The IST-funded DIADEM Firewall project has developed a novel and comprehensive security solution for secure broadband services, focusing on denial of service attack and mitigation, thanks to collaboration between a consortium of interested stakeholders from France Telecom, Polish Telecom, IBM Research, Imperial College London, University of Tübingen, Groupe des Ecoles des Télécommunications and Jozef Stefan Institute.
A distributed denial-of-service attack (or DDoS attack) attacks computer systems or networks and usually results in a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the system. The attack typically uses thousands of compromised home and business computers (or zombies) to bring down corporate systems, often as part of a blackmail attempt.
How big a problem is it? Well, DDoS attacks affected over 13 per cent of businesses in the United Kingdom at a cost of more than £558m in 2004 alone, according to the UK’s National Hi-Tech Crime Unit (NHTCU). The malicious data traffic can also significantly degrade the broadband experience for residential internet users, and impose dramatic network and customer support costs on broadband service providers. With broadband penetration projected to increase significantly in the coming years, that figure is likely to increase exponentially.
“There is no doubt that denial-of-service attacks are a growing issue as more and more services, such as online games, IP telephony, television over IP and e-shopping are provided to broadband users through the internet,” explains Yannick Carlinet, project coordinator of DIADEM Firewall. “It is a crucial and vulnerable aspect of broadband security and will become even more so in the future as more users move over to broadband connections,” he adds.
To strike back at the broadband bandits, the DIADEM Firewall partners opted to develop a distributed detection and reaction system located in the network and managed by the network operator. As Carlinet notes, this is already a radical move away from the current approach where end users are responsible for their own online security.
“The current security paradigm requires all end-users to organise and manage the security of their own terminals. This has many shortcomings and the failure of such an approach has been demonstrated too often in recent times for it to be considered a viable solution,” he says.
The DIADEM Firewall solution, by contrast, puts the focus back on the network provider. “Our overall goal was to develop and deploy innovative network components that enable service providers to offer to their customers secure broadband services in an effective and cost-efficient way,” says Carlinet.
“Functional and performance tests are taking place right now and we are optimistic that we’ll be able to show substantial progress over the state-of-art intrusion and prevention systems,” he says.
Indeed, technical issues are the least of the worries facing DIADEM Firewall as the project seeks to convince the key network players that they need to be proactive in ensuring the security of their broadband services.
“I think the main difficulties that need to be overcome now are strategic,” says Carlinet. “We need business units of Internet Service Providers (ISPs) and network operators to take account of the paradigm shift in security matters that is currently taking place, such as the transition from uncoordinated end-terminal security management to distributed network security policies.”
While operators may be somewhat resistant to the idea of change, they recognise nevertheless the commercial value of DIADEM Firewall solution, adds Carlinet.
“Discussions are ongoing with France Telecom and Polish Telecom business units with regard to commercial exploitation of our solution. We are also in contact with some application-level packet processor manufacturers that are interested in our approach.”
Other follow-ups are also planned to build on the sterling work achieved by the project. “There are a number of collaborative projects that have recently started and there is also the likelihood of future project proposals, for instance to extend the DIADEM solution to cope with internet worms,” concludes Carlinet. “There are also various internal projects by the individual partners and discussions with manufacturers for the implementation of functions designed in the project in commercial products.”
Tara Morris | alfa
Fraunhofer FIT joins Facebook's Telecom Infra Project
25.10.2016 | Fraunhofer-Institut für Angewandte Informationstechnik FIT
Stanford researchers create new special-purpose computer that may someday save us billions
21.10.2016 | Stanford University
Physicists from the University of Würzburg have designed a light source that emits photon pairs. Two-photon sources are particularly well suited for tap-proof data encryption. The experiment's key ingredients: a semiconductor crystal and some sticky tape.
So-called monolayers are at the heart of the research activities. These "super materials" (as the prestigious science magazine "Nature" puts it) have been...
Ultrafast lasers have introduced new possibilities in engraving ultrafine structures, and scientists are now also investigating how to use them to etch microstructures into thin glass. There are possible applications in analytics (lab on a chip) and especially in electronics and the consumer sector, where great interest has been shown.
This new method was born of a surprising phenomenon: irradiating glass in a particular way with an ultrafast laser has the effect of making the glass up to a...
Terahertz excitation of selected crystal vibrations leads to an effective magnetic field that drives coherent spin motion
Controlling functional properties by light is one of the grand goals in modern condensed matter physics and materials science. A new study now demonstrates how...
Researchers from the Institute for Quantum Computing (IQC) at the University of Waterloo led the development of a new extensible wiring technique capable of controlling superconducting quantum bits, representing a significant step towards to the realization of a scalable quantum computer.
"The quantum socket is a wiring method that uses three-dimensional wires based on spring-loaded pins to address individual qubits," said Jeremy Béjanin, a PhD...
In a paper in Scientific Reports, a research team at Worcester Polytechnic Institute describes a novel light-activated phenomenon that could become the basis for applications as diverse as microscopic robotic grippers and more efficient solar cells.
A research team at Worcester Polytechnic Institute (WPI) has developed a revolutionary, light-activated semiconductor nanocomposite material that can be used...
14.10.2016 | Event News
14.10.2016 | Event News
12.10.2016 | Event News
28.10.2016 | Power and Electrical Engineering
28.10.2016 | Physics and Astronomy
28.10.2016 | Life Sciences