Stop DDoS Before They Stop You! CNNIC Conference

Size: px
Start display at page:

Download "Stop DDoS Before They Stop You! CNNIC Conference"

Transcription

1 Stop DDoS Before They Stop You! CNNIC Conference 09/2013

2 INTERNET ATTACK(DDOS & WEB) ANALYSIS AND SOLUTIONS

3 The endless war 2013 Mar. 2013, Izz ad din Al Qassam initiated 3rd round attack that target to U.S. Banks, including Bank of America, Citigroup, Wells Fargo, US Bancorp, PNC Financial Services Group Inc, Capital One, Fifth Third Bank, BB&T and HSBC. Mar. JP Morgan Chase website offline due to DDoS; Mar. DDoS attack targed to Czech telecom, banks website; Feb. Anonymous OpEgypt targeted to Egypt government websites; 2012 Jul. Anonymous Operation Japan attacks to Japanese government websites; Mar. DDoS attacks to Hong Kong The Chinese Gold & Silver Exchange Society; Mar. DDoS attacks to NASDAQ; Feb. DDoS attacks to U.S. Department of Justice, U.S. Copyright office, Mexico government websites; Brazil s top financial institutions, including Banco Bradesco and Banco do Brasil; local and global websites of U.K.'s HSBC Holdings PLC 2011 Malaysia Action, over 50 Malaysia government and financial websites bi under attack; Sony lost over 2 billion USD because of Anonymous attack; Visa, Paypal Amazon also underwent attacks and paralysed in revenge for terminating donation account for wikileaks. Korea 40 Government Websites and corporate institutions under attack, which h including Presidential loffice, National Nti lintelligence Service, Foreign Ministry, Defense Ministry

4 We are Anonymous Anonymous: The Unseen Driving ii Force

5 DDoS Trends in 2013 H1 DDoS Attack Frequency 5% 1% 1% Jan Feb Mar Apr May Jun 21% 43% Bank Government Enterprise NPO 29% ISP Other Figure 2 DDoS Attacks Monitored by NSFOCUS Figure 5 Targets of Major DDoS Attacks TCP_FLOOD 38.7% The combination of Hybrid DDoS Attacks HTTP_FLOOD DNS_FLOOD 13.1% 37.2% 9.8% 10.8% HYBRID_FLOOD UDP_FLOOD OTHER ICMP_FLOOD 4.1% 3.5% 10.2% 50.6% 3.0% 18.5% 0.3% ICMP+TCP+UDP ICMP+TCP+UDP+DNS ICMP+TCP TCP HYBRID Other 0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% Figure 8 Methods of DDOS Attacks Source: NSFOCUS Mid Year DDoS Threat Report 2013

6 Findings of DDoS Trends Findings from NSFOCUS Mid year DDoS Threat Report 2013 : One major DDoS news event happened every two days and one common DDoS attack happened every two minutes; DDoS motives Hacktivism tops the list; DDoS victims Most likely targets were banks, governments and enterprises; More than 68 percent of victims are suffering multiple attacks; TCP Flood and HTTP Flood remain the most popular attack methods; Most DDoS attacks are short, over 90% less than 30mins Most attacks are not very big, over 90% less than 2Gbps and 69% less than 0.2 Mpps Hybrid attacks are becoming more prevailing 91.1% Hacktivism i Business Crime Cyber War Other 2.2% 2.2% 4.4% Figure 3 Causes for Major DDoS Attacks Source: NSFOCUS Mid Year DDoS Threat Report 2013

7 The Scope of the Damage by DDoS Attacks Motivations: Organized Crime, Political Protest, Hactivism, etc State & Country Telecom Carriers Damage on Infrastructur e IDC & ISP Reputation loss Government & Financial Enterprises Economic loss

8 Operation Malaysia(2) LOIC:Low Orbit Ion Cannon

9 Why Anonymous always win the game? Attack Tools 1 HOIC 2 LOIC Type HTTP GET Flood HTTP GET Flood TCP Flood UDP Flood Methodology Simulates HTTP requests by setting connection threads, editing scripts for random headers or random URLs Simulates requests via selecting different protocols and setting attack connection threads, ports, and etc. 3 R U Dead Yet? HTTP POST Flood A type of connection exhaustion attacks that consume all the resources on the target servers 4 DDoSim 5 Slowloris 6 Pyloris HTTP GET Flood HTTP GET Flood HTTP GET Flood Simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server, and then starts conversations with the listeningapplications (e.g. HTTP servers) Sends partial HTTP requests to hold connection open to exhaust web server resources PyLoris is a scriptable tool for testing connection exhaustion attacks. It is a Python implementation of Slowloris Attackers will employ more diversified and varying attack methods instead of simply sending attack packets in a crazy manner.

10 <Operation Ababil> Attack Case 1

11 Background/Phase Protest Disaster cased by a film clip Attack Cyber Fighters set up DDoS attack to Banks of the U.S. Named as Operation Ababil 2 Phases Phase 1, 5 weeks ( ) Phase 2, 7 weeks ( ) Pause/Continue attack pause attack continue

12 Characteristics Big Traffic Volume 1. Web Servers as Zombie 2. Dozens of G 3. Numerous Zombies Last Long Time DDoS Multiple Attack Methods 1. Network Layer: TCP/UDP/ICMP Flood 2. Application Layer: HTTP/DNS Flood Multiple targets 1. Several months 1. Dozens of finance institute 2. APT alike 2. ISP

13 Operation Steps Vulnerable admin passwords Software Vulnerabilities Known: Zombies are Web Server!! 1. TimThumb of WordPress 2. Joomla Penetrate Web Servers Penetrate numerous high-bandwidth Web Servers Use multilayer attack mode Use some Web servers as C&C servers, the others as zombies; Upload PHP DDoS tools to zombies; Launch DDoS attack Zombies launch DDoS attack to targets

14 Attack Tools Name Itsoknoproblembro Type TCP Flood UDP Flood HTTP Get Flood HTTP Post Flood Kamikaze HTTP Get Flood Amos HTTP Post Flood

15 <Spamhaus VS. Cyberbunker> Attack Case 2

16 ICP VS DC, Cyberbunker has relationship with criminals from East Europe and Russia, is behind recent network attacks 1 2 Spamhaus abused its position, it has no right to decide what content can appear on the Internet and what cannot.

17 MSSP step out, VS DC 5 4 Help! I got attacked DDoS!! Just 75G, got it done, you can do some marketing 3 We have been attacked continuously for 1 week, but we kept standing, never down. You cannot imagine how much efforts our engineers made. Such attack can swallow everything.

18 MSSP became Target 6 5 You dare to help him! I will strike you instead. 4 Help! I got attacked DDoS!! Just 75G, got it done, you can say something about it Attacked from Mar 23, G, targets are not ordinary equipments, but CloudFlare BGP direct peering and IX, attacks are totally out of control. Attacks to IX include London LINK, Amsterdam AMS-IX, HK- IX, Frankfurt DE-CIX, etc. Among them, London IX got influenced most significantly, caused direct effects to Internet Business within.

19 ISP got effected 6 5 You dare to help him! I will strike you instead. 4 Help! I got attacked DDoS!! Just 75G, got it done, you can say something about it If this goes on, the entire network of Europe will down, you have to stop, CloudFlare, we need to talk about how to solve the problem. 7

20 Words after Event We will continue our righteous career, we will not be stroked down, we are the best! There is no evidence saying that we are responsible of the action. We will persist in our belief, Freedom Internet! We should keep low profile, thanks for the collaboration of everyone, we need to improve. You made so much trouble to us, and we did not earn any money from these work. Last year, we have warned that we need to pay attention to the right configuration of DNS server, you see

21 What we got from the event? DDoS and Web attack devastate Data Center Web Hosting business. Both of the 2 attacks are complicated, but in different ways. Data Centers need to mitigate DDoS and Web attack simultaneously, accurately and cost- effectively. How to transfer from DDoS attack mitigation to Web attack mitigation smoothly as the attack changes? For instance, DDoS attack from 1G to 40G to 100G to 400G, and change from DDoS attack to Web attack.

22 Internet Infrastructure and Web Security Solutions

23 Understanding DDoS/BOTNET Router overloaded Bandwidth consumption DNS

24 DDoS Protection Over Time Stone Age Medieval Age Current Age Block Ips; Black hole; Load balance; Dedicated DDoS System enhancement; IPS/NGFW; Mitigation System; High performance router Multi layer cleaning; and switch; Traffic Diversion;

25 DDoS Mitigation - Multilayer Traffic Cleaning Algorithm Attacker Internet Traffic Cleaning Center Protoco ol Analysi is Access Control List Reputat tion List Layer 4 Flo ood Mitigatio on Layer 7 Flo ood Mitigatio on 6 Rate Limit 1. Protocol Analysis Protocol Validation by RFC Check 2. Access Control List Layer 4 ACL Conn-Exhaustion ACL URL ACL 3. Reputation List White/Black List Dynamic Prioritizing 4. Layer 4 Flood Mitigation Source/destination IP address check/verification Various mitigation algorithms 5. Layer 7 Flood Mitigation Various mitigation algorithms Pattern Matching 6: Rate Limit Restricts traffic and ensures the critical business.

26 Out-of-path full-diversion Solution Traffic Cleaning NTA EBGP Attack Detection- NTA ADS Advertisement Router Attack Logs Traffic Diversion, i Attack Mitigation, Traffic Reinjection - ADS Applicable for Telecom Carriers, IDC, and MSSP Benefits: Only the traffic to target server are diverted; Automatic attack detection and cleaning process will simplify operator s work during attack prevention process; High reliability, the out-of-path deployment will not affect other traffic. And the traffic direction will recovered itself if the ADS product out of work Switch ADS-M

27 The thought of DDoS mitigation from box mitigation to value-added service Multi layered collaboration Internet Mgt. & Operation 100G ISP1 Anti DDOS Solution Traffic Monitoring 10G to 40G Data Center /MSSP ADS ADS ADS Attack Mitigation 1 10G Hosting ADS/WAF Traffic monitoring + DDoS mitigation; Out of path traffic diversion; CPE Web security (WAF) + Cloud cleaning service; Enable Web hosting provider become MSSP;

28 DDoS Attack Mitigation 100G 10G to 40G 1G Internet ISP1 IDC2 Web Hosting 1. IP address Verification Source/destination IP address check/verification 2. Access Control List Layer 4 ACL Conn-Exhaustion ACL URL ACL 4. Protocol Analysis Protocol Validation by RFC check 3. Reputation List White/Black List Dynamic Prioritizing 5. Layer 4 Flood Mitigation Source/destination IP address check/verification Various mitigation algorithms 6. Layer 7 Flood Mitigation Various mitigation algorithms Pattern Matching 7: Rate Limit Restricts traffic and ensures the critical business. It has been consensus in Data Center industry that the best place to stop DDoS attack, e.g. SYN flood, is in backbone network, since the attack traffic volume can be large, e.g. 10Gbps. Data Center usually provides DDoS attack mitigation as a part of its infrastructure service.

29 Web Attack Mitigation Internet On the other hand, Web attack, e.g. SQL Injection, is not large in volume, but its payload goes up to data level. Data Center usually provides Web attack mitigation as a dedicated service to Web Hosting customer. 100G ISP1 1. Network Access Control 6. HTTP Flood Protection 2. TCP Flood Protection 5. Data Normalization 3. HTTP Termination 4. SSL Decryption 10G to 40G 1G IDC2 Web Hosting 7. HTTP Validation 12. Customized Protection Mechanism White List Smart Patch Custom Security Exception Policy 8. HTTP Access Control 11. Behavior-Based Protection Illegal File Upload Illegal Download Information Disclosure Leech CSRF Scanning Cookie Hijacking 9. Web Server and Plug-in Protection 10. Rule-Based Protection Crawler XSS SQL Injection LDAP Injection SSI Command Injection XPath Injection Command Line Injection Path Traverse Remote File Inclusion

30 Next step - Cloud Pipe End Security Ecosystem Automatic collaboration between DDoS mitigation center, WAF(CPE) and Cloud MSS center. 24 x 7 Monitoring 4 Cloud Assessment: Remote web scanning and collaborates with WAF to provide smart patches to web servers; On premises protection: NSFOCUS WAF (CPE) takes care of application layer web attacks; Traffic Cleaning: WAF collaborates with ADS traffic cleaning cea gcenter e when attack ac scale exceeds its capacity; MSS Platform: All components are able to work with NSFOCUS 7 24 MSS pa platform and depe expert team. Security Experts Application layer attacks Attackers Managed Security Service Platform 1 Smart patches WAF 24x7 Monitoring Volumetric attacks Scanning Cleaning Center 2 Internet Escalation IDC ADS ADS ADS 3 Pipe Server farm End

31 Scenario 1:Remote Correlation Attack Traffic< CPE WAF Threshold Attack Traffic CPE WAF Threshold Correlation Clean Traffic IDC Botnet Internet Cleaning Center Anti- DDoS Anti- DDoS DDoS GRE Tunnel WAF WAF ADS Online Trading Finance Gaming

32 Scenario 2:Data Center Internal Correlation Attack Traffic< CPE WAF Threshold Attack Traffic CPE WAF Threshold Correlation Clean Traffic Botnet Internet IDC Anti- DDoS Anti- DDoS Cleaning Center WAF WAF ADS Online Trading Finance Gaming

33 An Living DDoSMitigation Example

34 Micron21 DDoS Mitigation Scenario USA DDoS Attack Traffic Cleaned Traffic Cogent IP Transit Direct Peering Direct Peering HE IP Transit nlayer IP Transit DDoS Portal ADS 6020 ADS M Mgt. Southern Cross To M21 DC

35 A living 17G DDoS attack mitigation example

36 DNS ATTACKS ANALYSIS AND SOLUTIONS

37 DNS Attack Event

38 DNS Cache Poisoning

39 A Common Example

40 Recommended Solutions 1. Split the authoritative Name Server and recursive Name Server 2. DNS redundancy 3. Update the OS and DNS Application 4. Firewall Policy Access Control List 5. Hide the OS or DNS Application Version 6. Change and restrict the DNS Root(Chroot) 7. Use random message IDs in queries(use id pool) 8. Running BIND with Least Privilege 9. TSIG (Transaction SIGnature) 10. DNSSEC(DNS Security Extension)

41 DNS Amplification Attack(DNS reflection attack)

42 Recommended Solutions Limiting Recursion to Authorized Clients Source IP Verification: spoofed IP Disabling Recursion on Authoritative Name Servers Restricting name server to answer certain queries: Rate Limiting Response of Recursive Name Servers Preventing Unauthorized Zone Transfers

43 DNS Query Flood DNS Query Flood Pattern Match is the main cause of CPU load DNS server could handle 9,000 dynamic Domain name requests per second. A normal PC can send more than 10,000 requests per second. The Random domain name queries cause DNS server to generate recursive queries to parent DNS and overloaded. DNS server denies normal services, which affects business directly. Targeted DNS Server

44 NSFOCUS Solution 1 TC Bit Algorithm UDP Limitation Algorithm Instruction Truncate Bit UDP TCP DNS policy setting DNS Query DNS Response with TC Bit SYN (53) SYN+ACK ACK Force the client to use TCP Verify the client during the TCP process FIN+ACK DNS Query Client ADS Server

45 NSFOCUS Solution -2 ACL RFC PORT LEN FRAG Patten Matching Trigger UDP Threshold Src IP Bandwidth Limit DNS TC -BIT Dst IP Bandwidth Limit

46 NSFOCUS Solution -3

47 About NSFOCUS Regional HQ and Offices: R&D Centers Beijing, CN Beijing Santa Clara, US Chengdu Tokyo, Japan Xian London, UK Wuhan KL, Malaysia Microsoft Active Protections Program (MAPP) Partner

48 NSFOCUS Product Family for Global Market Assessment Protection Monitoring NSFOCUS RSAS WbA Web App Scanning & Vulnerability Mgt. NSFOCUS ADS Anti DDoS System NSFOCUS WAF Web Application Firewall NSFOCUS NIPS Network Intrusion Prevention System CMADS, CMWAF MSS Service ADS 2010/2020 ADS 4020 ADS 6020

49 THANKS! Info

Architecture of a new DDoS and Web attack Mitigation System for Data Center

Architecture of a new DDoS and Web attack Mitigation System for Data Center Architecture of a new DDoS and Web attack Mitigation System for Data Center LIANG ZHAO NSFOCUS Information Technology Co., Ltd. CONGYU LI NSFOCUS Information Technology Co., Ltd. Session ID: DAS-T01 Session

More information

A Living Example of DDoS Mitigation

A Living Example of DDoS Mitigation A Living Example of DDoS Mitigation Stop DDoS before they stop you! James Braunegg (Micron 21) Maolin Gu (NSFOCUS) The creation of Micron21 Datacentre Removing resellers and middle men Working directly

More information

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Die hybride DDoS Protection und Application Security Lösung von F5 Networks Arrow Sommerforum München am 16. Juli 2015 [email protected]

More information

Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter

Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices

More information

NSFOCUS Web Application Firewall White Paper

NSFOCUS Web Application Firewall White Paper White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect

More information

TDC s perspective on DDoS threats

TDC s perspective on DDoS threats TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)

More information

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends

More information

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic

More information

NSFOCUS Anti-DDoS System White Paper

NSFOCUS Anti-DDoS System White Paper White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to

More information

DDoS Attacks Can Take Down Your Online Services

DDoS Attacks Can Take Down Your Online Services DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer 2012 Infrastructure Security Report 8th Annual Edition Kleber Carriello Consulting Engineer Key Findings in the Survey* Advanced Persistent Threats (APT) a top concern for service providers and enterprises

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com

More information

AntiDDoS1000 DDoS Protection Systems

AntiDDoS1000 DDoS Protection Systems AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

NSFOCUS Web Application Firewall

NSFOCUS Web Application Firewall NSFOCUS Web Application Firewall 1 / 9 Overview Customer Benefits Mitigate Data Leakage Risk Ensure Availability and QoS of Websites Close the Gap for PCI DSS Compliance Collaborative Security The NSFOCUS

More information

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd.

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Contents 1 2 3 4 Industry Trends DDoS Attack Types Solutions to DDoS Attacks Summary 2 Cybercrime Landscape DNS Hijacking Malware 3% 3% Targeted

More information

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

DDoS Attacks & Mitigation

DDoS Attacks & Mitigation DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

DDoS Attack and Its Defense

DDoS Attack and Its Defense DDoS Attack and Its Defense 1 DDoS attacks are weapons of mass disruption. The DDoS attack has long been a big main threat to security of the Internet. It is not expensive and easy to be used for achieving

More information

Cloud Security In Your Contingency Plans

Cloud Security In Your Contingency Plans Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect

More information

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection Oğuz YILMAZ CTO Labris Networks 1 Today Labris Networks L7 Attacks L7 HTTP DDoS Detection Problems Case Study: Deep DDOS Inspection (DDI

More information

A Primer for Distributed Denial of Service (DDoS) Attacks

A Primer for Distributed Denial of Service (DDoS) Attacks A Primer for Distributed Denial of Service (DDoS) Attacks Hemant Jain, VP of Engineering Sichao Wang, Director of Product Management April 2012, Fortinet, Inc A Primer for Distributed Denial of Service

More information

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of

More information

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product

More information

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology JUNOS DDoS SECURE Advanced DDoS Mitigation Technology Biography Nguyen Tien Duc [email protected], +84 903344505 Consulting Engineer- Viet Nam CISSP # 346725 CISA # 623462 2 Copyright 2013 Juniper Networks,

More information

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen Eldad Chai, VP Product Incapsula Application Delivery from the Cloud 2 DDoS 101 ISP Network Devices Web servers Applications

More information

Customer Cases. Andreas Nordenadler, Sales Manager

Customer Cases. Andreas Nordenadler, Sales Manager Customer Cases Andreas Nordenadler, Sales Manager CERT-XX Attacks May 19 th and onward AGENDA Motivation Attack Campaign Timeline Attack Vectors Summary Motivation Operation OpXX May 3 rd 2012 - Department

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

Protect Your Infrastructure from Multi-Layer DDoS Attacks

Protect Your Infrastructure from Multi-Layer DDoS Attacks Protect Your Infrastructure from Multi-Layer DDoS Attacks F5 EMEA Webinar February 2014 Presenter: Keiron Shepherd Title: Field Systems Engineer Protecting Against DDoS is Challenging Webification of apps

More information

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

White Paper A10 Thunder and AX Series Load Balancing Security Gateways White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its

More information

How to launch and defend against a DDoS

How to launch and defend against a DDoS How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals

More information

AntiDDoS8000 DDoS Protection Systems

AntiDDoS8000 DDoS Protection Systems AntiDDoS8000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

Understanding and Defending Against the Modern DDoS Threat

Understanding and Defending Against the Modern DDoS Threat Understanding and Defending Against the Modern DDoS Threat SESSION ID: CLE-T09 Stephen Gates Chief Security Evangelist Corero Network Security @StephenJGates Understand you re vulnerable! How well are

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &

More information

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved. FortiWeb for ISP Web Application Firewall Copyright Fortinet Inc. All rights reserved. Agenda Introduction to FortiWeb Highlights Main Features Additional FortiWEB Services for the ISP FortiWeb Family

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

Application DDoS Mitigation

Application DDoS Mitigation Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...

More information

Arbor s Solution for ISP

Arbor s Solution for ISP Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard

More information

Distributed Denial of Service protection

Distributed Denial of Service protection Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SecurityDAM On-demand, Cloud-based DDoS Mitigation SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS

More information

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6

More information

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS 1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd [email protected]

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd michaels@radware.com Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd [email protected] Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority

More information

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore CYBER TRENDS & INDUSTRY PENETRATION TESTING Technology Risk Supervision Division Monetary Authority of Singapore A NEW DAWN New Services / Mobile Application, NFC, FAST Technology / Biometrics, Big Data,

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

FortiWeb 5.0, Web Application Firewall Course #251

FortiWeb 5.0, Web Application Firewall Course #251 FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration

More information

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013 Introducing Radware Attack Mitigation System Presenter: Werner Thalmeier September 2013 Agenda Introducing Radware (quick) Current Attacks Landscape Quick Outlook on Radware Attack Mitigation System (AMS)

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand

Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand Attacks Against the Cloud: A Mitigation Strategy C L O U D A T T A C K M I T I G A T I O N & F I R E W A L L O N D E M A N D A l e x Z a c h a r i s a z a h a r i s @ a d m i n. g r n e t. g r G R N E

More information

Application Denial of Service Is it Really That Easy?

Application Denial of Service Is it Really That Easy? Application Denial of Service Is it Really That Easy? Shay Chen Agenda Introduction to Denial of Service Attacks Application Level DoS Techniques Case Study Denial of Service Testing Mitigation Summary

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Surviving DNS DDoS Attacks. Introducing self-protecting servers Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

How To Understand A Network Attack

How To Understand A Network Attack Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information