DDoS Mitigation Solutions
|
|
- Sharon Pearson
- 8 years ago
- Views:
Transcription
1 DDoS Mitigation Solutions
2
3 The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports many millions of websites and internet facing services globally. Research suggests the total market for hosted services is expected to grow from about $76B in 2010 to nearly $210B by Public Cloud Services Market Billions of Dollars Example Financial Loss from a Sustained DDoS Attack As usage of the internet has exploded, so has the variety of hosting companies. Distributed Denial of Service (DDoS) attacks have become the vector of choice for criminals to attack their desired targets. Often, these targets are customers of unsuspecting hosting companies who merely provide a reliable infrastructure & platform services to SaaS companies, websites, and other online applications. DDoS attacks are widespread. They harm the target as well as other customers supported by the hosting company. The attacks are often powerful enough to cause service interruption across the entire hosting operation. Criminals have various motivations and means behind their attacks. Some use an arsenal of compromised servers to launch their attacks. Some are motivated by grievances, financial gain, or simply for sport. DDoS Details Size: 110 Gbps Total Duration: 48 hours Time to RTBH: 30 minutes Hosting Facility Business: Cloud Hosting Annual Revenue: $10M Network: 4x10 Gbps Transit Target of DDoS: Retail Website SLA 99.99% Violation: minutes SLA Policy: 1 day for violation Customer MRR for Hosting: $20,000/month ACV for Hosting: $240,000 Annual Revenue: $5M Downtime: 2 days Impact Customer Loss: $28,000 At this point, the client will relocate their services to another provider due to downtime. This results in an ACV loss of $240,000 to the hosting provider. Hosting SLA credit: $27,000 Total Impact: $295,000
4 Networks for Hosting - An Overview The purpose of this paper is to provide you with information about the true costs of a DDoS attack. We will discuss the history of these attacks and their far reaching impacts. Businesses often only see the immediate damage caused by a DDoS attack (bandwidth) and forget to look at the big picture ramifications (SLA violations, customer loss, public image, etc). First, let s have a look at common networks used in hosting. Typically, hosting environments are redundant. In such an environment, a pair of redundant edge networks terminate public IP transit and peering. These networks then feed on-premises firewalls which then go to an aggregation layer. This aggregation layer is then fed into switches in each rack inside of the datacenter. The rack switches then feed end user services & equipment. In this type of network, any single point, up to an entire half of the network can drop without the rest of it experiencing service impact. Network architects identify needs for a firewall which is capable of providing a level of stateful filtering, ACL, and any other necessary security features.
5 Networks for Hosting - RTBH Remote Triggered Black Hole Filtering (RTBH) Remote Triggered Black Hole (RTBH) filtering is a technique that allows a network to block undesirable traffic (i.e. a DDoS) before it enters your network. In the context of network security, a black hole is implemented when an attack is detected. Routing traffic to a black hole can be used to drop all attack traffic at the edge of your network. RTBH is performed on a destination address using BGP. It s effective for quickly dropping traffic that you do not want entering your network. RTBH Problems 1. If the target IP is not identified within several seconds, the network can become saturated. This can result in collateral damage impacting other customers. 2. The customer is effectively taken offline, thus the attackers original goal is achieved. 3. If the attacker attacks hundreds or thousands of IPs simultaneously, black holing becomes impossible due to BGP advertising limitations which are imposed by your upstream provider.
6 Networks for Hosting - Transit Costs Overview of Transit Costs When a hosting company purchases transit from a provider such as Cogent or GTT, they buy based on several paramaters: number of ports, total port capacity desired, and the data rate they commit to over those ports. If you ran a hosting operation, you might have utilization of around 15 Gbps, but have a peak usage of 20 Gbps. To grow, you decide you want 30 Gbps of total capacity from one of the providers mentioned earlier. This lets you burst to 20 Gbps periodically without any problems. In this scenario, you choose to buy 15 Gbps of Committed Data Rate (CDR), 20 Gbps, or 30 Gbps. If you re like most hosts, you ll buy 15 Gbps for around $1/mbit using 95th percentile billing. Using this type of billing, 300 second samples are obtained from your interface and the top 5% are thrown out. The immediate next value is your 95th percentile billed value. You re now paying around $15,000/month for your transit. Because your 20 Gbps bursts are infrequent, you won t be billed for the additional transit. That makes for a fantastic deal. DDoS Impact on Transit Costs Let s assume that you ve got a 30 Gbps network and you are the victim of a 10 Gbps DDoS attack. That s where you can handle the attack. Your network engineers block the attack using ACLs at your border router and they manage to do it once. But, future attacks will not be so easy to thwart. So, you purchase a DDoS appliance. You re now experiencing 10 Gbps DDoS attacks more frequently and you re filtering them for days at a time. Everything appears fine until your transit provider now sends you a bill for your original 15 Gbps and adds another 10 Gbps to it, thus bringing your total monthly bill to $25,000. Not only did you spend a lot on DDoS protection equipment, you ve not got to spend additional money on transit. It seem impractical to expand your network to 100 Gbps and mitigate an 80 Gbps attack. You may be able to obtain the available port capacity from your provider using a 20% CDR, but it s not worth it. The first 80 Gbps DDoS attack that comes in for more than 36 hours will cost you about $80,000.
7 DDoS Attacks Explained Historical Overview: Smurf One of the earliest known DDoS attacks, called Smurf was written by TFreak in The attack was quite popular. In this attack, ICMP packets would be spoofed to originate from the target s destination address and then sent to a network broadcast address. Network devices would respond, by default to this broadcast request and in turn respond to the spoofed source address. If the network contained a sufficient number of host systems to reply to these packets, the victim network would be flooded with an onslaught of ICMP packets. This attack was rendered ineffective via three changes: 1. Routers were configured to not forward packets to the broadcast address. 2. Systems were configured not to respond to broadcast requests or to even reply to ICMP at all. 3. Networks installed ingress & egress ICMP filters or policers. Historical Overview: Bang This attack is less widely known. Bang was a relatively uncommon attack written by Sorcerer. The attack is capable of amplifying TCP by about 2-3x. In a TCP Bang attack, the attacker spoofs the victim s target IP as usual, and sends a TCP SYN (new connection) to any number of public systems with open TCP ports. The system would then reply with 2 to 3 TCP SYN-ACK packets to the intended target. The interesting thing about this attack is that it is relatively simple to launch, requires no vulnerabilities in target hosts, and can leverage any open TCP service. To stop this attack, target systems would have to employ intelligent stateful firewalls that prohibit repetitive connections in quick succession. However, because this attack can leverage any open system, the attack does not need to reuse the same amplifier multiple times in quick succession. The source code to this can be found on A quick review of the code shows that it is very simple, which is why it s such an elegant attack. Historical Overview: NTP Network Time Protocol is used to synchronize systems with centralized servers to within a fraction of a second of coordinated universal time (UTC). NTP operates over the public Internet and achieves fairly high reliability through its algorithm. The protocol is traditionally used as clientserver. NTP is susceptible to man-in-the-middle attacks unless encryption is employed. NTP operates on port 123 TCP and UDP. NTP based attacks work similar to UDP amplification attacks. The attacker sends a small packet with spoofed source information via UDP to the NTP server. This packet contains a command like monlist which requests a a large amount of data from the NTP server. The NTP server sends this data to the spoofed source in the original small packet. In effect, a few bytes of data can generate megabytes worth of traffic.
8 DDoS Attacks Explained DDoS Attacks for Hire Building a botnet to mount attacks used to be a complex process that involved hacking many compromised systems and using those systems to attack other servers while maintaining everything. The botnet would be available for the use of the attacker and the attacker s associates. This was a sophisticated process that involved countless hours of work to build an effective large scale botnet. The paradigm for botnets & DDoS attacks has morphed in recent years. Typically, the rate for a DDoS botnet rental is about $175 for about 8,000 to 12,000 bots. The rate varies based on the effectiveness of the bots and the size of the network. The type of attack also figures into prices paid. Some botnets are also specific to a certain geographic region while some are designed for maximum volume impact. Trends in DDoS Attacks In the quarter ending in September 2013, hosts experienced a sharp rise in the number of DDoS attacks. Primary target industries included: Financial Services: Banks & Payment Processors Video Gaming Online Retail That particular quarter showed a dramatic rise in high throughput attacks exceeding 40 Gbps. As mentioned previously, there has been a trend towards larger attacks for over a decade so this is unsurprising. A key point is that September saw a 5x rise in the number of attacks exceeding 40 Gbps and a 2x rise in the number of attacks exceeding 10 mpps. This likely signifies there are more DDos-as-a-Service operators who make their botnets available for a fee. This allows subscribers to launch more large scale attacks. <1 Gbps 1-5 Gbps 5-10 Gbps Gbps Gbps >40 Gbps
9 Reducing the Risk How can hosts reduce their risk? Hosts provide the fundamental infrastructure that allows the Internet to function properly. As such, they will always be targeted by criminal attackers resulting in impacts to their customers. While this may be true, hosts are always improving and expanding their infrastructure to serve an ever growing connected population. This improves uptime and functionality. Unfortunately, such growth is usually done with little thought put toward security. As the hosting industry grows, attacks will likely become more prevalent. Criminals will continue to exploit any means of impacting their selected targets and the black market makes it easy for DDoS attacks to be launched. The black market has only begun to mature and take shape so we expect rapid growth over the next several years. Facilitating DDoS attacks has become a profitable business. To help mitigate the risks discussed throughout this paper, the following countermeasures should be employeed: Cloud based DDoS Protection. This service can help buffer the impact of large-scale attacks. Cloud providers would receive prefix advertisement over BGP to protect your network. On-premises DDoS Detection Appliances. These appliances serve to automatically blackhole the target IP thus allowing your cloud mitigation system to be activated to protect your network. Tightly Controlled Firewalls. Limiting unnecessary traffic and allowing only what is required can help reduce the overall impact of DDoS attacks. How can hosts reduce their risk? Ignoring the threat posed by DDoS attacks can be a costly and risky decision. The cost of a single attack can easily violate an SLA, forcing hosts to pay out large sums in SLA credits. It can result in damage to your brand as well as a direct loss of customers. At the very least, a RTBH strategy is necessary. Appliances can help as well. This can dramatically reduce the potential for network downtime caused by DDoS attacks. Cloud based mitigation is another strategy. This is like an insurance policy in that rather than paying for large amounts of transit as a hosting provider, you offload your company s DDoS expenses to a cloud provider. The provider pays for the massive bandwidth charges which shields you from this risk. You ve also got the added benefit of not requiring any DDoS mitigation equipment of your own. The most comprehensive solution is the combination of DDoS monitoring appliances on premises coupled with cloud-based mitigation. This allows the flexibility of protecting your network while only having specific resources routed through cloud-based mitigation.
10 We have partnered with Staminus A solid partner is the best defense. At Total Server Solutions we have researched numerous DDoS mitigation strategies. After carefully examining all other solutions, we have chosen Staminus to be our partner in helping with DDoS mitigation. Their solutions are a perfect fit for our customers and the way we do business. Like us, they pride themselves on providing the best experience to their customers. We want to protect you, and Staminus wants that too. It s a perfect fit. Who is Staminus? Staminus provides the most advanced automated DDoS mitigation system in the industry. They re powered by an ever-growing network that is dedicated solely to DDoS mitigation. With three patent-pending mitigation technologies, Staminus is capable of providing robust DDoS mitigation to customers of all sizes. Staminus has over 15 years of experience developing mitigation solutions that maximize performance, scalability, flexibility, and reliability. At its core, Staminus is powered by people. Everyone on the Staminus team has been selected for their understanding of network security concepts as well as their ability to build and contribute to a tight-knit, focused, and committed team of experts. You trust your data to Total Server Solutions so trust our choices that will help keep you safe
11 How much does it cost? DDoS Mitigation Pricing DDoS protection is something that we can provide to our customers on an as needed basis. Plans are based on a commitment cost per mbps of clean, inbound traffic. Please contact our sales team if you have any questions about our DDoS mitigation services. Bandwidth Cost Per Megabit Total Commit Cost Under 100 mbps $10.00 $1, Under 75 mbps $11.00 $ Under 50 mbps $12.00 $ Under 20 mbps $14.00 $ Under 10 mbps $18.00 $ Under 5 mbps $20.00 $100.00
12 Atlanta, GA, USA Chicago, IL, USA Dallas, TX, USA Los Angeles, CA, USA Phoenix, AZ, USA Weehawken, NJ, USA Salt Lake City, UT, USA Seattle, WA, USA London, United Kingdom Toronto, Canada Amsterdam, Netherlands
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
More informationAcquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
More informationThis document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
More informationCloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com
More informationHOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
More informationAutomated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
More informationDDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail
DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic
More information2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative
2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,
More informationDISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
More informationHow To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
More informationDDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
More informationService Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3
More informationAvailability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
More informationHow To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
More informationStop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
More informationIntroduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
More informationVALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
More informationThis document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
More informationwww.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
More informationHow To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
More informationAutomated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
More informationDDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
More informationGuide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
More informationTraffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
More informationData Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
More informationThe server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
More informationCloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
More informationHow To Protect Yourself From A Dos/Ddos Attack
RELEVANT. INTELLIGENT. SECURITY White Paper In Denial?...Follow Seven Steps for Better DoS and DDoS Protection www.solutionary.com (866) 333-2133 In Denial?...Follow Seven Steps for Better DoS and DDoS
More informationDDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
More informationHow to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
More informationReducing the impact of DoS attacks with MikroTik RouterOS
Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP
More informationComplete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
More informationDDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
More informationStrategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
More informationDenial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
More informationSECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
More informationProtect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
More informationDDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
More informationDistributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
More informationDDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
More informationWhite Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
More informationTDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
More informationHow valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationHow Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
More informationKASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
More informationSHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
More informationOn-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
More informationHow To Connect To Telx Dia (Dia) For Free
Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) What is DIA? Telx Dedicated Internet Access service, or DIA for short, combines Telx s network neutral environment with colocation and automated
More informationUnderstanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business
& Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright
More informationFortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
More informationFederal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
More information2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer
2012 Infrastructure Security Report 8th Annual Edition Kleber Carriello Consulting Engineer Key Findings in the Survey* Advanced Persistent Threats (APT) a top concern for service providers and enterprises
More informationWhite paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
More informationDDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
More informationDDoS Basics. internet: unique numbers that identify areas and unique machines on the network.
DDoS Basics Introduction Distributed Denial of Service (DDoS) attacks are designed to prevent or degrade services provided by a computer at a given Internet Protocol 1 (IP) address. This paper will explain,
More informationSHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
More informationHow To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity merike@internetidentity.com INTRO Statistics on DNS Amplification
More informationFour Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers
Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers Whitepaper SHARE THIS WHITEPAPER Table of Contents The Rising Threat of Cyber-Attack Downtime...3 Four Key Considerations
More informationModern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
More informationDRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
More informationWHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 4 4TH QUARTER 2014
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 4 4TH QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: 4 Mitigations by Attack Size 4 MITIGATIONS BY INDUSTRY VERTICAL
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationDon t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services
Don t get DDoSed and Confused Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Agenda Intro/Data Collection DDoS Basics Trends and Statistics Adversarial Groups/Motivations Defense
More informationMitigating DDoS Attacks at Layer 7
Mitigating DDoS Attacks at Layer 7 Detect, Localize and Mitigate using DNS GSLB Allan Jude ScaleEngine Inc. Introductions Allan Jude 12 Years as FreeBSD Server Admin Architect of the ScaleEngine CDN (HTTP
More informationDistributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,
More informationWHITE PAPER Hybrid Approach to DDoS Mitigation
WHITE PAPER Hybrid Approach to DDoS Mitigation FIRST LINE OF DEFENSE Executive Summary As organizations consider options for DDoS mitigation, it is important to realize that the optimal solution is a hybrid
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationDoyourwebsitebot defensesaddressthe changingthreat landscape?
WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has
More informationCompany Overview. October 2014
Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses
More informationAn Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia Frank.xialiang@huawei.com Tianfu Fu Futianfu@huawei.com Cheng He Danping He hecheng@huawei.com
More informationCharacterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown g11r0252@campus.ru.ac.za B. Irwin Department of Computer Science
More informationDistributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by
More informationcolocation. perfected. Overview
colocation. perfected. Overview Welcome to COLO@ colocation perfected our network The expert team of COLO@ have the talent, tools, and facilities to power your operation all day, every day. Since 2008,
More informationWe keep internet traffic flowing Frank Ip VP of Marketing and Business Development
We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably
More informationSecuring data centres: How we are positioned as your ISP provider to prevent online attacks.
Securing data centres: How we are positioned as your ISP provider to prevent online attacks. Executive Summary In today s technologically-demanding world, an organisation that experiences any internet
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationSecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
More informationNetwork Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
More informationPutting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
More informationSalt Lake City Seattle Amsterdam London Toronto Developer http://www.totalserversolutions.com sales@totalserversolutions.
At a Glance In business since 2005 Enterprise level network SSAE-16 Compliant Based in Atlanta, Georgia, United States Operates facilities in the following locations: Atlanta, GA, USA (two facilities)
More informationNetwork Bandwidth Denial of Service (DoS)
Network Bandwidth Denial of Service (DoS) Angelos D. Keromytis Department of Computer Science Columbia University Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts
More informationA1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
More informationHow To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia Nenad.stojanovski@gmail.com 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
More informationProtecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 2 2ND QUARTER 2014
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 2 2ND QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDOS TRENDS FROM THE SECOND QUARTER OF 2014 4 Attack Stats 4 Mitigations by
More informationF5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
More informationDenial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
More informationCSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
More informationChapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
More informationStrategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
More informationSafeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
More informationYahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
More informationArbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
More information