity, and scalability at every point of the network.

To further protect the network from 5G’s expected data traffic increase, CSPs would theoretically need to allocate compute resources to handle any attack at every viewpoint. While this is not economical, multiple edge compute (MEC) and NFV can enable a cost-effective solution for DDoS mitigation by avoiding the over-allocation of dedicated infrastructure. This is because these solutions can identify the areas of the network that require specific protection rather than securing every endpoint.

NFV provides a scalable DDoS solution that can be deployed at the exact edge location required to meet and mitigate every level of attack. When inline DDoS detection and mitigation is implemented at the MEC, using NFV, the attacks can be mitigated as close to the attack source as possible. Such an architecture only utilizes shared resources that are needed among a host of virtualized edge compute functions. This makes inline DDoS detection and mitigation faster, more accurate, less expensive and keeps harmful traffic from getting past the edge into the core of the CSP network.

DDoS attacks may be growing in frequency and easier to conduct for cybercriminals, but with the right resources provided by a cloud native DDoS solution, CSPs and specifically 5G operators can lower TCO without compromising on protection from harmful attacks.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security DDoS risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Itay glick

Itay Glick is the AVP of network and cloud security at Allot. He has more than 17 years of executive management experience in cybersecurity at global technology companies based in the U.S., Europe, and Asia. Prior to joining Allot, he founded his own company and played a key role in managing the development of equipment for the lawful interception market on behalf of Verint Systems. Itay launched his career as a software engineer in an elite intelligence unit of the Israel Defense Forces. He holds an M.B.A. from Bar-Ilan University and a B.Sc. in electrical engineering from the Technion – Israel Institute of Technology.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 min Horev

    5 minutes with Roy Horev - The evolution of DDoS attacks

    See More
  • ddos-distributed-denial-service freepik

    DDoS attacks and botnets in 2021 – Mozi, takedowns and high-frequency attacks reshape the threat landscape

    See More
  • ddos-distributed-denial-service freepik

    How to protect against DDoS attacks in a distributed workforce model

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!