DDoS Open Threat Signaling (DOTS) Working Group. Operational Requirements. Chris Morrow <morrowc@ops- netman.net> Network Security Engineer, Google



Similar documents
SecurityDAM On-demand, Cloud-based DDoS Mitigation

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

DDoS Open Threat Signaling (DOTS) Working Group. draft-ietf-dots-use-cases-00

Arbor s Solution for ISP

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

How To Classify A Dnet Attack

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

How Cisco IT Protects Against Distributed Denial of Service Attacks

Pravail 2.0 Technical Overview. Exclusive Networks

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

DDoS Overview and Incident Response Guide. July 2014

DEPLOYING VoIP SECURELY

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Approaches for DDoS an ISP Perspective.

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Complete Protection against Evolving DDoS Threats

State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Reducing Configuration Complexity with Next Gen IoT Networks

Packet Sniffing on Layer 2 Switched Local Area Networks

Where every interaction matters.

Security Toolsets for ISP Defense

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

NASCIO 2015 State IT Recognition Awards

A HELPING HAND TO PROTECT YOUR REPUTATION

Security MWC Nokia Solutions and Networks. All rights reserved.

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

FortiDDos Size isn t everything

Distributed Denial of Service (DDoS)

Enterprise Buyer Guide

Towards Autonomic DDoS Mitigation using Software Defined Networking

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Denial of Service Attacks and Resilient Overlay Networks

Prevention, Detection, Mitigation

Should the IETF do anything about DDoS attacks? Mark Handley

A Layperson s Guide To DoS Attacks

Practical Advice for Small and Medium Environment DDoS Survival

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

External Supplier Control Requirements

Mitigating DDoS Attacks at Layer 7

Threat-Centric Security for Service Providers

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

PART D NETWORK SERVICES

Lecture 23: Firewalls

Yahoo Attack. Is DDoS a Real Problem?

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

IBM enetwork VPN Solutions

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Cloud Computing for SCADA

IronBee Open Source Web Application Firewall

Bridging the gap between COTS tool alerting and raw data analysis

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Mailwall Remote Features Tour Datasheet

Computer Networking. Definitions. Introduction

Defending against Cyber Attacks

STATE OF DNS AVAILABILITY REPORT

Security Solutions for the New Threads

Recommended IP Telephony Architecture

CISCO IOS NETWORK SECURITY (IINS)

Hope is Not a Strategy

Payment Card Industry Data Security Standard

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Transcription:

DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements Chris Morrow <morrowc@ops- netman.net> Network Security Engineer, Google Roland Dobbins <rdobbins@arbor.net> Principal Engineer, Arbor Networks

IntroducDon & Context 2

DDoS Background What is a Distributed Denial of Service (DDoS) attack? An attempt to consume finite resources, exploit weaknesses in software design or implementation, or exploit lack of infrastructure capacity Targets the availability and utility of computing and network resources Attacks are almost always distributed for even more significant effect (i.e., DDoS) The collateral damage caused by an attack can be as bad, if not worse, than the attack itself DDoS attacks affect availability! No availability, no applications/services/ data/internet! No revenue! DDoS attacks are attacks against capacity and/or state!

Three Security Characteristics Availability Confiden'ality Integrity The goal of security is to maintain these three characteristics

Three Security Characteristics Availability Confiden'ality Integrity The primary goal of DDoS defense is maintaining availability in the face of attack

ReflecDon/AmplificaDon RealiDes of Coordinated DDoS ALacks DDoS Defense 6

Common Perception of Internet Security Posture Today 7

Actual State of Internet Defenses Today 8

Who Can Help? Your ISP or MSSP! 9

How Can You Ask for Help Today? Technology pioneered by Robert Hooke in 1667, only slightly improved! 10

Asking for Help is Hard! Knowing How to Help is Harder! Most end-customers have no idea what their normal Internet traffic looks like, much less what s actually happening when they re being DDoSed (or even understanding that they re under attack!). Many ISPs/MSSPs do not provision DDoS defenses in detail for their end-customers. In many (most?) cases, endcustomers cannot articulate what servers/services need protection, what network access policies should be in place, etc. This drastically slows reaction/mitigation times. This drastically impedes reaction/mitigation efficacy. This leads to extended outages, lost revenue, frustrated end-customers (and customers of those end-customers). 11

Automated DDoS Attack Notification Methods Exist Today But they are proprietary! End-customers can t mix-and-match vendors, ISP DDoS cloud mitigation providers, MSSP DDoS cloud mitigation providers. Effective coordination during an attack is for all practical purposes impossible. Servers/services/infrastructure devices which are the targets of DDoS can t signal for mitigation, even if they have the ability to detect and classify DDoS attacks (think Apache mod_security/mod_evasive, BIND RRL). ISPs/MSSPs must coordinate (badly, inefficiently) manually when jointly working to mitigate DDoS attacks. As attackers shift DDoS vectors/resources, severe latency, common miscuing occurs between defenders. Web portals exist; they re specific to vendors/isps/mssps, have varying degrees of mitigation configurability (most end-customers wouldn t know what to configure), and can be difficult to access during an attack when IDC & client LAN transit are conflated. 12

DDoS Defense Becomes a Typing Contest... Attacker. 13

DDoS Defense Becomes a Typing Contest... Defender. 14

Largely Static, Low-Agility Defenses... 15

... Lead to Predictable Outcomes. 16

Coordination of DDoS Defenses, Circa 1995. 17

Coordination of DDoS Defenses, Circa 2005. 18

Coordination of DDoS Defenses, Circa 2015. 19

We Can and Must Do Better Than This! 20

We Need a Standardized Way of Sharing Information... 21

... Across a Fast, Low-Latency, Unreliable Transport... 22

... Across a Reliable Transport That Will Make It Through Policies... 23

... Tell Us About Itself, Its Problems, and Its Desired Actions... 24

... That Can Be Relayed Internally and Externally as Needed... 25

... Everyone and Everything on the Network Can Participate... 26

... In Coordinated, On-Demand DDoS Defense. 27

Summary of DOTS OperaDonal Requirements 28

DOTS Operational Requirements Standards-based exchange of DDoS attack and mitigation information. Must not assume organic detection/ classification capabilities of supplicant. Must work across common unreliable and reliable transports. Must support mutual authentication and optional crypto. 29

DOTS Operational Requirements (cont.) Must describe target under attack (IP address range, ports/protocols/services running on target, etc.). Must describe desired outcome in general terms (block, redirect, scrub, rate-limit, etc.). Must update supplicant with implemented actions and status, supplicant must do same. Must support intra- and inter-organizational relays. 30

DOTS Operational Requirements (cont.) Must support policy-based action/outcome filtering and transformation. Must be extensible. Must focus on DDoS initially, other uses can come later. Must minimize complexity of implementation and node interaction. 31

DOTS Operational Requirements (cont.) Must include a heartbeat function. Must be detection/classification/mitigationtechnology agnostic. Must support allowed distribution scope (TLP?). Should utilize existing protocols and information models wherever possible and whenever appropriate. 32

This Presentation http://bit.ly/1i2ivrf

DDoS Open Threat Signaling (DOTS) Working Group Thank You! Chris Morrow <morrowc@ops- netman.net> Network Security Engineer, Google Roland Dobbins <rdobbins@arbor.net> Principal Engineer, Arbor Networks