Blurring the Line: Performance and Security
Learn about distributed denial of service attacks, complete with graphs and traceroutes, and read a helpful updated diagram of the author's performance iceberg.
Join the DZone community and get the full member experience.Join For Free
many factors can impact the user experience of a website or mobile app including bad code, bad architecture, infrastructure, external factors such as fiber cut, government interference (invisible hand), and cdn and dns providers issues.
unfortunately, we now have to add another reason: security.
per google : a distributed denial of service (ddos) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. they target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
we hear about massive ddos attacks that are impacting brands, taking down critical services and infrastructure on what seems like a daily basis.
if your business relies on your website or app, it’s important to have a strong understanding of this very real security threat. there are two kinds of ddos attacks:
external and malicious
recently, one of the properties we monitor suffered from one of these attacks. as is the case in many of these attacks, the pattern of the attack was very interesting: two small incidents occurred to probe before the big one that eventually took the site down for eight hours.
there are many ways of protecting yourself from a ddos, but it really boils down to having enough capacity to handle the load and ensure that the real users can still access your services. this is why many cdn players have launched web application firewall (waf) at the edge while protecting the origin.
other methods include deploying solutions like prolexic, a leader in this space now acquired by akamai, which basically routes traffic to their data centers and applies scrubbing science to stop the bad guys.
the challenge with this is making sure that valid traffic is not scrubbed. this also happened this past week with one of our customers; some of our ips were either whitelisted or blacklisted at different time which seems a bit odd (as shown below).
traceroute after being blacklisted:
1 12 ms 5 ms 11 ms 18.104.22.168
2 <1 ms <1 ms <1 ms 22.214.171.124
3 <1 ms <1 ms <1 ms 126.96.36.199
4 <1 ms <1 ms 4 ms ae24-166.lon11.ip4.gtt.net[188.8.131.52]
5 1 ms 2 ms 1 ms ae-9.r00.londen10.uk.bb.gin.ntt.net[184.108.40.206]
6 2 ms 2 ms 5 ms ae-15.r02.londen03.uk.bb.gin.ntt.net[220.127.116.11]
7 10 ms 2 ms 2 ms ae-2.r02.londen01.uk.bb.gin.ntt.net[18.104.22.168]
8 2 ms 2 ms 2 ms ae-1.r03.londen01.uk.bb.gin.ntt.net[22.214.171.124]
9 2 ms 2 ms 2 ms 126.96.36.199
10 2 ms 2 ms 2 ms unknown.prolexic.com[188.8.131.52]
11 7 ms 2 ms 2 ms unknown.prolexic.com[184.108.40.206]
12 2 ms 8 ms 13 ms 220.127.116.11
13 * * * timed out
14 * * * timed out
15 * * * timed out
16 * * * timed out
it’s extremely important to make sure you deploy solutions to ensure that your ddos protection systems are not causing reachability problems for real users, since my ip address in our uk office went to the cyber dump at the same time:
1 192.168.64.1 (192.168.64.1) 1.001 ms 4.125 ms 0.836 ms
2 10.43.10.1 (10.43.10.1) 1.245 ms 1.369 ms 2.440 ms
3 18.104.22.168 (22.214.171.124) 1.477 ms 2.005 ms 3.264 ms
4 126.96.36.199 (188.8.131.52) 2.450 ms 3.104 ms 2.575 ms
5 xe0-0-0-pr2.lon.router.colt.net (184.108.40.206) 2.956 ms 4.010 ms 4.095 ms
6 220.127.116.11 (18.104.22.168) 6.260 ms 5.151 ms 4.639 ms
7 unknown.prolexic.com (22.214.171.124) 3.594 ms 3.757 ms
unknown.prolexic.com (126.96.36.199) 3.666 ms
8 unknown.prolexic.com (188.8.131.52) 9.877 ms
unknown.prolexic.com (184.108.40.206) 8.500 ms 16.638 ms
9 unknown.prolexic.com (220.127.116.11) 25.894 ms
18.104.22.168 (22.214.171.124) 20.651 ms 23.919 ms
internal and self-inflicted via trusted party
with all of the third parties that a site must deploy these days, another ddos vector is internal. a trusted third party has a bug and does an auto-refresh or auto-reload and creates an infinite loop, thus a self-inflicted ddos.
this is what happened to a few big sites last summer during velocity 2015 (bad timing) where a third-party tag was setting a reload to the entire page and causing a loop. the incident lasted about four hours.
we all know that the customer experience defines the product. i have often said that the new marketing mix includes a fifth ‘p,’ for performance.
the events of last week reminded me that security attacks and the counter measures deployed can also have a huge impact to this customer experience and i will be updating my infamous performance iceberg i have been using since the late ’90s.
some closing thoughts
back at doubleclick in 2002, after hiring one of our best csos dr rey leclerc , discussions started around performance, monitoring, and security and where they really fit in an organization. many organizations lack a single group in charge of performance monitoring at the macro level. we were the few in 1999 to establish a group dedicated to quality of experience; but in 2016, we still have not clearly defined a function that owns performance both horizontally (it working with marketing, for example) and vertically ( integrating performance with agile dev teams).
if performance is going to be this critical to a company where it defines its brand, its revenue success, and product adoption, is it not time to elevate this function the same way we have cso, red team and blue team, and have individuals and teams whose sole mission is to monitor, baseline, benchmark report, and enforce performance policies while reporting to a c-level?
performance is a journey not a destination; it’s never done the same way as security!
Published at DZone with permission of Mehdi Daoudi, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.