DDoS attacks & other online vulnerabilities

Size: px
Start display at page:

Download "DDoS attacks & other online vulnerabilities"

Transcription

1 DDoS attacks & other online vulnerabilities Mitigating common threats FLARE enterprise@cloudflare.com

2 Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are on the rise and have evolved into complex and overwhelming security challenges for organizations large and small. Layer Application Presentation Session Transport Network Data link Physical layer Although DDoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved. The fact is that these attacks can no longer be addressed by traditional on-premise solutions. CloudFlare s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats and can be used to mitigate DDoS attacks of all forms and sizes. What is a DDoS attack? A DDoS attack is an attempt to make a server or network resource unavailable to Internet users. There are many ways to prevent users from getting to where they want to go on the Internet, but most attacks take place at the Network and Transport layers (Layers 3 and 4 respectively) and at the Application layer (Layer 7) of the Open System Interconnection (OSI) Model. Description Network process to application Mail, Chrome, Firefox Data representation and encryption TLS, JPEG, ASCII, EBCDIC Interhost communication HTTP, FTP, SMTP End-to-end connections and reliability TCP, UDP Path determination and logical addressing IPv4, IPv6 Physical addressing PPP, IEEE 802.2, L2TP Media, signal, and binary transmission DSL, USB THE OSI MODEL is a teaching tool that provides a standardized way to describe how the various layers of data communication systems interact. A particular concern with DDoS attacks is that a number of commercial stresser or booter sites exist on the Internet, allowing anyone with a credit card or bitcoin to purchase a DDoS for a relatively low fee (often under 100 USD). This lowers the bar for attacks and expands both the number of potential attackers and number of attacks dramatically. Other attacks are crafted specifically to compromise a given application and may be waged by sophisticated attackers with substantial in-house resources. Traditionally, DDoS attacks have targeted Layers 3 and 4 of the OSI model by attempting to flood an interface with illegitimate or junk traffic in order to overwhelm its resources. Usually, an attack fills up the capacity of a network switch, overwhelms a server s network card, or overwhelms a CPU s ability to handle the traffic. Large DDoS attacks are difficult if not impossible to mitigate with an on-premise solution. The fact is that if attacker is able to send more traffic than a network link can handle, no amount of additional hardware resources will help mitigate such an attack. 2

3 DDoS attacks that target Layer 7 are smaller in volume, but more sophisticated. These types of attacks are difficult to detect and mitigate because they mimic normal use of an application and attack specific web resources. Traditional solutions have required on premise Large DDoS attacks are difficult if not equipment that attempt to decode network traffic impossible to mitigate with an on-premise before deciding if the traffic is good or bad. This approach impacts legitimate visitors and adds solution. The fact is that if attacker is able to latency to each request. send more traffic than a network link can Layer 7 attacks can also aim to compromise the handle, no amount of additional hardware security of an application. One way this can be resources will help mitigate such an attack. done is by injecting an SQL statement that can query a database, retrieve information, and send it back to the attacker. This paper will describe the following types of DDoS and vulnerability attacks and the methods CloudFlare uses to mitigate them: Attack type OSI Layer(s) targeted Mitigation strategy DDoS: Amplification Layer 3 and 4 DDoS: DNS Flood Layer 3 and 4 DDoS: SYN Flood Layer 3 and 4 DDoS: Layer 7 Denial of Service Layer 7 Absorb Bandwidth Spikes Anycast Network Anycast Network Absorb Bandwidth Spikes CloudFlare s Automatic Learning Platform Anycast Network Absorb Bandwidth Spikes CloudFlare s Automatic Learning Platform Intelligent Network Protection I m Under Attack Mode Non-DDoS: Application Vulnerability Layer 7 Web Application Firewall (WAF) Amplification attacks Amplification attacks are one of the more common DDoS attacks currently targeting enterprise companies. They re the simplest attacks to launch because they rely on easily accessible, misconfigured servers and DNS resolvers that will accept queries from anyone on the Internet. The goal of an amplification attack is to generate huge volumes of traffic to a single IP address, taking up so much bandwidth that legitimate visitors cannot access a site or use a web property such as an API. This type of volumetric DDoS attack relies primarily on four UDP protocols: The Domain Name System (DNS), Network Time Protocol (NTP), Character Generator Protocol (CHARGEN), and Universal Plug and Play Protocol (UPnP). The reason these protocols are used is because they are carried by the UDP protocol. The UDP protocols are fire-and-forget protocols, meaning that there is no TCP handshake to establish where a packet is coming 3

4 from. This means that attackers can forge the header of a IP address making it look like it is coming from an IP address they intend to attack. Once the header is forged, the attacker can send a query to an DNS, NTP, CHARGEN, or UPnP server and have the reply sent to their target IP address. To amplify the volume of response traffic, an attacker can send a query to a DNS, NTP, CHARGEN, or UPnP server that will result in a large response to their intended victim. An attacker could, for example, send the following query (where x.x.x.x is the IP of an open DNS resolver): dig ANY +edns=0 And get back the following gigantic response: ; <<>> DiG <<>> ANY ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5147 ;; flags: qr rd ra; QUERY: 1, ANSWER: 27, AUTHORITY: 4, ADDITIONAL: 5 ;; QUESTION SECTION: ;isc.org. IN ANY ;; ANSWER SECTION: isc.org IN SOA ns-int.isc.org. hostmaster.isc.org isc.org IN A isc.org IN MX 10 mx.pao1.isc.org. isc.org IN MX 10 mx.ams1.isc.org. isc.org IN TXT v=spf1 a mx ip4: /21 ip4: /16 ip6:2001:04f8::0/32 ip6:2001:500:60::65/128 ~all isc.org IN TXT $Id: isc.org,v :36:09 bind Exp $ isc.org IN AAAA 2001:4f8:0:2::d isc.org IN NAPTR 20 0 S SIP+D2U _sip._udp.isc.org. isc.org. 484 IN NSEC _kerberos.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF isc.org IN DNSKEY BQEAAAAB2F1v2HWzCCE9vNsKfk0K8vd4EBwizNT9KO6WYXj0oxEL4eOJ axbax/bzpfx+3qo8b8pu8e/jjkwh0oayz4guuytvmt5eelg44vb1kssy q8w27oq+9qnip8jv6zdoj0ucb/n0fxfvl3371xbednfqoecfsfdza6hw ju1qzvessw0= isc.org IN DNSKEY BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGr hhcefvazih7yjhf8zgfw6hd38hxg/ xylyco6krpbdojwx8ymxla5/ka+ u50wil8zr1r6ktbsyvmf/qx5rinbpclw+vt+u8exejmo20jis1ulgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bB ybnso70aeftd isc.org IN SPF v=spf1 a mx ip4: /21 ip4: /16 ip6:2001:04f8::0/32 ip6:2001:500:60::65/128 ~all isc.org. 484 IN RRSIG NS isc.org. ofeny69pn+/jnnltgpuzqnyzo1ygglmhs/szknlgymbz+tt2r/2v+x1j AkUl9GRW9JAZU+x0oEj5oNAkRiQqK+D6DC+PGdM2/JHa0X41LnMIE2NX UHDAKMmbqk529fUy3MvA/ZwR9FXurcfYQ5fnpEEaawNS0bKxomw48dcp Aco= isc.org. 484 IN RRSIG SOA isc.org. S+DLHzE/8WQbnSl70geMYoKvGlIuKARVlxmssce+MX6DO/J1xdK9xGac XCuAhRpTMKElKq2dIhKp8vnS2e+JTZLrGl4q/bnrrmhQ9eBS7IFmrQ6s 0cKEEyuijumOPlKCCN9QX7ds4siiTIrEOGhCaamEgRJqVxqCsg1dBUrR hkk= isc.org. 484 IN RRSIG MX isc.org. VFqFWRPyulIT8VsIdXKMpMRJTYpdggoGgOjKJzKJs/6ZrxmbJtmAxgEu / rkwd6q9jwsucepnc74eyxzxfvdannkp/qdmt2139h/xozsw0jva4z+b znq3knidjdv6zl6eltcvdqj3siwdzhyb/cr9pnno1faf2joijyswiwbs Lcw= isc.org. 484 IN RRSIG TXT isc.org. Ojj8YCZf3jYL9eO8w4Tl9HjWKP3CKXQRFed8s9xeh5TR3KI3tQTKsSeI JRQaCXkADiRwHt0j7VaJ3xUHa5LCkzetcVgJNPmhovVa1w87Hz4DU6q9 k9bbshvbytxof8xny/fcir5c6nvelmvvu4xeoqswipoo2zvieffp9der UhA= isc.org. 484 IN RRSIG AAAA isc.org. hutacro0nbmvku/m+2lf8sgiyyivwortp/utin8ksf1wowwm2qmga5c9 /rh/ ZQBQgN46ZMmiEm4LxH6mtaKxMsBGZwgzUEdfsvVtr+fS5NUoA1rF wg92ebbinndcvt0if8m1sldx5/hsqkn8easckfg5bmqp5ydfsllstaua 8Y4= isc.org. 484 IN RRSIG NAPTR isc.org. ZD14qEHR7jVXn5uJUn6XR9Lvt5Pa7YTEW94hNAn9Lm3Tlnkg11AeZiOU 3woQ1pg+esCQepKCiBlplPLcag3LHlQ19OdACrHGUzzM+rnHY50Rn/H4 XQTqUWHBF2Cs0CvfqRxLvAl5AY6P2bb/iUQ6hV8Go0OFvmMEkJOnxPPw 5i4= isc.org. 484 IN RRSIG NSEC isc.org. ry1hqzarym045vv3bmy0wgjhxhjqofkxlerlk20lau1mvtyu7uair7jb MwDVCVhxF7gfRdgu8x7LPSvJKUl6sn731Y80CnGwszXBp6tVpgw6oOcr Pi0rsnzC6lIarXLwNBFmLZg2Aza6SSirzOPObnmK6PLQCdmaVAPrVJQs FHY= isc.org. 484 IN RRSIG DNSKEY isc.org. i0s2mfqvhb3wohv2ipoze/iqabm/eddcv2d7dj3auowi1a3sbyq29xud BK82+mxxsET2U6hv64crpbGTNJP3OsMxNOAFA0QYphoMnt0jg3OYg+AC L2j92kx8ZdEhxKiE6pm+cFVBHLLLmXGKLDaVnffLv1GQIl5YrIyy4jiw h0a= isc.org. 484 IN RRSIG DNSKEY isc.org. j1kgww+wffw01e2z2kxq+bitg1rrng1xop17piotozhelgpy7f6kegyj fn6e2c+gvxxoaabq+qr76o+p+zuhrluei0ewtc3v4hzimel0z2/ne0mh qaedmeemezkn9o1eaoc7gz4nu5psmuylqxcckudbw0qhld+u/8+d6l1s nlrd/vei4r1sll2bd5vbtaxczoz+2beqlveut/ UusS1qhYcFjdCYbHqF JGQziTJv9ssbEDHT7COc05gG+A1Av5tNN5ag7QHWa0VE+Ux0nH7JUy0N ch1kvecpbxjvhrf97ceh5wcdegcfkayyhaxxh02fqbgfon8r5micgo/f DRdXjA== isc.org. 484 IN RRSIG SPF isc.org. IB/bo9HPjr6aZqPRkzf9bXyK8TpBFj3HNQloqhrguMSBfcMfmJqHxKyD ZoLKZkQk9kPeztau6hj2YnyBoTd0zIVJ5fVSqJPuNqxwm2h9HMs140r3 9HmbnkO7Fe+Lu5AD0s6+E9qayi3wOOwunBgUkkFsC8BjiiGrRKcY8GhC kak= isc.org. 484 IN RRSIG A isc.org. ViS+qg95DibkkZ5kbL8vCBpRUqI2/M9UwthPVCXl8ciglLftiMC9WUzq Ul3FBbri5CKD/ YNXqyvjxyvmZfkQLDUmffjDB+ZGqBxSpG8j1fDwK6n1 hwbkf7qse4lujzyegxfekp16cmvyzctituh2tndmrgsoxrvroqoepwhp 8+E= isc.org IN NS ns.isc.afilias-nst.info. isc.org IN NS ams.sns-pb.isc.org. isc.org IN NS ord.sns-pb.isc.org. isc.org IN NS sfba.sns-pb.isc.org. ;; AUTHORITY SECTION: isc.org IN NS ns.isc.afilias-nst.info. isc.org IN NS ams.sns-pb.isc.org. isc.org IN NS ord.sns-pb.isc.org. isc.org IN NS sfba.sns-pb.isc.org. ;; ADDITIONAL SECTION: mx.ams1.isc.org. 484 IN A mx.ams1.isc.org. 484 IN AAAA 2001:500:60::65 mx.pao1.isc.org. 484 IN A mx.pao1.isc.org. 484 IN AAAA 2001:4f8:0:2::2b _sip._udp.isc.org IN SRV asterisk.isc.org. ;; Query time: 176 msec ;; SERVER: x.x.x.x#53(x.x.x.x) ;; WHEN: Tue Oct 30 01:14: ;; MSG SIZE rcvd:

5 Since many DNS servers have high bandwidth connections to the Internet, they have no problem pumping out a high volume of bytes. The request above is a 64 byte query that resulted in a 3,223 byte response. So a small UDP request, like dig ANY, when sent to open DNS resolvers, can return a crippling amount of traffic to the intended target in this case, an attacker could have achieved a 50x amplification over the traffic they initiated to an open DNS resolver. Amplification attacks can reach over 500Gbps, easily enough to saturate network links or overwhelm servers. This means that the majority of businesses are vulnerable to this attack vector. CloudFlare shields web properties from this type of volumetric attack in two ways: Using an Anycast network to spread traffic to all of our datacenters Absorbing excess traffic to individual data centers by having a diverse set of high bandwidth interconnections with other networks Understanding the differences between Unicast and Anycast Most of the Internet works via a routing scheme called Unicast. In a Unicast network, every node on the network gets an IP address which is unique to it. In this system, communication is between a single sender and a single receiver over a network. UNICAST (LEFT) is a one to one relationship between the user and the server. ANYCAST (RIGHT) is one to a possible many. The user s connection is directed to the closest server geophraphically. Seattle San Jose Los Angeles Dallas Chicago Toronto Newark Ashburn Atlanta Miami Medellín Düsseldorf Amsterdam Manchester Dublin London Paris Madrid Berlin Milan Marseille Frankfurt Stockholm Warsaw Prague Vienna Bucharest Doha Dubai Kuwait City Muscat Langfang Tianjin Zhengzhou Luoyang Xi an Shijiazhuang Chengdu Hengyang Guangzhou Nanning Foshan Shenyang Seoul Tokyo Osaka Qingdao Jiaxing Hangzhou Fuzhou Hong Kong Dongguan Lima Mombasa Kuala Lumpur Singapore Valparaíso São Paulo Buenos Aires Johannesburg Sydney Melbourne Auckland CLOUDFLARE NETWORK MAP (AS OF SEPTEMBER 2015) For the latest map, see 5

6 Unicast networks work fine until one of the servers on that network goes down. Since traffic is routed to a single location, if a server in that location goes down, your website, API, or other web property is offline. The main reason why Unicast networks are especially vulnerable to DDoS attacks is because attackers can target and overwhelm a single server. CloudFlare uses a different networking design called Anycast. With an Anycast network, multiple machines can share the same IP address. This means that when a request is sent to an Anycasted IP address, routers will direct it to the machine on the network that is closest to the user. This has two positive effects. One, it makes response time to users faster by serving content from the server closest to them, and two, if an attacker tries to target one particular IP address, our Anycast system, by sharing the same IP address around the world, increases the surface area of the network and allows us to spread out and easily absorb the spike in traffic Prior to CloudFlare, a DDoS attack that was more than 20Gbps was considered difficult for most enterprises to mitigate. Because of the robust mitigation resources built into the CloudFlare network, we routinely mitigate DDoS attacks that reach 500Gbps. > dig ANY example.com ; <<>> DiG P1 <<>> example.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4969 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;example.com. IN A ;; ANSWER SECTION: example.com IN SOA sns.dns.icann.org. noc.dns.icann.org example.com IN RRSIG NSEC example.com. UJHsLeIUxISWr+z- Attacker > dig ANY example.com DNS servers ; <<>> DiG P1 <<>> example.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4969 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 Your server Attacker DNS servers CloudFlare Your server AMPLIFICATION ATTACKS (TOP) Attackers pretending to be your server make tiny requests to a DNS, NTP, CHARGEN, or UPnP server. Those servers return huge responses to your server, knocking it offline. AMPLIFICATION ATTACKS WITH CLOUDFLARE (BOTTOM) Attackers pretending to be your server make tiny requests to a DNS, NTP, CHARGEN, or UPnP server. Those servers return huge responses. CloudFlare s Anycast network spreads out and absorbs traffic spikes. DNS flood attacks A DNS flood attack is another type of volumetric DDoS attack. While many volumetric attacks use amplified responses from DNS or NTP servers to overwhelm a web server, DNS flood attacks target DNS servers themselves. Instead of taking a web property offline by knocking out the server that is hosting it, a DNS flood attack aims to take out the DNS servers that tell Internet users where the site, API, or other web property is located. Sending a flood of packets large enough to overwhelm a DNS server can have two outcomes. One, the DNS server s processing capacity could be exhausted. The other is that the network link to the DNS server could be totally filled. An attacker doesn t care which one of these happens first because they both achieve the same goal: deny real users access to DNS servers so they can t find the web property they are looking for. 6

7 > asfjkas.example.com, ksjgkjg.example.com, zbjskfj.example.com, sakdfsk.example.com, mhrnkin.example.com, skjasku.exa Attackers > asfjkas.example.com, ksjgkjg.example.com, zbjskfj.example.com, sakdfsk.example.com, mhrnkin.example.com, skjasku.exa Your DNS Server Visitors Attackers CloudFlare DNS Visitors DNS FLOOD ATTACK (TOP) Attackers overwhelm DNS servers with requests for a single website, making it impossible for real users to access. DNS FLOOD ATTACK WITH CLOUDFLARE (BOTTOM) Attackers target CloudFlare DNS servers, but their requests are distributed over our entire network. One way an attacker might try to take a DNS server offline is to spoof random prefix queries. By making thousands of requests to nonexistent subdomains, a DNS server s resources can be exhausted or the network link could be saturated. In both cases, a DNS server will be unable to answer queries for legitimate users, making it impossible for real visitors to find the targeted site. Large volumetric DDoS attacks like DNS floods are also difficult for on-premise solutions to mitigate and there are only a handful of companies that have build networks that can handle 500+ Gbps attacks. CloudFlare protects web properties from DNS flood attacks in two ways: Using an Anycast network to spread traffic to all of our datacenters (as described in detail above) Using proprietary technologies that automatically identify and block new attacks wxctkzubkb. ebepexklyfaxmloh. ktylstudkr. ohunarajmbkrej. wwtdheilzcv. zktvvotoyrewaku. khyhavsnijslyb. gchjpexychflvfv. ruqnpvp. fapzefvgowzonss. mcvhothfketpgre. asldfkaslfkf. meqtnretiah. qwmneqmen. SPOOFED PREFIX QUERIES By making thousands of requests to nonexistant subdomains, a DNS server s resources can be exhausted. CloudFlare s automatic learning platform CloudFlare has developed proprietary technology that leverages knowledge from a diverse community of websites, APIs, and other web properties to harness the power of numbers. This technology analyzes network traffic and metrics in real-time in order to identify anomalous or malicious requests. Once a new attack is identified, CloudFlare automatically starts to block that attack type for both the particular web property and the entire CloudFlare network community. This type of community learning means that the larger CloudFlare s user base becomes, the more protection every CloudFlare customer receives. CloudFlare has over 2 million domains using our service, and we see over 1 billion unique IP addresses each month. It is this breadth of traffic that allows the CloudFlare network to identify new attacks quickly and provide the best in enterprise-grade security. 7

8 SYN flood A SYN flood DDoS attack is also a type of volumetric attack, but it works differently from DNS flood and amplification attacks. During a SYN flood, an attacker sends a succession of SYN requests to a server in order to exhaust its resources and prevent real users from creating connections. 1 SYN SYN-ACK 2 Visitor 3 ACK Your server SYN-ACK THREE WAY HANDSHAKE The typical process for initiating a TCP connection is a three step, back-and-forth process. SYN floods work by breaking the normal TCP three-way handshake connection establishment process. In a successful TCP connection, a client and server exchange a series of messages to establish a stable connection. The first part of that connection is called a synchronized message or SYN. Once a server receives a SYN it then responds with an acknowledgement SYN-ACK and expects to receive a follow up acknowledgement ACK from the client so a connection can be established. During a SYN flood DDoS attack, an attacker sends a huge number of SYN requests and then breaks the response cycle to the server. The server, having received a SYN message, will wait for the acknowledgement with half-open connections that take up resources. If enough half-open connections are created, the server s CPU will be exhausted and no new connections can be made. This ultimately denies legitimate traffic from reaching the server. Since the attacker sending these requests doesn t care about getting a response, they can spoof the IP address and direct the flood of SYN requests toward the target server. SYN SYN-ACK SYN Attacker Your server Visitor SYN Attacker CloudFlare Your server SYN FLOOD ATTACK (TOP) Attacker sends many SYN requests then breaks the response cycle creating many open connections and overwhelming the server. Legitimate users are unable to connect. SYN FLOOD ATTACK WITH CLOUDFLARE (BOTTOM) CloudFlare protects origin servers from floods of SYN requests, allowing legitimate traffic to get through. 8

9 Since SYN attacks are a form of volumetric DDoS attack, CloudFlare mitigates them with the same methods used for other volumetric attacks: spreading out the flood of requests via our Anycast network, having huge amounts of bandwidth to absorb the extra traffic, and leveraging CloudFlare s automatic learning platform to filter out malicious traffic, ensuring our customers origin servers are protected. Layer 7 attacks Layer 7 (Application layer) attacks are a relatively new breed of attack. They are the most complicated and sophisticated types of network based attacks. By mimicking normal use of an application, Layer 7 attacks are able to get past most DDoS mitigation equipment and vulnerability protection services. There are two main types of Layer 7 attacks: Layer 7 denial of service attacks and Layer 7 application vulnerability attacks. Layer 7 Denial of Service Attacks Like Layer 3 and 4 volumetric attacks, Layer 7 denial of service attacks use a high volume of requests to prevent real users from accessing a website. While web properties generally have excess capacity to handle bursts in traffic, Layer 7 denial of service attacks can cause high CPU load and bandwidth consumption. This easily saturates the excess capacity, overwhelming on-premise solutions and most cloud provider network connections. Layer 7 denial of service attacks focus on specific characteristics of web applications that present bottlenecks. For example, the so-called slow read attack sends packets very slowly across multiple connections. Since Apache opens a new thread for each connection, and since connections are maintained as long as there is some traffic being sent, an attacker can overwhelm a web server by exhausting its thread pool relatively easily. CloudFlare protects web properties from Layer 7 denial of service attacks in two ways: Using the intelligence gained from our global network to introduce new layers of protection Offering I m Under Attack Mode for added protection Intelligent Network Protection CloudFlare protects web properties from Layer 7 denial of service attacks by leveraging the intelligence of our global network. With 2 million websites running on our network, CloudFlare sees over a 1 billion unique IP addresses per month. This breadth of web traffic allows us to quickly identify new types of malicious traffic and compromised botnets that are being used in both Layer 7 denial of service and Layer 7 application vulnerability attacks. One way to think about this is that CloudFlare is crowdsourcing threat data across all domain types to create an immune system for the Internet. With each new attack against any one of our customers, our system learns and becomes stronger. This intelligent learning benefits every customer on our network. While all customers get the benefit of the intelligence of the entire network, CloudFlare also has technology that protects specific domains from new attack types. With this technology, we can detect new attacks that arise against any web property in real-time and create rules to stop those attacks without customers having to do anything on their origin server. 9

10 I m Under Attack Mode In the event that CloudFlare s system doesn t learn fast enough, we have an easy to turn on first line of defense called I m Under Attack Mode that takes less than 30 seconds to take effect. Once this setting is enabled, CloudFlare will add an additional set of protections to stop malicious Layer 7 traffic from being passed to your server. I m Under Attack Mode has been designed to avoid blocking search engine crawlers, your existing whitelists, and other pre-vetted traffic. As a result, enabling I m Under Attack Mode when under a DDoS attack will not negatively impact your SEO or known legitimate visitors. Layer 7 application vulnerability attacks Layer 7 attacks are also capable of more targeted actions. Instead of saturating network connections, taking down a DNS server, or exhausting CPU, a Layer 7 attack can also compromise the security of an application. Common Layer 7 application vulnerability attacks are SQL injection and cross-site scripting (XSS) attacks. With an SQL injection attack, an attacker tries to insert a SQL statement into a database. If they succeed, that SQL statement can query the database, retrieve information, and send it back to the attacker. In an XSS attack, attackers try to inject client-side script into a web page. There are a variety of ways this can be problematic. For example, an attacker could insert a piece of JavaScript into a web page so that when a user logs into their account, the attacker s script could send a copy of that username and password to themselves and then pass it on to the server so that the user would never know their information has been stolen. Attackers Your application Visitors Your application Attackers CloudFlare Visitors LAYER 7 DENIAL OF SERVICE ATTACKS (TOP) Attackers use advanced software that mimics real user behavior to overload the slow points in your software. LAYER 7 DENIAL OF SERVICE ATTACKS WITH CLOUDFLARE (BOTTOM) CloudFlare s multi-layered security system detects and blocks advanced attacks before they can overload the slow points in your software. 10

11 Web application firewall (WAF) CloudFlare protects against Layer 7 application vulnerability attacks with our web application firewall (WAF). CloudFlare s WAF is compatible with rules written for Apache ModSecurity but was built from the ground up as a dynamic system that is customizable. Our WAF adds less than 1ms of latency per request which means that for the first time you can get the best in security without any performance tax. In addition to deploying the OWASP Core rule set, CloudFlare has built its own rule sets and can create and deploy new WAF rules on the fly. This means that if a new Layer 7 application vulnerability attack comes up, we can study it, recognize the pattern of the attack, define that pattern in a rule, and instantly protect all of our customers from that vulnerability. With thousands of CloudFlare customers using a variety of web content platforms such as WordPress, Joomla!, and Drupal, we re able to monitor the latest attack vectors targeting these technologies. Once we see an attack directed at one target, we can immediately create and apply WAF rules to protect the customer under attack and then deploy those new rules across our entire network to protect all of our customer s web properties. Any new rule released by CloudFlare will propagate to all of CloudFlare s nodes within 30 seconds. Since CloudFlare can create and deploy WAF rules quickly, we ve been able to protect our customers against major zero-day vulnerabilities. When the Shellshock vulnerability was announced in September 2014, CloudFlare responded by creating and deploying a WAF rule immediately. Before that, in April of 2014 when the Heartbleed bug was discovered, CloudFlare patched the OpenSSL vulnerability for all of our customers giving users breathing room to upgrade their origin servers. We think of this as patching the web in real-time. Making DDoS a thing of the past As technology advances, DDoS attacks will continue to increase in complexity and magnitude. Traditional on-premise DDoS solutions simply can not adapt to the wide range of new attack vectors and are rendered completely ineffective for attacks that exceed an organization s network capacity. CloudFlare s globally distributed network (see image above) and automatic learning platform are designed to keep pace with the changing DDoS threat landscape, ensuring that DDoS attacks are no longer a worry for our customers. We regularly blog about new DDoS attack vectors. If you d like to read about the latest attack types from the front lines of DDoS protection, please visit: blog.cloudflare.com. To learn more about CloudFlare s attack mitigations, contact us at enterprise@cloudflare.com. 11

12 FLARE CloudFlare Inc. All rights reserved. The CloudFlare logo is a trademark of CloudFlare. All other company and product names may be trademarks of the respective companies with which they are associated.

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

Enterprise overview. Benefits and features of CloudFlare s Enterprise plan. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.

Enterprise overview. Benefits and features of CloudFlare s Enterprise plan. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare. Enterprise overview Benefits and features of CloudFlare s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com Enterprise overview This paper summarizes the benefits and features

More information

CloudFlare CDN. A global content delivery network with unique performance optimization capabilities

CloudFlare CDN. A global content delivery network with unique performance optimization capabilities CloudFlare CDN A global content delivery network with unique performance optimization capabilities 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com Overview CloudFlare provides a global content

More information

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS : DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s

More information

NETNOD Autumn 2014 October 2, 2014

NETNOD Autumn 2014 October 2, 2014 Surviving a DDoS Attack: Securing CDN traffic at CloudFlare NETNOD Autumn 2014 October 2, 2014 Martin J. Levy, Network Strategy www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

Doyourwebsitebot defensesaddressthe changingthreat landscape?

Doyourwebsitebot defensesaddressthe changingthreat landscape? WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service

More information

DDoS Mitigation at CloudFlare

DDoS Mitigation at CloudFlare DDoS Mitigation at CloudFlare Martin J. Levy CEE Peering Day 2015 Bratislava Slovakia 19 March 2015 CloudFlare 2 What is CloudFlare? CloudFlare makes websites faster and safer using our globally distributed

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

DDoS Mitigation Solutions

DDoS Mitigation Solutions DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014 DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

DDoS Attacks & Mitigation

DDoS Attacks & Mitigation DDoS Attacks & Mitigation Sang Young Security Consultant ws.young@stshk.com 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

LEVEL 3 SM WEBSITE ACCELERATION SERVICES. Do More With Less Faster

LEVEL 3 SM WEBSITE ACCELERATION SERVICES. Do More With Less Faster LEVEL 3 SM WEBSITE ACCELERATION SERVICES Do More With Less Faster WEBSITE CONSUMERS ARE IMPATIENT, which makes your website performance extremely critical. Whether you are delivering content to a desktop,

More information

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd.

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Contents 1 2 3 4 Industry Trends DDoS Attack Types Solutions to DDoS Attacks Summary 2 Cybercrime Landscape DNS Hijacking Malware 3% 3% Targeted

More information

How to launch and defend against a DDoS

How to launch and defend against a DDoS How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

How To Understand A Network Attack

How To Understand A Network Attack Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different

More information

DNSSEC and DNS Proxying

DNSSEC and DNS Proxying DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for

More information

Manage the unexpected

Manage the unexpected Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative 2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,

More information

TDC s perspective on DDoS threats

TDC s perspective on DDoS threats TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)

More information

DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION. Mohammad Fakrul Alam. bdhub. SANOG 21 January 27 - Feb 4, 2013 Cox's Bazar, Bangladesh

DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION. Mohammad Fakrul Alam. bdhub. SANOG 21 January 27 - Feb 4, 2013 Cox's Bazar, Bangladesh DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION SANOG 21 January 27 - Feb 4, 2013 Cox's Bazar, Bangladesh Mohammad Fakrul Alam bdhub fakrul [at] bdhub [dot] com AGENDA 1. Overview of (D)DoS 2. How to (D)DoS

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDOS ATTACK AGAINST THE DNS INFRASTRUCTURE The Domain Name System (DNS) is part of the functional infrastructure of the Internet and

More information

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch

More information

Web Application Defence. Architecture Paper

Web Application Defence. Architecture Paper Web Application Defence Architecture Paper June 2014 Glossary BGP Botnet DDoS DMZ DoS HTTP HTTPS IDS IP IPS LOIC NFV NGFW SDN SQL SSL TCP TLS UTM WAF XSS Border Gateway Protocol A group of compromised

More information

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

How To Mitigate A Ddos Attack

How To Mitigate A Ddos Attack VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5

More information

DoS/DDoS Attacks and Protection on VoIP/UC

DoS/DDoS Attacks and Protection on VoIP/UC DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

A Very Incomplete Diagram of Network Attacks

A Very Incomplete Diagram of Network Attacks A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing

More information

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business & Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright

More information

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business. [ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Defeating DNS Amplification Attacks. Ralf Weber Senior Infrastructure Architect

Defeating DNS Amplification Attacks. Ralf Weber Senior Infrastructure Architect Defeating DNS Amplification Attacks Ralf Weber Senior Infrastructure Architect History DNS amplification attacks aren't new Periodically reemerge as attackers read history books J NANOG 56 Reports of unusual

More information

Defending against DNS reflection amplification attacks

Defending against DNS reflection amplification attacks University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013 Authors: Thijs Rozekrans Javy de Koning

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

How To Stop A Ddos Attack On A Website From Being Successful

How To Stop A Ddos Attack On A Website From Being Successful White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service

More information

The Top 10 DDoS Attack Trends

The Top 10 DDoS Attack Trends WHITE PAPER The Top 10 DDoS Attack Trends Discover the Latest DDoS Attacks and Their Introduction The volume, size and sophistication of distributed denial of service (DDoS) attacks are increasing rapidly,

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating

More information

ADC Survey GLOBAL FINDINGS

ADC Survey GLOBAL FINDINGS ADC Survey GLOBAL FINDINGS CONTENTS Executive Summary...4 Methodology....8 Finding 1: Attacks Getting More Difficult to Defend... 10 Finding 2: Attacks Driving High Costs to Organizations.... 14 Finding

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

/ Staminus Communications

/ Staminus Communications / Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in

More information

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen Eldad Chai, VP Product Incapsula Application Delivery from the Cloud 2 DDoS 101 ISP Network Devices Web servers Applications

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Don t get DDoSed and Confused Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Agenda Intro/Data Collection DDoS Basics Trends and Statistics Adversarial Groups/Motivations Defense

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably

More information

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

DENIAL-OF-SERVICE ATTACKS

DENIAL-OF-SERVICE ATTACKS DENIAL-OF-SERVICE ATTACKS 40 years old & more present then ever Robert Dürr, Brühl, 16./17.09.2015 Axians Networks & Solutions GmbH email: robert.duerr@axians.de 1 WHO IS AXIANS?! Axians is the new brand

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved. FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be

More information

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015. 1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based

More information

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy Mitigating Denial of Service Attacks Why Crossing Fingers is Not a Strategy Introduction Mark Baldwin - Owner of Tectonic Security MSSP and Security Consulting Primarily Work With SMBs DDoS Mitigation

More information

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689 F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: p.bogaerts@f5.com Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application

More information

How To Attack A Website With An Asymmetric Attack

How To Attack A Website With An Asymmetric Attack DEFENDING AGAINST LOW-BANDWIDTH, ASYMMETRIC DENIAL-OF-SERVICE ATTACKS David W. Holmes (@dholmesf5) F5 Networks Session ID: HT-R02 Session Classification: Intermediate AGENDA Introduction Why does this

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...

More information

Check Point DDoS Protector

Check Point DDoS Protector Check Point DDoS Protector June 2012 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. Cybercrime

More information

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)

More information

DDoS Attacks Can Take Down Your Online Services

DDoS Attacks Can Take Down Your Online Services DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 editor@availabilitydigest.com Who Am I? Dr. Bill

More information

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Kona Site Defender. Product Description

Kona Site Defender. Product Description Kona Site Defender Product Description November 2013 TABLE OF CONTENTS Table of Contents 2 Introduction 3 Kona Site Defender Overview 3 Kona Site Defender Features 3 DDoS Mitigation 3 DDoS Fee Protection

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information