Akamai Diversity

The Akamai Blog

Summer SOTI - DDoS by the numbers

Time for a Change

The State of the Internet / Security report has been the home for Akamai's research on DDoS, attack traffic and Internet threats for over three years. While the report has evolved and expanded its scope considerably over that time, the content and how it's presented have only seen moderate changes. But as of the Summer 2018 Web Attack report, you'll see significant changes in how we present this content.  

Written by Meyer Potashman

On May 25, 2018, the EU General Data Protection Regulation (GDPR) went into effect. In preparation, Akamai, like every other company that does business with or interacts in any way with individuals in the EU, needed to re-evaluate our approach to data protection and privacy to ensure that we are compliant with the new law. Since GDPR requires that companies evaluate the privacy practices of their suppliers and subcontractors, customers have been asking us about how we protect the personal data on our platform from both a privacy and security perspective. In this blog post, we discuss how our InfoSec team approaches some of these considerations.

Earlier this year, Akamai mitigated the largest DDoS attack in its history, fueled by a new reflector, memcached. The attack targeted one of our software clients and broke through the 1 Tbps threshold for the first time. Memcached was developed to act as a distributed memory caching system. Since the protocol uses UDP, an insecure protocol, and carries the potential for tremendous amplification, it has the key traits of a successful reflection-based attack vector. This Attack Spotlight takes a deeper look into the memcached attack vector that redefined the term "largest attack" and is the first part of our State of the Internet Security Summer 2018 report.

Remote access in a software defined world

When I first ventured into technology, I wish someone gave me a heads-up about the bevy of acronyms to remember. It feels like every day a new acronym related to technology is formed. It's hard enough remembering names within my family. During Thanksgiving with a full house, I struggle to remember even my own name! When I first heard of SDN - software defined networking, I was still working for a mobile technology vendor. That was a world where even network elements had acronyms (SGSN, RNC, GGSN, HLR, etc). SDN hadn't found adoption as much as it did within the enterprise/data center space. SDN is the separation of the network control plane from the forwarding plane, moving it to a centralized point where the control plane (represented by a controller) orchestrates several forwarding devices. This separation, while leveraging network virtualization, allows for optimization of control plane workflows and also aims at making the network agile and flexible. I was enamored with the concept. For one, I could count down to days when I no longer engaged in the manual, error-prone and time-consuming process of logging into each network device via the command line interface (CLI) to program the control plane of network devices. I still wonder how I remembered the CLI commands during my networking certification exams and system administrator days.

As reported in an ISOC report last year, IPv6 adoption is now solidly in the "early majority phase" of the technology adoption life cycle by many metrics (well past "innovators" and "early adopters"), with progress beyond that in some areas. Akamai continues to see solid growth in IPv6, including significant traffic peaks during large events, and we continue to find cases where IPv6 outperforms IPv4.

Having knowledge and visibility is just as important as products and technology when it comes to detecting and combating the latest attacks on the Internet. At Akamai, we protect customers from many of the largest and most sophisticated attacks in the world, and we are launching a series of Akamai Security Summits to share what we've learned. This is an opportunity for security professionals to discuss the latest intelligence with your peers at other organizations, as well as with our experts at Akamai. We will be talking about the record-setting DDoS attacks we saw in February this year, discussing the attack surface of web APIs, and reviewing the latest techniques for dealing with credential stuffing attacks.

Tailoring YouTube for Your Requirements

Did you know around 300 hours of video content is uploaded to YouTube every minute of every day? That's a staggering amount of content.

Akamai CEO and co-founder Tom Leighton discusses the company's cybersecurity and data protection business. He speaks with Caroline Hyde from the Boston Institute of Contemporary Art on Bloomberg Technology. (Source: Bloomberg)

Are VPNs a thing of the past?

Attention world: In 2018, we officially surpassed 4 billion internet users[1] - and there are no signs of adoption rate slowing down. Yet the Internet as we know it has only been around since the 1990s. Along with it, different iterations of virtual private networks (VPNs) have been created and utilized. Why have end users used this technology to connect remotely to private networks on a gigantic scale? Simply, they are seen to be efficient and can enhance productivity in a variety of ways, but (and there is always a "but"), the assumption is they are completely secure. Unfortunately, both unscrupulous individuals and organized crime groups have proven VPNs aren't the panacea that organizations think they are.

Akamai's global platform is comprised of 240,000 servers in 3,750 locations within 134 countries. Additionally, our platform interacts with 1.3 billion client devices every day and we ingest 2.5 exabytes of data a year. So why are these stats important?