Cheap and efficient anti-ddos solution



Similar documents
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

DDoS Overview and Incident Response Guide. July 2014

Take the NetFlow Challenge!

TDC s perspective on DDoS threats

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

FortiDDos Size isn t everything

DDoS Mitigation Techniques

Network Monitoring Comparison

Analysis of a DDoS Attack

Data Sheet. DPtech Anti-DDoS Series. Overview

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Technology Highlights Of. (Medusa)

Firewall Firewall August, 2003

Radware s Attack Mitigation Solution On-line Business Protection

DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Arbor s Solution for ISP

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Service Description DDoS Mitigation Service

Automate your IT Security Services

TELCO challenge: Learning and managing the network behavior

Security Toolsets for ISP Defense

Automated Mitigation of the Largest and Smartest DDoS Attacks

Gigabit SSL VPN Security Router

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

/ Staminus Communications

Denial of Service Attacks

SHARE THIS WHITEPAPER

APV9650. Application Delivery Controller

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

A Primer for Distributed Denial of Service (DDoS) Attacks

Acquia Cloud Edge Protect Powered by CloudFlare

QRadar Security Intelligence Platform Appliances

DDoS attacks in CESNET2

CloudFlare advanced DDoS protection

PROFESSIONAL SECURITY SYSTEMS

AntiDDoS1000 DDoS Protection Systems

IBM. Vulnerability scanning and best practices

Distributed Denial of Service protection

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Firewall Defaults and Some Basic Rules

Mitigating DDoS Attacks at Layer 7

Reducing the impact of DoS attacks with MikroTik RouterOS

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Introducing FortiDDoS. Mar, 2013

CaptIO Policy-Based Security Device

VALIDATING DDoS THREAT PROTECTION

Security Solutions for the New Threads

Quality Certificate for Kaspersky DDoS Prevention Software

NetFlow The De Facto Standard for Traffic Analytics

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

First Line of Defense

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Network Management Deployment Guide

Cisco IOS Flexible NetFlow Technology

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Open Source in Network Administration: the ntop Project

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Network Performance Monitoring at Minimal Capex

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Securing and Monitoring BYOD Networks using NetFlow

Introduction of Intrusion Detection Systems

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Monitoring high-speed networks using ntop. Luca Deri

NetFlow Tips and Tricks

Traffic Monitoring using sflow

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Cloud Security In Your Contingency Plans

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Check Point DDoS Protector

and reporting Slavko Gajin

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

DDoS Mitigation Solutions

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Transcription:

Cheap and efficient anti-ddos solution

Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2

About company Year of foundation - 2007 12 employees www.it-lab.md Partner of Cisco, Microsoft, Mikrotik System integration Solutions for enterprise and ISP networks Anti-DDoS solutions (Andrisoft, Switchray, Radware) Network construction (Cable and Wi-Fi) Software development (WEB, mobile apps, CRM) Network equipment (Cisco, Mikrotik, OEM) VoIP equipment and software (Cisco, Gaoke, Switchray, Digium, Asterisk, PBX, Call centers) Servers (Cisco) 3

Agenda Introduction to the DDoS attacks Anti-DDoS market players Situation in Moldova Our anti-ddos solution scheme and components Requirements, features and benefits 4

Introduction to DDoS DDoS Distributed denial-of-service Every day ~ 600 DDoS attacks Average daily bandwidth 200-300 Gbps Financial losses: 100-300k USD per attack - ~100 billions USD/year Cost of attack is low 50-500 USD/day DDoS types: SYN-flood TCP/UDP/ICMP-flood Reflection/Amplification (BGP, NTP, DNS) Etc. 5

6 Online DDoS map

Anti-DDoS solutions market players Company name Market share Solution or product name Arbor networks ~60% Peakflow, Pravail, Cloud Approx. cost 400k USD and more Radware ~20% DefensePro 100k USD and more Juniper ~4% DDoS Secure 100k USD and more Others ~16% 7

Moldavian anti-ddos reality Only 3.5 Millions people living in MD Market is too small ISPs, data-centers and other companies can t buy expensive anti- DDoS solutions Easiest way fully block attacked IP (packet filter, BGP black-hole) Bad influence on enterprise and government IT-resources Slow evolution of electronic services There are no professional anti-ddos solution providers in MD (already exists exception) 8

Accessible anti-ddos solution Software components: - Andrisoft WANGUARD/WANSIGHT - Linux (CentOS, Debian) - PF_RING kernel module Anti-DDoS SaaS clouds: - Trabia network - Voxility - etc Hardware components: - Servers (Cisco, HP, IBM, etc.) - Intel 82599-based 10Gbps network cards - network taps Smart guys 9

WANGUARD DDoS detection and mitigation solution 10

WANGUARD - features DDoS detection & mitigation (reaction in 5 secs), but it s not IDS/IPS Powerful reaction tools (BGP announcements, e-mails, scripts, etc) Detailed forensics (traffic samples, flows, reports) Advanced web console, flexible configuration Easy & fast scalability Real-time, historical and scheduled reporting Complex analytics (reports based on IP, AS, country, application, port, protocol, etc) Full network visibility and monitoring (netflow v5,7,9, sflow, jflow, ipfix, sniffing, etc) 11

WANGUARD - features Detects all bandwidth-related traffic anomalies: Distributed Denial of Service (DDoS) attacks, unknown volumetric DoS attacks NTP amplification attacks, generic UDP floods, ICMP floods, SMURF attacks SYN floods, TCP/UDP port 0, LOIC, peer-to-peer attacks, etc. Scans and worms sending traffic to illegal or unallocated addresses, missing traffic to critical services 12

WANGUARD - features Per-endpoint flexible threat reaction options: Activate WANGUARD Filter for DDoS attack mitigation Send remotely-triggered black hole announcements, BGP off-/onramp traffic diversion announcements Alert the NOC staff by email using user-defined email templates Send custom Syslog messages to remote log servers or SIEM systems Capture a sample of traffic for forensic investigation Extend the built-in capabilities with customized scripts that can access an easy-to-use API Provides traffic accounting reports and per-ip / subnet / IP Group graphs for each of the following traffic types: total, tcp, tcp+syn, udp, icmp, other, bad, flows, flows+syn, http, https, ssl, mail, dns, sip, ntp, rdp, snmp, ssh, ipsec, facebook, youtube, netflix, hulu, and more to come Generates tops and graphs for talkers, external IPs, IP groups, autonomous systems, countries, TCP or UDP ports, IP protocols, and more 13

WANGUARD web console 14

WANGUARD web console 15

WANGUARD web console 16

WANGUARD hardware requirements Sensor requirements Filter requirements 17

Intel 82599 chipset MSI-X - load balancing of packet flows between CPU cores Support of SM/MM fiber optic transceivers Hardware filtering based on IP/MAC Wire-speed routing 18

Cloud-based SaaS anti-ddos Bandwidth saturation problem in case of massive attacks GRE-tunnel / L2-tunnel to cloud provider Bandwidth up to 500Gbps WANGUARD can automatically redirect inbound traffic via anti-ddos cloud 19

Benefits of solution Cost up to 10-150 times cheaper than competing products Rich functionality Easy to change/add hardware independently from vendor Easy to integrate with existing network Scalability and performance in conjunction with accessible hardware Suitable and accessible for ISPs, enterprises (banks, etc) and government Legea 241/15.11.2007/ Art.20/al. 3/lit. C.??? accounting and storing of all processed IP flows (6-12 months and more) 20

What next? We can offer trial and demo We can analyze your case and calculate costs 21

Contacts Alexei Cioban ac@it-lab.md http://www.it-lab.md +373 69999975 22