WikiLeaks and the Cloud DDOS Strategy

WikiLeaks and the Cloud DDOS Strategy

I found the recent WikiLeaks saga to be fascinating. Never in history has the individual had so much power to collate and distribution sensitive information, with the ability to embarrass governments around the world and put them into damage control. But for a cloud computing vendor like myself, this story added an interesting twist.

Within hours of releasing documents, the WikiLeaks servers were under heavy attack from patriotic individuals, and likely also governments, trying to stem the flow of information. It was a typical distributed denial of service (DDOS) attack, which can usually shut-down an organization like WikiLeaks with ease.

Countering the problem

What surprised me about WikiLeaks is that they didn’t take the usual route of dealing with a DDOS attack by working with upsteam ISPs and traffic engineers to restrict the traffic approaching their servers. They realized that trying to stop an onslaught of traffic is both a political and technical challenge, and one that is likely to fail. Instead, they moved their services further into the cloud, distributing their content across the on-demand, readily billable and highly scalable Amazon EC2 infrastructure. It’s an excellent plan that realizes that you can avoid an attack by simply throwing more infrastructure at those trying to attack you.

Smart companies should look at the cloud as part of their DDOS mitigation strategy. It costs nothing to be prepared (Amazon EC2 charges are nil until you actually spin up the servers), provides infrastructure that can rapidly scale to meet the traffic challenge and provides you with a world-wide set of data-centers across which to spread the load.

[Yes, I know that WikiLeaks were eventually kicked off the Amazon EC2 infrastructure due to political wrangling by Senator Joe Liberman, but hopefully your organization isn’t that offside with the government that this should be a concern ;-)]

By Simon Elis /Contributor Of CloudTweaks.com

Simon Ellis is the owner of labslice.com LabSlice is a Virtual Lab Management solution powered by Amazon EC2.

2 Responses to WikiLeaks and the Cloud DDOS Strategy

  1. Umm… do you not pay by the bit for AWS like the rest of us ;-) For those of us that do, this approach has crappy economics.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All…

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Featured Sponsors

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud: Air Traffic Control For Your Customer

Salesforce Service Cloud One of the greatest benefits of the increasingly reliable and ubiquitous state of cloud technology is the removal of business silos and the consolidation of information flow, both in-house and on the road. This is of particular importance to the many different types of professionals whose work involves customer relationship management (CRM).…

2015 Advertising Opportunities - Find Out More!

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Blue square_logo_100x100-01
cisco_logo_100x100 vmware citrix100

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter