The Naughty port Project
|
|
|
- Morris Stevenson
- 9 years ago
- Views:
Transcription
1 The Naughty port Project May 2016 RIPE Copenhagen, DK Prepared by: Erik Bais Confiden'al
2 What is our business?? o Registra'on of IP addresses and AS numbers o IP Transit in various Dutch datacenters o Internet (Fiber) Access & Datacenter Network Services o 24 * 7 Monitoring and management of BGP infrastructure. o Specialized consultancy for ISP related topics like vendor selec'ons, network design & implementa'on. RIPE presenta'on What do we provide? 2016 Page 2
3 Currently in the following Dutch datacenters Currently 14 POP s RIPE presenta'on In The Netherlands 2016 Page 3
4 The original ques:on to solve.. RIPE presenta'on 2016 Page 4
5 Results during a DDOS... o Customers start calling as their primary traffic link is filled with garbage. o Not every complaining customer can afford or want to pay for DDOS mi'ga'on plans. o Customers will complain if they are seeing packetloss o Customers will complain quickly if they are offering VoIP or Hosted Desktop or VPN services ( Oh yes.. And gamers ) o Customers don t want to suffer from a DDOS to another customer. o The phone lines to the helpdesk are also red-hot during a DDOS o Customers make it your problem RIPE presenta'on 2016 Page 5
6 RIPE presenta'on 2016 Page 6
7 Defining ques:ons : o Where is the traffic origina'ng from ( Which ASn.. ) o Is the (original) traffic Spoofed IP traffic? o Can we filter the non-bcp38 traffic? Should we want to filter this? Will the used HW actually support such large ACL s? ( Nope..) o Why are we no'cing those Top Speakers only during a DDOS? o Will de-peering fix our issue? RIPE presenta'on 2016 Page 7
8 Regular Internet Exchange setup Naughty Peer #1 Good Peer #1 Good Peer #2 AMS-IX Route Servers AS51088 RIPE presenta'on 2016 Page 8
9 Let s build a test setup o How do these DDOS Stresser / booter sites work RIPE presenta'on 2016 Page 9
10 DDOS Amplifica:on basics 1/2 RADIUS Bad Guy with a computer TFTP Nice Guy with a network Chargen Computer with a spoofed IP address DNS Victim IP address SNMP NTP Amplification Attacks Basics RIPE presenta'on 2016 Page 10
11 DDOS Amplifica:on basics 2/2 DNS Bad Guy with a computer NTP Nice Guy with a network Chargen Computer with a spoofed IP address DNS Victim IP address SNMP NTP Amplification Attacks Basics RIPE presenta'on 2016 Page 11
12 Let s build a test setup o How do these DDOS Stresser / booter sites work o Enough scripts available on GitHub etc for tes'ng RIPE presenta'on 2016 Page 12
13 RIPE presenta'on 2016 Page 13
14 Let s build a test setup o How do these DDOS Stresser / booter sites work o Enough scripts available on GitHub etc for tes'ng o And no need to scan the complete internet for vulnerable IP s.. Everything can be parsed from downloads of exports via Shodan.io for example RIPE presenta'on 2016 Page 14
15 RIPE presenta'on 2016 Page 15
16 Let s build a test setup o How do these DDOS Stresser / booter sites work o Enough scripts available on GitHub etc for tes'ng o And no need to scan the complete internet for vulnerable IP s.. Everything can be parsed from downloads of exports via Shodan.io for example o And that insight gives a beher view on why we see the following during a DDOS RIPE presenta'on 2016 Page 16
17 AMS-IX Sflow tools RIPE presenta'on 2016 Page 17
18 The We AMS-IX page o Their per peer Sflow graphs & monitoring at the customer portal rocks. o The AMS-IX Route-servers support RPSL (important ) RIPE DB export-via / import-via support (YEAH!!) o Their NOC engineers were very helpful in assis'ng to get the solu'on to work. ( Thnx Aris & Kostas!! ) o The AMS-IX sales team provided us a flexible Try and Buy op'on contract at the Evoswitch Datacenter RIPE presenta'on 2016 Page 18
19 Let s try something else... o List all AS s that are only sending traffic DURING a DDOS amplifica'on ahack. o Most of these networks don t send ANY or hardly any traffic during normal opera'ons in our case.. o Can we peer with these par'es via the Routeserver on Port X but not via Port Y Will the Route Server support that..?? o Peer with the Naughty Peers, on a small (1Gb) IXP port. o Explain the setup to Sales@AMS-IX. Try this out in a setup in produc'on. A try and buy agreement for the second port via the AMS-IX EvoSwitch Datacenter Partner. RIPE presenta'on 2016 Page 19
20 RIPE RPSL & AMS-IX Routeserver integra:on A simple include / exclude in RIPE RPLS was all it took RIPE presenta'on 2016 Page 20
21 Fun fact o AMS-IX had a 2 vendor approach before we started this project. o But one of the AMS-IX Route Server vendors couldn t handle the new load on the route-server by the split view with the views via RPSL. RIPE presenta'on 2016 Page 21
22 So one of the Routeserver did RIPE presenta'on 2016 Page 22
23 Fun fact o AMS-IX had a 2 vendor approach before we started this project. o One of the AMS-IX Route Server vendors couldn t handle the route-server split view with the views via RPSL. o Famous last words Let s put this on produc'on in Friday, what could go wrong Resul'ng in the death of 1 set of route servers over the weekend RIPE presenta'on 2016 Page 23
24 o Shall we take it off-line? We asked the NOC. o Will that help? It is not in produc'on anyway (for us..) o And they kindly declined in order to be able to troubleshoot To have a valid reason to kill those RS RIPE presenta'on 2016 Page 24
25 Kudos RIPE presenta'on 2016 Page 25
26 Naughty Port Setup Naughty Peer #1 Good Peer #1 Good Peer #2 RPSL?? Ah!! AMS-IX Route Servers AS61180 AS51088 RIPE presenta'on 2016 Page 26
27 New ques:ons to ponder o Why are some networks on the Naughty list o Can we predict who should be on the list o Do we have Santa Skills? RIPE presenta'on 2016 Page 27
28 Santa Skillz RIPE presenta'on 2016 Page 28
29 New ques:ons to ponder o Why are some networks on the Naughty list o Can we predict who should be on the list o Do we have Santa Skills? Can we tell who is Naughty and who is nice? RIPE presenta'on 2016 Page 29
30 New ques:ons to ponder o Why are some networks on the Naughty list o Can we predict who should be on the list o Do we have Santa Skills? Can we tell who is Naughty and who is nice? o What are the benefits of having a Naughty Port RIPE presenta'on 2016 Page 30
31 RIPE presenta'on 2016 Page 31
32 Ra:ng the Naughty Networks. o We ve put every AS in a database o Uploaded the number of Open resolvers, NTP servers, Chargen, SNMP, SSDP IP s etc per AS in the database. o Pulled the number of announced IP per AS from the RIPE RIS API s o A high Naughty Ra'ng, doesn t mean a bad peer But is a naughty peer worth the trouble on your premium network link? Is a peer selec'on based on just traffic ra'o accurate? o Ra'ngs can be improved by proper Abuse Management ( Yes it is that simple... ) RIPE presenta'on 2016 Page 32
33 Time for reach-out o We ve asked several Dutch ISP s if we can name them in this presenta'on and explain them about the project.. o Most of them responded with : Yes you may use our name and data And How do we improve our ra'ng? o And these are their results RIPE presenta'on 2016 Page 33
34 Naughty Port ra:ngs RIPE presenta'on 2016 Page 34
35 Naughty Ra:ng interface RIPE presenta'on 2016 Page 35
36 How to improve you ra:ng? o Implement Abuse.IO (Yes, it is free.. and Open Source!! ) hhps://abuse.io/ For automagic abuse msg parsing and event handling o Request reports on your network at Shadowserver.org hhps:// GetReportsOnYourNetwork#toc3 There is a backlog on network report requests, processing may not be instant. RIPE presenta'on 2016 Page 36
37 Would you want your own Naughty Port? o We can explain how it works and how we did it.. o We can share the data provide access to the portal. o All you need is an extra AMS-IX port and an extra AS number. o And you can decide for yourself who you want on your list. RIPE presenta'on 2016 Page 37
38 Triple-IT already proofed it can be fixed RIPE presenta'on 2016 Page 38
39 Next steps : o Publish the Naughty Ra'ng Search interface on a website. We want the data to be open for all peering managers. o Check/discus what needs to be added..? TFTP? Others? o Checks per AS-SET s as well as AS number. RIPE presenta'on 2016 Page 39
40 Who has a ques:on? to: [email protected] Or call : Who has the first RIPE presenta'on ques'on? 2016 Page 40
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
Reducing the Impact of Amplification DDoS Attack
Reducing the Impact of Amplification DDoS Attack hello! I am Tommy Ngo I am here to present my reading: reducing the impact of amplification DDoS attack 2 1. Background Let s start with what amplification
DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Danger of Proxy ARP in IX environment version 0.3. Maksym Tulyuk [email protected]
Danger of Proxy ARP in IX environment version 0.3 Maksym Tulyuk [email protected] RIPE 63. Vienna 03 November 2011 Content 1. The Outage 2. Analysis and improvements 3. Useful tools and procedures
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
IP Connectivity Dedicated servers Co-location in data centers
Blix Solutions provides IP Connectivity Dedicated servers Co-location in data centers On the next pages we provide suggested solutions for some select markets ANYCAST PROVIDERS High uptime Internet connectivity
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
Webinar: Advanced RIPE Atlas Usage
Webinar: Advanced RIPE Atlas Usage Vesna Manojlovic Christopher Amin RIPE NCC Amsterdam August 2015 Goals 2 Learn how to: Use RIPE Atlas measurements for network monitoring and troubleshooting Use API
IXP Manager Workshop. 27 th Euro-IX Forum October 25 th 2015 Berlin, Germany
IXP Manager Workshop 27 th Euro-IX Forum October 25 th 2015 Berlin, Germany Barry O Donovan & Nick Hilliard, INEX Ireland s Internet Neutral Exchange Point [email protected] What is IXP Manager? Full
AMS-IX overview. Henk Steenman February 2005
AMS-IX overview Henk Steenman February 2005 What is AMS-IX One of the major Internet Exchanges in Europe Located in Amsterdam, The Netherlands Not for profit, Neutral, Independent Over 212 members ISPs,
exchanging traffic in Paris a new proposal Maurice Dean & Raphael Maunier
exchanging traffic in Paris a new proposal Maurice Dean & Raphael Maunier the more successful Internet Exchanges have evolvedfrom collaborativeefforts to improve connectivity in local markets to organizations
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
Effect of anycast on K-root
Effect of anycast on K-root Some early results 1 K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152
DEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line
Anycast Rou,ng: Local Delivery Tom Daly, CTO h
Hunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques
DDoS Attacks An open-source recipe to improve fast detection and automate mitigation techniques Vicente De Luca Sr. Network Engineer [email protected] AS21880 / AS61186 Introduction Tentative to solve:
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
How to make a VPN connection to our servers from Windows XP
How to make a VPN connection to our servers from Windows XP Windows XP can only make a Point-To-Point Tunneling Protocol (PPTP) type of VPN connection to our servers. This requires TCP Port 1723 to be
Setting up and controlling E-mail
Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider
Securing Linux Servers Best Practice Document
Securing Linux Servers Best Practice Document Miloš Kukoleča Network Security Engineer CNMS Workshop, Prague 25-26 April 2016 Motivation Majority of production servers in academic environment are run by
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
DDoS Damage Control Cheap & effec3ve
DDoS Damage Control Cheap & effec3ve Job Snijders [email protected] RIPE68 Who am I? Job Snijders Independent Network Architect Founder of NLNOG RING TwiPer: @JobSnijders Email: [email protected] Hobbies:
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
Characterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown [email protected] B. Irwin Department of Computer Science
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
IPv6 and DDoS Protec0on: Securing Carrier Grade NAT Infrastructure
IPv6 and DDoS Protec0on: Securing Carrier Grade NAT Infrastructure Glen Turner Consul,ng Systems Engineer IPv6 Migra,on Technologies A10 Networks [email protected] DDoS A
Route Servers, Mergers, Features, and More.
Route Servers, Mergers, Features, and More. Integration of IXP s. Route Server challenges Chris Malayter [email protected] What drives a RS integra6on? Two IX s merging into a single VLAN for mutual
How NOC manages and controls inter-domain traffic? 5 th tf-noc meeting, Dubrovnik [email protected]
How NOC manages and controls inter-domain traffic? 5 th tf-noc meeting, Dubrovnik [email protected] Agenda Inter-domain traffic: o how does NOC monitor and control it? Common case as example: new BGP
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
How To Prepare For The Second Data Center On Payware Connect For A Second Time
PAYware Connect Gateway Guide of Instruction to work with PAYware Connect Multi-site Data Centers Frequently Asked Questions Table of Contents Contents Introduction... 3 URL Routing Configuration Change...
KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
IXP Manager. Montenegro IXP Workshop October 1 st 2014. Barry O Donovan, INEX Ireland s Internet Neutral Exchange Point barry.odonovan@inex.
IXP Manager Montenegro IXP Workshop October 1 st 2014 Barry O Donovan, INEX Ireland s Internet Neutral Exchange Point [email protected] About Me Operations @ INEX Open Solutions Lead Dev for IXP Manager
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
BELNET: Service Level Description Version (29/7/2009)
BELNET: Service Level Description Version (29/7/2009) Table of Contents I Introduction...3 A Goal of this document... 3 B Publishing... 3 C Definitions... 3 II Network Services...5 A Connectivity (BELNET
What network engineers can learn from web developers when thinking SDN.
What network engineers can learn from web developers when thinking SDN. NETNOD Meeting October 2015 Thomas Mangin Director at various shops ( Exa Networks, IXLeeds, LINX ) Also Developer, Network Engineer,
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
RBackup Server Installation and Setup Instructions and Worksheet. Read and comply with Installation Prerequisites (In this document)
RBackup Server Installation and Setup Instructions and Worksheet Fill out the Installation Worksheet. (In this document) Read and comply with Installation Prerequisites (In this document) Review the Partner
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
Regional cyber security considerations for network operations. Eric Osterweil Principal Scientist, Verisign
Regional cyber security considerations for network operations Eric Osterweil Principal Scientist, Verisign Internet operations and cyber security These two fields are deeply intertwined But, one could
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Preventing Common Attacks on Critical Infrastructure
University of Amsterdam Master System and Network Engineering Research Project Preventing Common Attacks on Critical Infrastructure Students: Wouter Miltenburg [email protected] Koen Veelenturf
The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services
Don t get DDoSed and Confused Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Agenda Intro/Data Collection DDoS Basics Trends and Statistics Adversarial Groups/Motivations Defense
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
TELCO challenge: Learning and managing the network behavior
TELCO challenge: Learning and managing the network behavior M.Sc. Ljupco Vangelski CEO, Scope Innovations Kiril Oncevski NOC, ISP Neotel Skopje Presentation overview Challenges for the modern network monitoring
The curse of the Open Recursor. Tom Paseka Network Engineer [email protected]
The curse of the Open Recursor Tom Paseka Network Engineer [email protected] Recursors Why? Exist to aggregate and cache queries Not every computer run its own recursive resolver. ISPs, Large Enterprises
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use
Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre [email protected] Senior Systems Engineer Middlesex Hospital About Middlesex Hospital Complete range
Microsoft Azure ExpressRoute
Microsoft Azure ExpressRoute Michael Washam Summary: Microsoft Azure ExpressRoute makes it easy to establish dedicated and private circuits between your data center and Microsoft Azure. ExpressRoute connections
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Your Web Site Parts - Domain Names, URLs, Web Hosts, DNS - What They Are, and What You Need
Your Web Site Parts - Domain Names, URLs, Web Hosts, DNS - What They Are, and What You Need What s all this domain name, web host, URL stuff? When you first look into getting a web site, you may find an
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
Putting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...
Manage Firewalls. Palo Alto Networks. Panorama Administrator s Guide Version 6.1. Copyright 2007-2015 Palo Alto Networks
Manage Firewalls Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
DDoS Mitigation Solutions
DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports
Phone Inventory 1.0 (1000) Installation and Administration Guide
Phone Inventory 1.0 (1000) Installation and Administration Guide 2010 VoIP Integration June 23, 2010 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager...
whitepaper SolarWinds Integration with 3rd Party Products Overview
SolarWinds Integration with 3rd Party Products Overview This document is intended to provide a technical overview of the integration capabilities of SolarWinds products that are based on the Orion infrastructure.
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Classification: TLP-GREEN RISK LEVEL: MEDIUM Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS Release Date: 6.1.16 1.0 / OVERVIEW / Akamai SIRT is investigating a new DDoS reflection
Peering in General and in Europe. Frank Orlowski DE-CIX Internet Exchange
Peering in General and in Europe Frank Orlowski DE-CIX Internet Exchange myself Currently I work for the DE-CIX Internet Exchange in Frankfurt/Germany. Before that I was a Peering Manager at Deutsche Telekom
Configuring an External Domain
Configuring an External Domain SUPPORT GUIDE DOMAINS ABOUT THIS GUIDE This guide will instruct you on how to: Use an existing domain name Set Up Your Domain to Use Tagadab Name Servers Use Your VPS/Dedicated
Take the NetFlow Challenge!
TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about
PBX Security in the VoIP environment
PBX Security in the VoIP environment Defending against telephony fraud Executive Summary In today s communications environment a voice network is just as likely to come under attack as a data network.
AMRES NOC Bojan Jakovljević. 8 th TF-NOC meeting, Athens 2013.
AMRES NOC Bojan Jakovljević 8 th TF-NOC meeting, Athens 2013. Who are we? AMRES is National Research and Education Network of Serbia Initial development of the AMRES network started in the early 90 s when
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
DDoS Detection and Alerting
DDoS Detection and Alerting University of Amsterdam MSc System & Network Engineering Daniel Romão Niels van Dijkhuizen February 10th, 2014 Abstract: Distributed Denial of Service attacks are becoming very
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
