Radware has announced that its SSL DDoS attack protection, DefenseSSL, now features behavioural-based algorithms for keyless protection against https flood attacks. For the first time, organizations have the scale needed to effectively mitigate https floods, says Radware.
According to Google, the majority of Internet traffic is now encrypted and accounts for more than 70 percent of Internet pages. While SSL/TLS encryption is critical for many aspects of security, it also opens the door to a new generation of powerful distributed denial-of-service (DDoS) attacks. SSL/TLS connections require up to 15 times more resources from the destination server than of the requesting host, meaning that threat actors can launch devastating DDoS attacks using only a relatively small number of connections. Radware’s keyless DDoS mitigation solution now makes it possible to protect from SSL-based HTTP DDoS attacks at scale without adding latency to customer communications, and while preserving user privacy and simplifying key management.
Radware’s Chief Marketing officer, Anna Convery-Pelletier, said, “Our new DefenseSSL capabilities support carriers and service providers in protecting themselves and their customers against https flood attacks even when they don’t have access to their tenants’ decryption keys. This unique capability eliminates the massive operational complexity that comes with managing decryption keys. Further, with this solution, enterprises have the flexibility to opt for the most suitable protection to match their needs. Enterprises that have access to decryption keys can still choose to use those keys to decrypt suspected traffic and increase the accuracy of their mitigation.”
Radware’s solution for keyless protection against https flood attacks is based on a stateless architecture. Traditional solutions are stateful and thus themselves vulnerable to DDoS attacks. With advanced behavioural algorithms and the combination of rate-based and non-rate-based parameters, Radware can identify DDoS attacks over encrypted traffic, even without inspection of the traffic’s content.