Protecting DNS Infrastructure Inside and Out
|
|
|
- Ellen Lane
- 10 years ago
- Views:
Transcription
1 Protecting DNS Infrastructure Inside and Out How to combat a pervasive threat that is doing serious harm to businesses every day
2 How to combat a pervasive threat that is doing serious harm to businesses every day With the rise of the Internet as a primary channel of commerce, government, and personal communication, Domain Name System (DNS) has become a critical protocol, used constantly by all sorts of organizations for essential functions. Unfortunately, it has been largely overlooked in efforts to protect IT infrastructures, and it is increasingly targeted for exploitation by hackers. Two basic kinds of attacks are prevalent. Outside-in attacks are aimed at disrupting network services or bringing them to a halt entirely. Inside-out threats use malware planted on an organization s own servers to steal sensitive information and send it to criminals. Many organizations today have elaborate traditional security measures in place, but most of them have very minimal DNS protection. These organizations are at increasing risk of damage to their reputations, declining customer loyalty, costly legal actions, and direct loss of revenue if their DNS goes down. This white paper explains in detail the type of hazards your networks face, summarizes industry research on trending threats, explains the techniques necessary to defend against DNS-based attacks, and describes the Infoblox solution for protecting your DNS infrastructure from both outside-in and inside-out threats. DNS Makes Everything Work and Puts Everything at Risk. Today nearly everything depends on the Internet, and the Internet depends on a protocol called the Domain Name System (DNS). DNS is used for external connections, such as consumers accessing ecommerce websites, and for internal connections, such as employees using , conferencing, and ERP applications. DNS is as ubiquitous and as essential as electricity today. But because it is an established industry-standard protocol that operates in the background, developers of security software have largely overlooked it. As a result, it is increasingly targeted for exploitation by hackers. Two basic kinds of attacks are prevalent denial-ofservice (DoS) attacks from outside the network, and malware that has infected clients inside a company s network. Many organizations have elaborate defense-in-depth or layered security systems in place that combine antivirus software, traditional firewalls, security information and event management (SIEM) systems, and other techniques to protect their IT infrastructures. But most of them have little DNS protection, or none at all. To be safe from the rising number of DNS-based attacks, these organizations need to protect DNS servers from both outside-in and inside-out threats by: Mitigating attacks on external authoritative servers by intelligently recognizing various attack types and dropping the attack traffic without disrupting legitimate queries Avoiding the theft of customer data and business assets by blocking malware queries that exploit DNS 1
3 Outside-in Attacks Assaults on the infrastructure launched from outside the victim s network use command-and-control servers or botnets to disrupt the functions of an organization or bring them to a stop entirely. If they succeed in taking down external DNS servers of the organization, the entire network is disconnected from the Internet. This kind of attack is usually launched by someone with an ax to grind such as hactivists, unscrupulous competitors, or hostile governments. Whether an outside-in attack shuts the network down completely or merely succeeds in reducing performance, it can result in revenue loss and damage to the brand. Inside-out Attacks Malware exploits are inside-out threats, using bugs planted on an organization s own servers to send information out via DNS query responses. Malware exploits are usually crimes for profit committed by criminal groups that combine the hierarchical organization of legal businesses with the distributed cell structure of terrorist networks. 1 These criminals use data-exfiltrating malware to steal information such as customer credit-card numbers and market it to lesser criminals who use it directly to commit theft. Or they hold data such as access codes hostage, demanding ransom from their victims. Number Two and Climbing When Arbor Networks conducted its ninth annual Worldwide Infrastructure Security Survey on application-layer (layer 7) attacks, 77 percent of the respondents said they had been hit with a DNS attack. Within the many attack vectors being exploited today, DNS is second. 2 DNS is #2 attack vector protocol HTTP 82% DNS 77% SMTP 25% HTTPS 54% SIP/VOIP 20% IRC 6% Other 9% 0% 20% 40% 60% 80% 100% Figure 1: Attack vectors experienced by surveyed respondents (source: 2014 Arbor Worldwide Infrastructure Security Report) 2
4 Infrastructure Layer: 76.76% The Q Prolexic Quarterly Global DDoS Attack Report says that the total number of distributed-denial-of-service (DDoS) attacks increased by percent between 2012 and More to the point, according to Prolexic, the use of DNS-based attacks is increasing, constituting 9.58 percent of infrastructure-layer attacks between Q3 and Q4 of Overall in 2013, there has been an increase of 216 percent in DNS-specific attacks. ACK: 2.81% CHARGEN: 6.39% FIN PUSH: 1.28% DNS: 9.58% ICMP: 9.71% RESET: 1.4% RP: 0.26% SYN: 14.56% SYN PUSH: 0.38% TCP Fragment: 0.13% UDP Floods: 13.15% UDP Fragment: 17.11% Application Layer: 23.24% Figure 2: Attack vectors by percentage of overall threat landscape (Source: Q Prolexic Quarterly Global DDoS Attack Report) HTTP GET: 19.91% HEAD: 0.64% NTP: 0.26% SSL POST: 0.13% PUSH: 0.77% HTTP POST: 1.53% To put these statistics into the context of the impact on businesses, Infoblox commissioned IDG Research to conduct a Network World Custom Solutions Group study that resulted in a report titled Market Pulse Research: DNS Protection. Our goal was to find out how organizations are protecting themselves from DNS-based attacks, how many of them have actually been victim to one, what the financial impacts were, and how confident organizations are that they can mitigate future attacks. One hundred and twenty-eight participants were recruited from among Network World s audience, all of them involved in the purchase, implementation, or management of network security solutions and services. 5 The findings painted a picture of a network management community that is aware of the danger of DNS-based attacks and concerned over the consequences, but largely unsure of how to recognize them (or even know whether they have occurred) and how to defend against them. 3
5 Nearly half of the participants said they are extremely concerned about downtime resulting from cyberattacks, but a widespread lack of visibility into DNS security events prevents them from having hard information to act on. Among participants who are sure they ve been attacked: A large majority 76 percent were victims of DNS DDoS attacks, with DNS cache poisoning coming in second at 33 percent. Half of these said the attack caused a DNS service interruption and/or diminished network service. The average length of service interruption was seven hours. The chief concern among respondents is downtime and inability to conduct business, followed by loss of sensitive data and brand damage. Type of DNS-based Attack Experienced DNS DDoS attack 76% DNS cache poisoning 33% DNS exploits UDP flood 29% 29% DNS tunneling Amplification 24% 24% Man-in-the-middle 14% Other 0% Don t Know 5% Figure 3: Among those who have experienced a DNS-based attack, the large majority report that they were the victims of a DNS DDoS attack. About one third were victims of DNS cache poisoning. 4
6 Level of Concern about Impact of DNS-Based Attack Downtime/Inability to conduct business Extremely / very concerned: 72% 38% 34% 20% 5% 3% Extremely / very concerned: 64% Loss of sensitive data 37% 27% 18% 14% 5% Negative impact on perception of your organization or brand Extremely / very concerned: 61% 30% 31% 22% 12% 5% Poor customer experience Extremely / very concerned: 57% 24% 33% 27% 9% 6% Extremely / very concerned: 55% Loss of revenue 27% 28% 26% 11% 9% Increased operational costs associated with remediation Extremely / very concerned: 55% 21% 34% 31% 10% 4% Extremely / very concerned: 45% Risk of noncompliance 21% 24% 26% 20% 9% Extremely concerned Very concerned Somewhat concerned Not very concerned Not at all concerned Figure 4: Most respondents are highly concerned about downtime and the inability to conduct business, loss of sensitive data, and a negative impact or perception of their organization or brand. A Few High-profile Examples These statistics are good for analyzing trends, but the impact of DNS-based attacks is apparent to anyone who follows IT-related news on line. There is nothing theoretical about the threat DNS vulnerability poses. Attacks are happening with increasing frequency and they re getting bigger. 6 Go Daddy In September of 2012, domain registrar and web-hosting firm Go Daddy experienced a six-hour outage during which many of the company s client sites went down as well. Rumors circulated that Go Daddy s DNS servers were not resolving, forcing many websites offline. Word spread that a hacker claiming ties to the hactivist group Anonymous was taking credit for the attack. 7 Go Daddy CEO Scott Wagner countered by denying the reports of hacking and saying that the service outage was due to a series of internal network events that corrupted router data tables. 8 Whether the outage was the result of an attack or of IT configuration problems, it is a dramatic illustration of what happens when DNS goes down. 5
7 Spamhaus In March of 2013, the spam-filtering organization Spamhaus was hit by a record 300-Gbs DDoS attack that spread to multiple Internet exchanges and slowed traffic, primarily in Europe. The attack, apparently, was a revenge hacking carried out by a recently blacklisted concern called CyberBunker, whose anonymous host services are suspected to be a conduit for spam. According to Kelly Jackson Higgins, writing in Dark Reading, the attackers abused improperly configured or default-state DNS servers, also known as open DNS resolvers, in the attacks, and this was not a standard botnet-borne attack. This allowed for a bigger bandwidth attack with fewer machines since DNS servers are large and run on high-speed Internet connections a recipe that led to the recordbreaking DDoS level. Security experts estimate that there are around 21 million of these servers running on the Net. CloudFlare, the service Spamhaus hired to deflect the attack, determined that it was a DNS reflection attack launched by a handful of open DNS resolvers. When CloudFlare began to distribute the load across its own data centers, the attackers targeted bandwidth providers that use CloudFlare s services, affecting even more Internet exchanges. 9 Twitter and the New York Times In August of 2013 a gang of cyberterrorists calling themselves the Syrian Electronic Army (SEA) hacked into the systems of Melbourne IT, a web registrar in Australia. The hackers were able to change details of the New York Times and Twitter s registrations so that they pointed to servers controlled by SEA. Twitter s inline image service was still down hours after the hack. SEA broadcast its actions to world on Twitter, of course. 10 Microsoft SkyDrive As is almost always the case when consumer services are disrupted by an attack, users of Microsoft SkyDrive cloud services freely shared their displeasure via Twitter. The SkyDrive service, Microsoft s online Office suite, its Xbox site, and other sites went dark when a DNS patch failed. The outage hit the United States at night, but in Australia, it happened just as office staff were getting to work and trying to access documents stored in Microsoft s cloud. And soon after, the bad publicity began to get tweeted around the world in multiple languages. Although faulty DNS management rather than weak DNS security is indicated in this instance, it is yet another example of the severe consequences of DNS downtime. 11 China In January of 2014, a large portion of Internet traffic in China was redirected to servers run by a U. S. company. Internet users began to complain about being unable to access social media sites and search engines. Ultimately, two-thirds of the traffic in China was interrupted. 6
8 According to one security company, the problem was probably related to DNS servers, because people who tried to access sites were all sent to a single IP address, identified as that of the U. S. company. Since the company provides services to help people view content blocked by China s Great Firewall, it was immediately suspected to be the perpetrator, but the company s founder denied any involvement. 12 What Can You Do to Keep Your Organization Off the Front Pages? If anything disproves the axiom, there s no such thing as bad publicity, it s a successful DNS attack. No one wants to be the next internationally acclaimed hacking victim. And unfortunately, the DNS protocol and the commonly used utilities for managing DNS have inherent security vulnerabilities. Firewalls have to leave port 53 open to let DNS traffic through. And it is difficult to identify exploits and attacks, because DNS-management applications don t provide specific visibility into traffic types. In addition, traditional security measures such as next-generation firewalls, secure web gateways, incident-detection systems, and incident-prevention systems don t directly protect DNS infrastructure. Measures more specifically applicable to DNS, such as overprovisioning to withstand attacks and blacklists maintained manually by network administrators, can t keep up with evolving threats. So how do you protect against the loss of trust, possible lawsuits, remediation and compliance costs, and diminished revenue a successful attack can cause? How do you prevent DoS and DDoS attacks in the first place, and if they do occur, how do you keep your business processes running while you fight them? And if malware finds its way past your firewall, how do you keep it from exploiting DNS as a channel to send customer data and company assets off the network to criminals who hope to profit at your expense? At Infoblox we are well aware that to protect against DNS-based attacks, you must fight a war on two fronts, with outward-facing defenses against denial-of-service attacks and internal defenses to protect against malware exploits. Based on this knowledge, and on our extensive experience helping our customers around the world manage and secure DNS services, we offer a complete solution that protects you on both fronts. The Infoblox Secure DNS Solution The Secure DNS Solution comprises Infoblox Advanced DNS Protection, which protects networks from outside-in attacks, and Infoblox DNS Firewall, which blocks malware communication from within the network. Running on purpose-built DNS appliances, these solutions secure both fronts by protecting your external and internal DNS infrastructure. Unlike the products of all other DNS vendors, our solution has intelligent detection and mitigation built in to automatically address DNS attacks and malware-based DNS queries. In addition, it leverages continual, automatic updates to protect against new and evolving attacks and emerging malicious domains and networks. Infoblox is the first and only vendor to offer this level of security for DNS appliances. 7
9 Protection against Outside-in Attacks Protection starts with the hardware Infoblox purpose-built appliances hardened for security during the manufacturing process and certified for Common Criteria Level EAL-2. One-click enablement and automatic key refresh eliminate the usual complexity of implementing DNS Security Extensions (DNSSEC), an effective protocol in preventing DNS hijackings and cache poisoning. Running on this robust platform, Infoblox Advanced DNS Protection continuously monitors, detects, and drops packets of DNS-based attacks including amplification, reflection, floods, exploits, tunneling, cache poisoning, and protocol anomalies and mitigates them, at the same time continuing to respond to legitimate traffic. This provides critical DNS services even when a network is under attack. The system also receives automatic updates based on threat analysis and research to provide protection against new and evolving DNS attacks as they emerge. Through comprehensive reports, the solution gives you a centralized view of attacks that have happened on your network and provides the intelligence you need to take action. These reports include details like number of events by category, rule, severity, member-trend analysis, and time-based analysis. And since every enterprise has different DNS traffic-flow patterns that can vary based on seasonality, time of day, or geography, the Infoblox Secure DNS Solution provides tunable traffic thresholds that you set, enabling you to fine-tune protection parameters based on your unique traffic patterns. This enhances the solution s ability to respond to good traffic without issues while blocking or dropping malicious traffic. Infoblox Threat Rule Server DNS Tunneling Legitimate Traffic Exploits Legitimate Traffic Reconnaissance Legitimate Traffic Amplification Legitimate Traffic INTERNET Automatic Threat Updates Block DNS attacks Grid-wide rule distribution Block DNS attacks Infoblox Advanced DNS Protection Infoblox Advanced DNS Protection D M Z INTRANET Send reports Send reports Grid Master and Candidate (HA) DATA CENTER Reporting Server CAMPUS / REGIONAL Figure 5: Protecting against outside-in threats 8
10 Key Features Smart rate thresholds put the brakes on DNS DDoS and flood attacks without denying services to legitimate users. Source-based throttling detects abnormal queries by source and causes bruteforce methods to fail. Destination-based throttling detects abnormal increases in traffic grouped by target domains. Next-generation programmable processors provide high-performance filtering of malicious and legitimate traffic. Detecting reconnaissance activity and reporting it helps your network team identify attacks and prepare for them before they are even launched. Analyzing packets for patterns of exploits that target specific vulnerabilities makes it possible to stop some attacks before they reach the DNS software. Centralized visibility and reporting enables your network team to recognize attacks happening in different parts of the network. Ongoing protection through automatic updates from Infoblox makes sure that your Secure DNS Solution evolves to handle the changing threat landscape. Blocking Inside-out Malware Threats While DNS has its inherent weaknesses, it also has a significant strong point: It is a natural ambush point for disrupting malware and advanced-persistent-threat (APT) communications to malicious command-and-control and botnet servers. The Infoblox DNS Firewall protects against malware-driven DNS-queries to malicious domains by proactively preventing clients from becoming infected and by disrupting the ability of infected clients to communicate with botnets or command-and-control servers. It prevents clients from going to a malware website, and hijacked DNS command-andcontrol requests are not executed, preventing botnets from operating. All inappropriate connection attempts are logged and correlated to help pinpoint infected clients. And as it does with intelligence on external attacks, the solution leverages comprehensive, accurate, and current data on rapidly evolving domains and networks to detect and block connections weeks to months sooner than you could if you had to use manually compiled blacklists. 9
11 DNS Firewall Subscription Service INTERNET Automatic Threat Updates D M Z Data Center INTRANET NX series Blocks bad DNS queries Play Malware Attack Reporting Server DNS Clients Figure 6: Protecting against inside-out threats Key Features Automated review and blocking of resolved DNS queries to bad domains from infected clients Logging of DNS transactions that can be used by third-party applications such as SIEMs Integration with Infoblox core DHCP and IP address management to give the industry s best visibility into infected devices by IP and MAC address and device type Automatic updates every two hours to reflect fast-flux changes of domains and IP addresses Geography-based blocking for rogue nations and known regions of hacking activity 10
12 Protection from Advanced Persistent Threats Infoblox Secure DNS Solution also benefits from the integration of DNS Firewall with the FireEye NX series of APT-detection software. The integration combines the power of FireEye APT detection and Infoblox DNS-level blocking and device fingerprinting to help network teams detect and disrupt APT malware communication and to pinpoint infected devices attempting to access malicious domains. Internal & External: FireEye + DNS Firewall Subscription A DNS Firewall Subscription Svc C & C Portals Infoblox Firewall Subscription Service B DNS Firewall - FireEye Adapter C & C Proxies A IPs/Oomains/etc. of bad servers C & C / Botnet Portal IP s , DNS Server with DNS Firewall INTERNET INTRANET B NX series Domain-name & Host IP address to be blocked Block/ Redirect DNS Query 3 Play Malware Attack Infected Enterprise End-point Detects and detonates advanced malware Malware DNS query to find and phone home Infoblox Reporting Server - ID infected device by IP/MAC address & device type Figure 7: Protecting against APTs Key Features Automatic DNS-level blocking of detected APTs to block DNS queries at the domain and IP level Flexible policy enforcement to pass through, block, or redirect queries so that administrators can act on them within specific security frameworks Identification of infected devices to expedite remediation and slow the expansion of attacks Reporting of malicious domains and IP addresses to give IT security personnel greater understanding of APT attacks 11
13 It s Time to Stop Losing Ground to Hackers and Thieves. What we hope we ve done with this white paper is raise your awareness of a serious threat to your company, your customers, and your success, and convince you that the health and well-being of your network could very well depend on how soon you reinforce your overall security infrastructure with the Infoblox Secure DNS Solution. DNS is the cornerstone of the Internet, but it has long been ignored when it comes to protection, and this has created a vulnerability that the criminal community is taking more advantage of every day. The only solution built with these facts in mind is the Infoblox Secure DNS Solution. Contact us today to find out more about this critical shield against the most dangerous threats your network faces. About Infoblox Infoblox (NYSE:BLOX) helps customers control their networks. Infoblox solutions help businesses automate complex network control functions to reduce costs and increase security and uptime. Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP, and IP address management (IPAM) for applications and endpoint devices. Infoblox solutions help over 6,900 enterprises and service providers in 25 countries control their networks. 1 Cybercrime and Organized Crime, The United Nations Crime and Justice Research Institute, Arbor Worldwide Infrastructure Security Report, Arbor Networks, Q Prolexic Quarterly Global DDoS Attack Report, p. 3, Prolexic Technologies, Inc., Prolexic, p Market Pulse Research: DNS Protection, a Network World Custom Solutions Group study conducted on behalf of Infoblox by IDG Research Services, December Prolexic, p Anonymous hacker claims Go Daddy attack: outage hits millions, ZDNet, 10 September, Go Daddy Site Outage Investigation Completed, Go Daddy News Releases, 11 September, Misconfigured, Open DNS Servers Used In Record-Breaking DDoS Attack, Kelly Jackson Higgins, Dark Reading, 27 March, Twitter and New York Times still patchy as registrar admits SEA hack, The Guardian, 28 August, Microsoft SkyDrive suffers outages, Chris Griffith, The Australian, 22 November, China Websites Hit with Disruptions, Paul Mosur, Wall Street Journal, 21 January,
14 A Dictionary from the Dark Side of IT A simple way to gauge the extent of the danger posed by DNS vulnerability is to look at the sheer number of attack types currently being launched. This is not all of them. And new ones are emerging. Direct DNS amplification attacks congest DNS server outbound bandwidth by sending a large number of DNS queries that provoke a response up to 70 times the size of the request. Reflection attacks use a third-party DNS server to send queries that include the victim s IP address as the source IP in the query, so responses flood the victim s address, bringing down the site. Distributed reflection DoS (DrDoS) attacks combine reflection and amplification to significantly increase the size of the response to the initial queries and the likelihood that the victim s server will be overwhelmed. TCP/UDP/ICMP flood attacks are volumetric attacks with massive numbers of packets that consume a network s bandwidth and resources. DNS-based exploits make use of software bugs in protocol parsing and processing implementation to exploit vulnerabilities in DNS server software. DNS cache poisoning consists of inserting a false address record into the DNS query, so that subsequent requests for the address of the domain are answered with the address of a server controlled by the attacker. Protocol anomalies send malformed DNS packets, including unexpected header and payload values, to the targeted server, making it stop responding or crash by causing an infinite loop in server threads. Reconnaissance consists of attempts to get information on the network environment before launching a large DDoS or other type of attack. DNS tunneling involves tunneling another protocol through DNS port 53 which is allowed if the firewall is configured to carry non-dns traffic for the purposes of data exfiltration. 13
15 Corporate Headquarters: (toll-free, U.S. and Canada) EMEA Headquarters: APAC Headquarters: Infoblox Inc. All rights reserved. infoblox-whitepaper-protecting-dns-infrastructure-inside-out-jan2014
Securing Your Business with DNS Servers That Protect Themselves
Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate
Securing Your Business with DNS Servers That Protect Themselves
Product Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
Are You Fully Prepared to Withstand DNS Attacks?
WHITEPAPER Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure
WHITEPAPER. Designing a Secure DNS Architecture
WHITEPAPER Designing a Secure DNS Architecture Designing a Secure DNS Architecture In today s networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries.
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
TECHNICAL WHITE PAPER. Infoblox and the Relationship between DNS and Active Directory
TECHNICAL WHITE PAPER Infoblox and the Relationship between DNS and Active Directory Infoblox DNS in a Microsoft Environment Infoblox is the first, and currently only, DNS/DHCP/IP address management (DDI)
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business
& Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright
STARTER KIT. Infoblox DNS Firewall for FireEye
STARTER KIT Introduction Infoblox DNS Firewall integration with FireEye Malware Protection System delivers a unique and powerful defense against Advanced Persistent Threats (APT) for business networks.
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE
WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF
DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail
DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Top Five DNS Security Attack Risks and How to Avoid Them
WHITEPAPER Top Five DNS Security Attack Risks and How to Avoid Them How to Effectively Scale, Secure, Manage, and Protect Your DNS Table of Contents Executive Overview 2 DNS Attacks Are on the Rise 2 External
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer
2012 Infrastructure Security Report 8th Annual Edition Kleber Carriello Consulting Engineer Key Findings in the Survey* Advanced Persistent Threats (APT) a top concern for service providers and enterprises
Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.
Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1 Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Why Is DDoS Prevention a Challenge?
ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has
Enhancing Your Network Security
Enhancing Your Network Security Rainer Singer SE Manager Central Europe October 2013 Infoblox Overview & Business Update Founded in 1999 Headquartered in Santa Clara, CA with global operations in 25 countries
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.
FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
How to Evaluate DDoS Mitigation Providers:
Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse
Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
ADC Survey GLOBAL FINDINGS
ADC Survey GLOBAL FINDINGS CONTENTS Executive Summary...4 Methodology....8 Finding 1: Attacks Getting More Difficult to Defend... 10 Finding 2: Attacks Driving High Costs to Organizations.... 14 Finding
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Application DDoS Mitigation
Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
AntiDDoS1000 DDoS Protection Systems
AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
