Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities
|
|
|
- Denis Fox
- 10 years ago
- Views:
Transcription
1 Service Provider Solutions Enabling Clean Pipes Capabilities June
2 Service Provider Security Highlights Security is the heart of internetworking s future A secure infrastructure forms the foundation for service delivery We have moved from an Internet of implicit trust to an Internet of pervasive distrust The Miscreant Economy is here to stay and has created a damaging business opportunity of criminal intent All the other functionality of the router merges into a pervasive policy enforcement model QoS = Security HA = Security Edge Policy = Security We must improve reaction times, reduce windows of vulnerability, and ensure service delivery across the network 2
3 Macro Trends Fueling DDoS Attacks World Internet usage between has grown 146.2% to 800+ million Broadband explosion has resulted in an increasing number of poorly secured home PCs with always-on Internet connections just waiting to be discovered and taken over by miscreants ecommerce growth has made dependence on Internet more critical than ever Globalization due to the dot com explosion, outsourcing, and peer-to-peer applications has increased international traffic exchange significantly Most attacks launched from multinational origins very hard to isolate and take action on the extortionists 3
4 Evolution of Threats and Exploits High Exploiting Known Vulnerabilities Back Doors Packet Forging/Spoofing Stealth Diagnostics Sniffers Sweepers BOT Ware and P80 Services Root Kits Hijacking Sessions Disabling Audits Sophistication of Tools Blended Threats Pulsing Zombies Low Self-Replicating Code Password Guessing Password Cracking Technical Knowledge Required 4
5 BOTNETs Making DDoS Attacks Easy Extortionist CE ISP Edge Router Last-Mile Connection Customer Premise: Zombies Server/FW/Switch/router BOTNETs for Rent A BOTNET is comprised of computers that have been broken into and planted with programs (zombies) that can be directed to launch attacks from a central controller computer BOTNETs allow for all the types of DDOS attacks: ICMP attacks, TCP attacks, UDP attacks, and http overload Options for deploying BOTNETs are extensive and new tools are created to exploit the latest system vulnerabilities A relatively small BOTNET with only 1000 zombies can cause a great deal of damage For example: 1000 home PCs with an average upstream bandwidth of 128 kbps can offer more than 100 MBps Size of attacks are ever increasing 2-for-1 Special 5
6 Elements Impacted by DDoS Applications Attacks will exploit the usage of TCP/HTTP to overwhelm the computational resources Host/servers Attacks will attempt to overload the resources using protocol attacks Critical servers will not respond to normal request Bandwidth Attacks will saturate the bandwidth on IP data connections that limit or block legitimate traffic flows Infrastructure Attack target critical assets of network including routers, DNS/DHCP servers, and others devices that deliver network connections Collateral damage Attacks that impact devices not originally targeted such as computation overload by devices that carry the DDoS attack 6
7 Impacts Caused by Denial of Service Sabotage System Penetration Website Defacement Misuse of Public Web App Telecom Fraud Unauthorized Access Laptop Theft Financial Fraud Abuse of Wireless Network Insider Network Abuse Theft of Proprietary Info Denial of Service Virus $871,000 $901,500 $958,100 $2,747,000 $3,997,500 $4,278,205 $6,734,500 $7,670,500 $10,159,250 $10,601,055 $11,460,000 CSI/FBI 2004 Computer Crime and Security Survey Source: Computer Security Institute $26,064,050 $55,053, M 20M 30M 40M 50M 60M Total Losses for 2004 $141,496, : 269 Respondents 7
8 Quotes from the Industry Extortion is becoming more commonplace, says Ed Amoroso, chief information security officer at AT&T. It s happening enough that it doesn t even raise an eyebrow anymore. We ve had [extortion attempts] happen to our customers, says Bruce Schneier, CTO at managed security services provider Counterpane Internet Security. More often than I d like, they re paying up. Antidistributed DoS services cost around $12K per month from carriers such as AT&T and MCI, says John Pescatore, Gartner security analyst. The most popular type of antidistributed DoS equipment used by SPs is Cisco Riverhead gear and Arbor Networks detection tools. This equipment can filter about 99% of the attack traffic. 8
9 The Risk to Your Business At risk: The network is at risk to extortion Maintaining business availability Preserving reputation and customer retention Regulatory obligations SOX, GLBA, Legal and service-level liabilities What can you do Take a proactive stance Plan and prepare for the worst case Apply appropriate security tools DDoS prevention solution X X BOTNET Internet Service Provider 9
10 What are Clean Pipes Capabilities? A solution set to protect against security threats on the data pipe that are critical to deliver connectivity and services The data pipe choke point could be: Enterprise/SMB/Consumer Last-mile data connection Federal Data connections accessing critical information Service Provider All data connections (i.e., Peering Points, Peering Edges, Data Center ) Most damaging types of threats that reside on the data pipe: Distributed Denial of Service (DDoS) Worms Viruses Goal is to remove the malicious traffic from the data pipe and only deliver the legitimate traffic before the link is compromised Service providers can protect themselves from attacks and can deliver security services for protection 10
11 Overview Network Management Network Foundation Protection 11
12 DDoS Protection Models DDoS Protection Model Managed Network DDoS Protection Managed Hosting DDoS Protection Managed Peering Point DDoS Protection DDoS Infrastructure Protection Core Function(s) Last-mile bandwidth protection for the service provider customers Protection of data center assets hosted by the provider Provide DDoS-free wholesale connections for downstream ISPs Protection model for the service provider to defend their networks and protect service delivery Key Capabilities New SP revenue model Primary function to enhance business continuance for customers Protection of critical last-mile bandwidth Ensure the continual delivery of enhanced services offered over data connections New SP revenue model Ensure uptime of critical assets hosted by the service provider Differentiation of the hosting service New SP revenue model Provide clean wholesale connections Better promote a DDoS-free environment Protect critical assets in the data center Mitigate attacks on critical routing infrastructure (Peering Points, Provider Edges and Core routers) Reduce OPEX by reduction of unwanted traffic across expensive transoceanic links Reduce collateral damage impacts 12
13 Managed Service DDoS Protection Solution Architecture Infrastructure Security Infrastructure DDoS Protection Hosting DDoS Protection Internet Transoceanic Peer ASBR Server Farms ASBR ASBR Netflow Netflow ASBR RR Guard XT/AGM Netflow Cleaning Center 1 Service Provider PE Guard XT/AGM Netflow Cleaning Center 2 ASBR Arbor Peakflow SP CE Customer Cisco Detector OutOut-ofofband Network DDoS Protection 2005 Cisco Systems, Inc. All rights reserved. SP NOC ASBR Downstream ISP Peering Point DDoS Protection Cisco Public 13
14 Lifecycle of DDoS Protection 14
15 Detection Process Steps 1. Attacks are launched by extortionist via BOTNETS. 2a. Cisco Detector on the customer premise can precisely detect when the customer is under attack. 2b. Netflow statistics from Cisco routers are exported to Arbor Peakflow SP for correlation. Anomalies are inspected for unexpected traffic behavior. 2c. The Detector or Arbor Peakflow SP indicates to the Guard that an attack has commenced. 15
16 Diversion and Mitigation Process Steps 3a. A BGP announcement is the mechanism used to divert traffic to the Cisco Guard. 3b. All traffic (malicious and legitimate) to the attacked destination is redirected to the Guard. 4. The Cisco Guard drops the DDoS anomalies and allows only the legitimate traffic to continue. 5. Cleaned traffic is injected back to the data path to reach the actual destination. Traffic is continually monitored by Netflow and the Cisco Detector. 16
17 Network Foundation Protection Protects infrastructure, enables continuous service delivery Data Plane Detects traffic anomalies and responds to attacks in realtime Technologies: NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools Control Plane Defense-in-depth protection for routing control plane Technologies: Receive ACLs, control plane policing, routing protection Management Plane Secure and continuous management of Cisco IOS network infrastructure Technologies: CPU and memory thresholding, dual export syslog, encrypted access, SNMPv3, security audit NetFlow, ACLs, urpf Customer CE NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools, PE-PE encryption PE ASBR Core Internet ASBR Service Provider NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools Control Plane and Management Plane Protection 17
18 Cisco Traffic Anomaly Detector Detecting and Defeating Complex DDoS Attacks Programmable Element Enabling: Sophisticated behavior-based anomaly detection Granular, per-connection state analysis of all packets Behavioral recognition engine eliminates the need to continually update profiles Session-state context recognizes validated session traffic Delivering: Highly accurate identification of all types of known and Day Zero attacks Fast and thorough detection of the most elusive and sophisticated attacks Elimination of the need to continually update profiles Reduced number of alerts and false positives common with static signature-based approaches Detects per-flow deviations Identifies anomalous behavior Responds based on user preference Traffic Anomaly Detector XT 5600 Traffic Anomaly Detector Module 18
19 Cisco Guard Detecting and Defeating Complex DDoS Attacks Programmable Element Enabling: Detailed, granular, per-flow analysis and blocking Integrated dynamic filtering and active verification technologies Protocol analysis and rate limiting Intuitive, Web-based GUI simplifies policy definition, operational monitoring, and reporting Delivering: Precision traffic protection, while allowing legitimate transactions to flow Rapid, auto protection against all types of assaults, even Day Zero attacks Admission of only traffic volumes that will not overwhelm downstream devices Identification/blocking all sizes of attacks, including those launched by distributed zombie hosts Helps ensure uninterrupted business operations from even the most malicious assaults Traffic Anomaly Guard XT 5650 Traffic Anomaly Guard Module 19
20 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network changes and services Improve network usage and application performance Reduce IP service and application costs Optimize network costs Detect and classify security agents Cisco 800 Cisco 1700/1800 Cisco 2600/2800 Cisco 3600/ 3700/ 3800 Cisco 4500/ 4700 Cisco 5300/ 5400/ 5800 Supported Platforms Cisco 7200/ 7300/ 7400/ 7500 Cisco 4500 ASIC Cisco 6500/ 7600 ASIC Cisco 10000/ CRS-1 20
21 Day Zero Attack Detection with NetFlow Benefits: Monitor traffic for anomalies Identify and classify the attack Trace attack to its source 21
22 References Product and Technology Enablers NetFlow IOS on Cisco Routers Network Foundation Protection Cisco Guard XT Appliance and Cisco Anomaly Guard Service Module Cisco Traffic Anomaly Detector XT Appliance and Cisco Traffic Anomaly Detector Service Module Router Security Arbor Networks (a Cisco Partner) 22
23 Conclusion DDoS is a real and growing threat that can impact your business delivery and business reputation Take a proactive approach to handling security on your network DDoS protection is a managed security service opportunity Protect your infrastructure with DDoS protection and NFP Cisco has the leading products and solutions to address the security threats Contact your sales contact to find out more today 23
24 2005 Cisco Systems, Inc. All rights reserved. Cisco Public 24
25 Network Foundation Protection Features and Benefits Plane Data Plane Control Plane Management Plane Cisco IOS Services NetFlow IP source tracker Access control lists (ACLs) Unicast reverse path forwarding (urpf) Remotely triggered black holing (RTBH) QoS tools PE-to-PE encryption Receive ACLs Control plane policing Routing protection CPU and memory thresholding Dual export syslog Encrypted access SNMPv3 Security audit Benefits Macro-level anomaly-based DDoS detection; provides rapid confirmation and isolation of attack Quickly and efficiently pinpoints the source interface an attack is coming from Protect edge routers from malicious traffic; explicitly permit the legitimate traffic that can be sent to the edge router s destination address Mitigates problems caused by the introduction of malformed or spoofed IP source addresses into either the service provider or customer network Drops packets based on source IP address; filtering is at line rate on most capable platforms. Hundreds of lines of filters can be deployed to multiple routers even while the attack is in progress. Protects against flooding attacks by defining QoS policies to limit bandwidth or drop offending traffic (identify, classify, and rate limit) Provides strong encryption within service provider network Control the type of traffic that can be forwarded to the processor Provides QoS control for packets destined to the control plane of the routers; ensures adequate bandwidth for high-priority traffic such as routing protocols MD5 neighbor authentication protects routing domain from spoofing attacks Redistribution protection safeguards network from excessive conditions Overload protection (e.g., prefix limits) enhances routing stability Protects CPU and memory resources of IOS device against DoS attacks Syslog exported to dual collectors for increased availability Encryption access for users (SSHv2, SSL) and management applications Secure SNMP management for third-party or custom-built applications Provides audit trail of configuration changes 25
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Putting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
CISCO DDOS PROTECTION SOLUTION DELIVERING CLEAN PIPES CAPABILITIES FOR SERVICE PROVIDERS AND THEIR CUSTOMERS
WHITE PAPER CISCO DDOS PROTECTION SOLUTION DELIVERING CLEAN PIPES CAPABILITIES FOR SERVICE PROVIDERS AND THEIR CUSTOMERS It is important for service providers and enterprises to understand how distributed-denial-of-service
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION
AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION Overview Distributed Denial of Service (DDoS) attacks saturate target networks with service requests that consume the capacity
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Distributed Denial of Service protection
Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Hunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS
WHITE PAPER CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS Today, service providers and their customers are exposed to a growing
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
DEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
Bleeding Edge DDoS Mitigation Techniques for ISPs
Bleeding Edge DDoS Mitigation Techniques for ISPs Abstract. Distributed Denial of Service (DDoS) attacks are increasing plaguing the Internet since their first big appearance against Yahoo in the year
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
Network Bandwidth Denial of Service (DoS)
Network Bandwidth Denial of Service (DoS) Angelos D. Keromytis Department of Computer Science Columbia University Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.
Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January 2009. Cristian Velciov. [email protected] (+40) 721 250246
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard January 2009 Cristian Velciov [email protected] (+40) 721 250246 Andrisoft Solution WANGuard Platform is an enterprise-grade Linux-based software
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
NSFOCUS Anti-DDoS System White Paper
White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Solution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
DDoS Mitigation Solutions
DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports
JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE
WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
Application DDoS Mitigation
Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
A Primer for Distributed Denial of Service (DDoS) Attacks
A Primer for Distributed Denial of Service (DDoS) Attacks Hemant Jain, VP of Engineering Sichao Wang, Director of Product Management April 2012, Fortinet, Inc A Primer for Distributed Denial of Service
FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.
FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
Pravail 2.0 Technical Overview. Exclusive Networks
Pravail 2.0 Technical Overview Exclusive Networks Pravail Features and Benefits Arbor Pravail APS is the a CPE-based security appliance focused on stopping availability threats Arbor Pravail APS Arbor
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
