Defeating DDoS Attacks
|
|
|
- Teresa Shields
- 10 years ago
- Views:
Transcription
1 A Networks Whitepaper Distributed Denial of Service (DDoS) attacks are weapons of mass disruption. Unlike access attacks that penetrate security perimeters to steal information, DDoS attacks paralyze Internet systems by swamping servers, network links and network devices (routers, firewalls, etc.) with bogus traffic. DDoS is emerging as the weapon of choice for hackers, political hacktivists and international cyber-terrorists. Easily launched against limited defenses, DDoS attacks target not only individual Web sites or other servers at the edge of the network they subdue the network itself. Attacks have begun to explicitly target the network infrastructure, like aggregation or core routers, or DNS servers in a provider s network. In October 2002, a harbinger of future large-scale attacks was a crude DDoS attack that affected eight of the 13 root Domain Name Service (DNS) servers, critical systems serving as the roadmap for virtually all Internet communications. The growing dependence on the Internet makes the impact of successful DDoS attacks financial and otherwise increasingly painful for service providers, enterprises and government agencies. And newer, more powerful DDoS tools promise to unleash even more destructive attacks in the months and years to come. Because DDoS attacks are among the most difficult to defend against, responding to them in an appropriate and effective manner poses a tremendous challenge for all Internet-dependent organizations. Network devices and traditional perimeter security technologies such as firewalls and IDSs (Intrusion Detection Systems) are simply not capable of providing sufficient DDoS protection. Instead, facing the current DDoS onslaught to secure Internet availability requires a next-generation architecture that detects and defeats increasingly sophisticated, complex and deceptive attacks. This white paper describes: The growing DDoS threat and the severe impact successful attacks have on organizations. Why current router and perimeter security technologies cannot provide adequate DDoS protection. What baseline requirements must be met to defeat DDoS attacks. How Networks innovative technology and architecture delivers complete DDoS protection.
2 The DDoS Threat A DDoS attack directs hundreds or even thousands of compromised zombie hosts against a single target. These zombie hosts are unwittingly recruited from the millions of unprotected computers accessing the Internet through high-bandwidth, always on connections. By planting sleeper codes on these machines, hackers can quickly build a legion of zombies, all waiting for the command to launch a DDoS attack. With enough zombie hosts participating, the volume of an attack can be astounding. The Impact of DDoS Attacks The impact of a successful DDoS attack is widespread. Site performance is severely compromised, resulting in frustrated customers and other users. Service level agreements (SLAs) are violated, triggering costly service credits. Company reputations are tarnished, sometimes permanently. Lost revenue, lost productivity, increased IT expenses, litigation costs the losses just keep mounting. The numbers are staggering. Estimates from Forrester, IDC and the Yankee Group predict the cost of a 24-hour outage for a company like Cisco would approach $30 million. A spate of DDoS attacks against Amazon, Yahoo, ebay and other major sites in February 2000 caused an estimated cumulative loss of $1.2 billion, according to the Yankee Group. And in January 2001, Microsoft lost approximately $500 million over the course of a few days from a DDoS attack on their site. Clearly, businesses must take steps to protect themselves from theses malicious attacks. Inside DDoS Attacks How do DDoS attacks work? By taking advantage of Internet protocols and the Internet s fundamental benefit delivering data packets from nearly any source to any destination, without prejudice. Essentially, it is the behavior of these packets that define the DDoS attack: either there are too many, overwhelming network devices as well as servers, or they are deliberately incomplete to rapidly consume server resources. What makes DDoS attacks so hard to prevent is that illegitimate packets are indistinguishable from legitimate packets, making detection difficult; typical signature pattern matching, performed by intrusion detection systems, don t work. Many of these attacks also use spoofed source IP addresses, therefore eluding source identification by anomaly based monitoring tools looking for unusually high volumes of traffic coming from specific origins. The two most basic types of DDoS attacks are: Bandwidth Attacks: These DDoS attacks consume resources such as network bandwidth or equipment by overwhelming one or the other (or both) with a high volume of packets. Routers, servers and firewalls all of which have limited processing resources are rendered unavailable for valid transactions and can fail under the load. The most common form of bandwidth attack is a packet-flooding attack, in which a large number of seemingly legitimate TCP, UDP or ICMP packets are directed to a specific destination. To make detection even more difficult, such attacks might also spoof the source address that is, misrepresent the IP address that supposedly generated the request to prevent identification. Application Attacks: These DDoS attacks use the expected behavior of protocols such as TCP and HTTP to the attacker s advantage by tying up computational resources and preventing them from processing transactions or requests. HTTP half-open and HTTP error attacks are just a couple examples of application attacks. Page 2 Networks
3 Hackers activate zombies on innocent computers Infrastructure-level DDoS attacks, including routers and DNS servers Bandwidth-level DDoS attacks, including worm storms Server-level DDoS attacks, including HTTP, DNS and other services Figure 1: Multiple points of vulnerability and failures. The DDoS Threat Grows Ever More Deadly A growing trend among DDoS attackers is to use sophisticated spoofing techniques and essential protocols (instead of non-essential protocols that can be blocked) to make DDoS attacks even more stealthy and deadly. These attacks, which utilize legitimate application protocols and services, are very difficult to identify and defeat; employing packet filtering or rate-limiting measures simply complete the attacker s task by shutting everything down, causing legitimate users to be denied. Today s Inadequate DDoS Defenses Regardless of the type of DDoS attack, current techniques used to deal with them fall short in terms of mitigation and ensuring business continuity. Today s more popular DDoS responses such as blackholing and router filtering are woefully inadequate for dealing with increasingly sophisticated attacks. These responses are not only labor intensive and slow, but they also block valid traffic. Intrusion detection systems (IDSs) offer some detection capabilities but no mitigation, while firewalls offer minimal protection that is further limited by other weaknesses. Still other strategies, such as over-provisioning, don t provide adequate protection against ever larger attacks and are far too costly as a DDoS prevention strategy. Networks Page 3
4 Blackholing Blackholing describes the process of a service provider blocking all traffic destined for a targeted enterprise as far upstream as possible, sending the diverted traffic to a black hole where it is discarded in an effort to save the provider s network and its other customers. Since legitimate packets are discarded along with malicious attack traffic, blackholing is not a solution. The victim loses all their traffic and the attacker wins. Routers Many people assume that routers, with their filtering capabilities, can provide a defense against DDoS attacks. The truth is, because the router s main defense is based on access control lists (ACLs), they are ill equipped to defend against today s sophisticated DDoS attacks, described in detail below. A router can stop only a few simple DDoS attacks, such as ping attacks, by filtering non-essential unneeded protocols. This still requires a manual, reactive effort that is often after services have failed under attack. Additionally, today s DDoS attacks use valid protocols that are essential for an Internet presence, rendering filtering by protocol useless. A router can also stop invalid IP address spaces but, again, DDoS attacks easily spoof valid IP addresses. Another suggested router-based DDoS prevention strategy using urpf to stop spoofed attacks on the outbound side is also ineffective against today s DDoS attacks because the underlying principle of urpf is to block outbound traffic if the IP address doesn t belong to the subnet. However, attacks can spoof source IP addresses from the same subnet they are sitting behind, rendering such a solution useless. More importantly, for urpf to be effective, it would have to be implemented in front of every potential attack source not a current or likely occurrence. Essentially, router ACLs are ineffective against a wide variety of spoofed attacks using valid protocols, including: SYN, SYN-ACK, FIN, etc. floods. For a random spoofed SYN attack or an ACK and RST attack on Port 80 of a Web server, where the spoofed source IP addresses are constantly changing, no set of ACLs can possibly track and stop such an attack. Manual tracing or anomaly detection cannot identify all the individual spoofed sources. The only option would be to block the entire server, completing the attacker s goal. Proxy. Because an ACL cannot distinguish between legitimate and malicious SYNs coming from the same source IP or proxy, it ends up blocking all the victimʹs clients coming from a certain source IP or proxy when attempting to stop this focused spoofed attack. DNS or BGP. When these types of randomly spoofed DNS server or BGP router attacks are launched, the ACLs similar to the SYN flood not only can t track the rapidly changing volume of random spoofed traffic, but they have no way of identifying which addresses are spoofed versus valid in the first place. ACLs are ineffective against application-level (client) attacks as well, whether spoofed or not. While ACLs could theoretically block client attacks such as HTTP error and HTTP half-open connection attacks, provided the attack and individual non-spoofed sources could be accurately detected it would require users to configure hundreds and sometimes thousands of ACLs per victim. Page 4 Networks
5 Firewalls Many firewall vendors claim their products offer DDoS prevention capabilities. But the fact is, firewalls are not purpose-built DDoS prevention devices and suffer inherent limitations that impede their ability to protect against today s sophisticated attacks. First among those limitations is location. Firewalls reside too far downstream on the data path to provide adequate protection for the access link extending from the provider to the edge router at the fringe of the enterprise, leaving those components vulnerable to DDoS attacks. Furthermore, because firewalls reside in-line, they become potential points of failure that are themselves susceptible to DDoS assaults that saturate their session handling capacity. The second limitation is the lack of anomaly detection. Firewalls are intended primarily for controlling access to private networks. One way this is accomplished is by tracking sessions initiated from inside (the clean side) to an outside service and then accepting only specific replies from expected sources on the dirty outside. However, this doesn t work for services such as Web, DNS and other services, which must be open to the general public to receive requests. In these cases, the firewalls do something called opening a conduit i.e., letting HTTP traffic pass to the IP address of the Web server. While such an approach offers some protection by only accepting specific protocols for specific addresses, it is ineffective against DDoS attacks because hackers can use the approved protocol (HTTP in this case). The lack of any anomaly detection capabilities means firewalls can t recognize when valid protocols are being used as an attack vehicle. Even if firewalls could detect anomalous behavior, the third limitation little to no anti-spoofing capabilities would allow the attack to occur. When a DDoS attack is detected, firewalls can shut down a specific flow associated with the attack, but they cannot perform anti-spoofing on a packet-by-packet basis to separate good or legitimate traffic from bad, rendering them virtually useless against attacks using spoofed IP addresses. IDS Signature-based IDS solutions will miss DDoS attacks leveraging valid packets. An IDS solution would have to provide state-of-the-art behavioral or anomaly-based algorithms to detect today s DDoS attacks. Some anomaly-based capabilities are available but require extensive manual tuning by experts, frequently generate false positives, and don t identify the specific attack flows. The IDS can also become a victim of a DDoS attack itself. Perhaps the IDS greatest shortcoming as a DDoS defense platform is that it detects only and does nothing to mitigate the effects of an attack. IDS solutions may recommend filters for routers and firewalls, but, as described earlier, these are not effective mitigation solutions for DDoS attacks, nor are in-line deployments of IDS using similar static filtering. What IDS require is a complementary mitigation solution that provides the next level of specific attack flow identification integrated with immediate enforcement capabilities. Manual Responses to DDoS Attacks Manual processes used as part of a DDoS defense are a case of too little, too late. A victim s first response to a DDoS attack is typically to ask the closest upstream connectivity provider an ISP, a hosting provider, or a backbone carrier to try and identify the source. With spoofed addresses, this can be a Networks Page 5
6 long and tedious process that requires cooperation among many providers. And though a source might be identified, blocking it would mean blocking all traffic good and bad. Other Strategies In order to withstand DDoS attacks, enterprise operators may have considered various strategies such as over-provisioning that is, buying excess bandwidth or redundant network devices to handle any spikes in demand. Such an approach is not particularly cost-effective, especially since it requires the addition of redundant network interfaces and devices. And regardless of the initial effect, attackers merely need to increase the volume of the attack to defeat the extra hardware. The Case for Securing Availability Any business with an online presence has any number of reasons economic and otherwise to invest in DDoS protection. Large enterprises, government organizations, service providers all need to protect the components of their infrastructures (Web servers, DNS servers, and chat servers, firewalls, switches, routers) to preserve the integrity of business operations and make more efficient use of technical staff. ROI Models of DDoS Defense Of course, implementing complete DDoS protection carries its own costs. However, the return on investment (ROI) for implementing such a program is compelling. E-Commerce. DDoS protection for e-commerce sites can pay for themselves within a matter of hours when compared to the cost of potential losses associated with a DDoS attack. An e- commerce site s transactional volumes, average revenue per transaction, advertisement revenues, intangibles such as brand equity and legal liabilities, as well as technical staff time required to restore an attacked site, should all be taken into account when determining the fiscal impact of any DDoS-related downtime. Add the possibility that DDoS protection might allow downgrading to less-expensive bandwidth links, and the ROI figures grow even more impressive. Service Providers. For service providers, keeping their own network operational has huge ROI ramifications. If a provider s infrastructure is attacked (routers, DNS, etc.), all services to customers fail, resulting in SLA violations. The cost of DDoS protection is insurance against catastrophic failures that would cost the business orders of magnitude more in terms of both revenue and negative customer relations. Cost-avoidance, however, is not the only motivation for hosting, transit and service providers to implement a complete DDoS solution. For these users, DDoS protection can also be offered as a value-added service that creates new revenue streams and provides competitive differentiation. Mitigating the DDoS Threat Taking on DDoS attacks requires a new approach that not only detects increasingly complex and deceptive assaults but also mitigates the effects of the attack to ensure business continuity and resource availability. Page 6 Networks
7 Complete DDoS protection is built around four key themes: 1. Mitigate, not just detect 2. Accurately distinguish good traffic from bad traffic to preserve business continuity, not just detect the overall presence of an attack 3. Include performance and architecture to deploy upstream to protect all points of vulnerability 4. Maintain reliable and cost-efficient scalability A DDoS defense built on these concepts delivers the following protection attributes: Enables immediate response to DDoS attacks via integrated detection and blocking mechanisms, even during spoofed attacks when attacker identities and profiles are changing constantly Provides more complete verification capabilities than either static router filters or IDS signatures can provide today Delivers behavior-based anomaly recognition to detect valid packets sent with malicious intents to flood a service Identifies and blocks individual spoofed packets to protect legitimate business transactions Offers mechanisms designed to handle the huge volume of DDoS attacks without suffering the same fate as protected resources Enables on-demand deployment to protect during attacks without introducing a point of failure or imposing the scaling costs of an in-line solution Built-in intelligence processes only contaminated traffic streams, ensuring maximum reliability and minimum scaling costs Avoids reliance on network device resources or configuration changes Utilizes standard protocols for all communications, ensuring maximum interoperability and reliability Networks Complete DDoS Protection Solution Networks delivers a complete DDoS protection solution based on the principles of detection, diversion, verification and forwarding to ensure total protection. When a DDoS attack is launched against a victim protected by the solution, business continuity is maintained by: 1. Detecting the DDoS attack 2. Diverting the data traffic destined for the target device to a appliance for treatment 3. Analyzing and filtering the bad data packets from the good data packets, preventing malicious traffic from impacting performance while allowing legitimate transactions to complete 4. Forwarding the good traffic to maintain business continuity Networks Page 7
8 The Solution Set The solution provides complete protection against all types of DDoS attacks, even those that have never been seen before. Featuring active mitigation capabilities that rapidly detect attacks and separate malicious packets from legitimate traffic, the solution delivers a rapid DDoS response that is measured in seconds, not hours. And easily deployed adjacent to critical routers and switches, the solution offers a scalable option that eliminates any single points of failure and doesn t impact the performance or reliability of the existing network components. The solution set includes two distinct components the Detector and the Guard that, working together, deliver complete DDoS protection for virtually any environment. Detector: Acting as an early warning system, the Detector provides indepth analysis of the most complex DDoS attacks. The Detector passively monitors network traffic, looking for any deviation from normal or baseline behavior that indicates a DDoS attack. When an attack is identified, the Detector alerts the Guard, providing detailed reports as well as specific alerts to quickly react to the threat. For example, the Detector can observe that the rate of UDP packets from a single source IP is out of range, even if overall thresholds are not exceeded. Guard: The Guard is the cornerstone of the DDoS solution set a high-performance DDoS attack mitigation device that is deployed upstream at either the ISP/data center or within a large enterprise to protect both the network and data center resources. When the Guard is notified that a target is under attack (whether from a Detector or some other security monitoring device such as an intrusion detector or firewall), traffic destined for the target is diverted to the Guard (or Guards) associated with the targeted device. The traffic is then subjected to a rigorous five-stage analysis and filtering designed to remove all malicious traffic while allowing good packets to continue flowing uninterrupted. The Guard resides adjacent to a router or switch on a separate network interface, enabling ondemand protection without impacting data traffic flow of other systems. Depending on its location, the Guard can concurrently protect multiple potential targets, including routers, Web servers, DNS servers, and LAN and WAN bandwidth. The Networks MVP Architecture The Guard s next generation DDoS defense solution is based on a unique, patent-pending Multi-Verification Process (MVP) architecture that integrates a variety of verification, analysis and enforcement techniques to identify and separate malicious traffic from legitimate traffic. This purification process consists of five modules or steps: Filtering: This module includes both static and dynamic DDoS filters. Static filters, which block nonessential traffic from reaching the victim under attack, are user-configurable and come from with preset default values. Dynamic filters are inserted by the other modules based on observed behavior and detailed analysis of traffic flows, delivering real-time updates that either increase the level of verification applied to suspicious flows or block sources and flows that have been verified as malicious. Page 8 Networks
9 Figure 2: Networks Multi-Verification Process (MVP) architecture Anti-Spoofing: This module verifies that packets entering the system have not been spoofed. The Guard uses a number of unique, patent-pending source authentication mechanisms to stop spoofed packets from reaching the victim. The anti-spoofing module also has several mechanisms to ensure proper identification of legitimate traffic, virtually eliminating the risk of valid packets being discarded. Anomaly Recognition: This module monitors all traffic that was not stopped by the filter or the antispoofing modules and compares it to baseline behavior recorded over time, looking for deviations that would identify the source of malicious packets. The basic principle behind this module s operation is that the pattern of traffic originating from a black-hat daemon residing at a source differs dramatically from the pattern generated by legitimate sources during normal operation. This principle is used to identify the attack source and type, as well as to provide guidelines for blocking traffic or performing more detailed analysis of the suspected data. Protocol Analysis: This module processes flows that anomaly recognition finds suspicious in order to identify application-specific attacks, such as http-error attacks. Protocol analysis then detects any misbehaving protocol transactions, including incomplete transactions or errors. Rate Limiting: This module provides another enforcement option and prevents misbehaving flows from overwhelming the target while more detailed monitoring is taking place. The module performs per-flow traffic shaping, penalizing sources that consume too many resources (e.g. bandwidth or connections) for too long a period. It is important to note that, between attacks, the Guard is in learning mode, passively monitoring traffic patterns and flow for each of the different resources is protects to understand normal behavior and establish a baseline profile. This information is later used to fine-tune policies for recognizing and filtering both known and unknown, never-before-seen attacks in real-time network activity. Networks Page 9
10 Detection & Identification None Detect Identify Attack Attack Flows Detector IDS Passive Monitoring Netflow Analysis Router Guard Complete, scalable mitigation: Identifies specific attack flows Authenticates sources Dynamic granular enforcement Enforcement None Coarse/Static Per Flow / Dynamic Figure 3: advantages versus current alternatives. DDoS Defense Deployment s DDoS protection offers flexible, scalable deployment scenarios to protect data centers (servers and network devices), ISP links, or backbones (routers and DNS servers). Providers The Guard can be deployed at strategic points in the provider s infrastructure, such as at each peering point, to protect core routers, downstream edge devices, links and customers. Deployment can also be at the edge router for dedicated customer protection. The detection mechanisms can be near the provider edge or on the customer premise. s scalable solution for protecting the network itself and multiple customer data centers from upstream deployment supports provider requirements. Enterprises and Data Centers In enterprise data centers, the Guard is deployed at the distribution layer in the data center, protecting lower-speed links downstream and the servers. The Guard can be connected to the distribution switch and support a redundant configuration (see Figure 5, page 12). Page 10 Networks
11 Guard Guard Clean traffic returned to system Traffic for targeted device diverted through Guard Guard DNS Servers Guard Figure 4: protection in an ISP environment. Traffic destined for targeted device is diverted to Guards; clean traffic is returned to the system. Mitigate DDoS Attacks Today DDoS attacks will continue to grow in scale and severity thanks to increasingly powerful (and readily available) attack tools, the Internet s multiple points of vulnerability, and business increasing dependence on the Internet. As the cost of these attacks rise, providers, enterprises and governments must respond to protect their investments, revenues and services. Existing technologies are simply not up to the task of protecting against today s DDoS attacks. Passive detection technologies working with static filtering solutions won t work against today s complex, sophisticated attacks; they simply don t offer the dynamic detection and mitigation capabilities required to identify and instantly stop attack traffic to protect mission-critical operations. What s required today is a new type of solution that not only detects the most sophisticated DDoS attacks, but also delivers the ability to block increasingly complex and hard-to-detect attack traffic without impacting legitimate business transactions. Such an approach demands more granular inspection and analysis of attack traffic than today s solutions can provide. Network s innovative technology and architecture delivers an innovative new approach that subjects traffic to the most detailed scrutiny available today, ensuring the DDoS attacks fail to achieve their objective of halting business operations. Going beyond simple filtering, the solution scrubs data to remove malicious traffic while allowing good packets to pass, ensuring business continuity and preserving business integrity. Networks Page 11
12 CISCOYSTEMS S PowerSuply0 PowerSuply 1 Catalyst 8500 SERES Switch Processor I I CO S YSEM CS T S ICO SYSEM SD CISCOYTEM S owesupl0 oersuply 1 al t 80 SEES Poeso Swich S S Ctays 50 RI t rcs r ICO S YSTEM CS ICO S YSTEM P r py S Pw p D S Whitepaper ISP 1 ISP 2 Router Guard Switch G-Ethernet Guard Firewall Alert Switch Internal network Detector or other detection system Web, Chat, etc. Servers DNS Servers Figure 5: protection in an enterprise environment. Only traffic destined for the targeted device is diverted to the Guard, which returns clean transactions back to the system. For More Information For more information on Network s DDoS mitigation solution, visit us at Corporate HQ International HQ Networks, Inc. Networks, Ltd Stevens Creek Blvd. 22 Raoul Wallenberg Cupertino, CA Tel Aviv, Israel Tel: (408) Tel: Fax: (408) Fax: [email protected] Page 12 Networks
DEFEATING DDOS ATTACKS
WHITE PAPER DEFEATING DDOS ATTACKS Distributed denial-of-service (DDoS) attacks are a real and growing threat to businesses worldwide. Designed to elude detection by today s most popular tools, these attacks
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Introducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE
WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF
NSFOCUS Anti-DDoS System White Paper
White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
DDoS Mitigation Solutions
DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January 2009. Cristian Velciov. [email protected] (+40) 721 250246
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard January 2009 Cristian Velciov [email protected] (+40) 721 250246 Andrisoft Solution WANGuard Platform is an enterprise-grade Linux-based software
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
How To Protect Yourself From A Dos/Ddos Attack
RELEVANT. INTELLIGENT. SECURITY White Paper In Denial?...Follow Seven Steps for Better DoS and DDoS Protection www.solutionary.com (866) 333-2133 In Denial?...Follow Seven Steps for Better DoS and DDoS
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business
& Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
CaptIO Policy-Based Security Device
The Leader in Denial of Service Prevention CaptIO Policy-Based Security Device The CaptIO Policy-Based Security Device automatically detects, identifies, validates, and stops Denial of Service attacks
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction
WhitePaper DDoS Attack Mitigation Technologies Demystified The evolution of protections: From inclusion on border devices to dedicated hardware+behavior-based detection. Introduction Distributed Denial
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.
FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Data Sheet. DPtech Anti-DDoS Series. Overview
Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Technical Series. A Prolexic White Paper. 12 Questions to Ask a DDoS Mitigation Provider
A Prolexic White Paper 12 Questions to Ask a DDoS Mitigation Provider Introduction Distributed Denial of Service (DDoS) attacks continue to make global headlines, but an important facet of each incident
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
How To Design An Intrusion Prevention System
INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
