Distributed Denial of Service protection



Similar documents
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Service Description DDoS Mitigation Service

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Automated Mitigation of the Largest and Smartest DDoS Attacks

DDoS Overview and Incident Response Guide. July 2014

FortiDDos Size isn t everything

Arbor s Solution for ISP

Automated Mitigation of the Largest and Smartest DDoS Attacks

Stop DDoS Attacks in Minutes

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

How Cisco IT Protects Against Distributed Denial of Service Attacks

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

A Layperson s Guide To DoS Attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

How To Block A Ddos Attack On A Network With A Firewall

Complete Protection against Evolving DDoS Threats

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

TDC s perspective on DDoS threats

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

How To Protect A Dns Authority Server From A Flood Attack

Security Toolsets for ISP Defense

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Stop DDoS Attacks in Minutes

Mimecast Security

Campus LAN at NKN Member Institutions

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

IxLoad-Attack: Network Security Testing

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

A Primer for Distributed Denial of Service (DDoS) Attacks

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

/ Staminus Communications

Being Ready to Face DDoS Challenge. Vodafone Power to you. DDoS

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

First Line of Defense

Acquia Cloud Edge Protect Powered by CloudFlare

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

How To Stop A Ddos Attack On A Website From Being Successful

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

CloudFlare advanced DDoS protection

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Seminar Computer Security

TLP WHITE. Denial of service attacks: what you need to know

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

VALIDATING DDoS THREAT PROTECTION

Cloud Security In Your Contingency Plans

Application DDoS Mitigation

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

First Line of Defense

DDoS Protection on the Security Gateway

Cheap and efficient anti-ddos solution

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

DDoS Mitigation Techniques

CS 356 Lecture 16 Denial of Service. Spring 2013

Modern Denial of Service Protection

Mitigating DDoS Attacks at Layer 7

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

Kaspersky DDoS Prevention

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

DDoS Attacks Can Take Down Your Online Services

Secure Cloud-Ready Data Centers Juniper Networks

Denial of Service (DoS) Technical Primer

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Modular Network Security. Tyler Carter, McAfee Network Security

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

On-Premises DDoS Mitigation for the Enterprise

Are you safe from DDoS attacks?

Cisco Remote Management Services for Security

Transcription:

Distributed Denial of Service protection

The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies and blocks the flow of malicious traffic while still letting legitimate data through so your business stays up and running. Why should you be concerned by DDoS attacks? Denial of service attacks have plagued network and data centre operations since the early days of the internet and unfortunately, leading industry experts such as Arbor Networks and Gartner agree that the world s DNS structure will continue to be exploited and attacks will continue to rise in frequency, complexity and size. It s no longer a problem for only major online organisations or gambling sites. A wide range of companies from retail to finance sectors increasingly depend on web-based transactions. Additionally, attackers require less specialised skills, meaning any user with hacktivist motives can launch an attack. The impact of a successful DDoS attack can be far-ranging and severe: potential for revenue running in to the millions to be lost during the attack business can be permanently lost service credit costs are incurred if service level agreements are violated your organisation s reputation is tarnished, sometimes permanently IT expenses rise sharply as you battle to bring the attack to an end. In addition, Financial Services Authorities are becoming more focused and aware of risks their members are exposed to in relation to IT security policies and also cyber threats. It is likely they will continue to encourage their members to adopt robust and commercially appropriate security protection systems which guarantee the availability of their IT and payments systems. It is the potential for reputational risk which lies at the root of this encouragement which demands greater awareness and good practice in the field of data and information security. What is Distributed Denial of Service (DDoS)? A DDoS attack is an attempt by a hacker to make computer resources unavailable, either temporarily or permanently to your intended user. Typically, a hacker will write a program and send it to thousands of agents or zombie hosts creating a botnet that will, upon the command of the hacker, simultaneously attack a target system. Besides consuming computational resources such as bandwidth, disk space or CPU time, a DDoS attack could also disrupt routing, damage other configuration information or reset TCP sessions which will all affect application performance and availability. Hackers could also disrupt physical network components or obstruct communication media between intended users, thereby preventing parties from communicating effectively. When this happens, this could bring down an electronic stock trading or gaming platform thereby wreaking a large amount of damage to the firm both financially, as well as destroying its reputation. DDoS attacks have increased in size and complexity. The average volumetric attacks (up 43% so far in 2013, over 2012) are now capable of saturating the internet connectivity of many businesses. All this means more companies are vulnerable to attack. So clearly, you need to take steps to protect your company from these risks.

Our solution Traditional Internet security measures such as firewalls, Intrusion Detection Systems (IDS) and antivirus software cannot stop or mitigate a malicious DDoS attack. Sure International s solution to mitigating the effects of a DDoS attack is based on a sophisticated multi-layer (both Onnet and above network) platform of industry leading Arbor Threat Mitigation Systems (TMS). This solution is designed specifically to provide the level of protection and security that our clients and networks need not only now but well in to the future. To maximise system performance we use a combination of a Sure owned dedicated on-net Arbor TMS systems, connected into a specialist partners above network Arbor TMS cloud system. A vital component of the Arbor TMS system is its ability to learn and to surgically remove DDoS attack traffic from our customers networks without disrupting key network or known (learnt) client services. It also provides comprehensive, real-time visibility into our network and applications so that we can proactively monitor and maintain service performance and our customers user or player experience even during an attack. We selected this solution following significant due diligence and a comprehensive tender process involving multiple industry-leading hardware and cloud based DDoS providers. To date we have around 15 major clients, mainly large igaming Operators, successfully using our solution for over 18 months, having moved from our (now retired) Cisco Riverhead systems which had been in service from 2005 to late 2011. How our multi-layer, multi-vendor DDoS protection works A key advantage of our distributed core IP network architecture is the integration of multiple dedicated Enterprise Class Distributed Denial of Service systems (DDoS - 2 x 10Gbps Arbor TMS systems). Deployed at our high bandwidth core network edge nodes in London and in Paris, our multiple Arbor Threat Mitigation Systems (TMS) together with backend PeakFlow Collector Portals (CP) and Service Portals (SP) deliver an incredibly robust and proven solution. The systems provide fully integrated on-net protection against malicious internet based attacks for all clients traversing our core IP networks via its multiple high capacity fibre gateways in London and Paris into Guernsey. In addition to core on-net Arbor TMS protection, should a malicious attack occur that exceeds the 2 x 10Gbps capacity of the Sure TMS platform, we have fibre cross connected our on-net DDoS systems into a specialist DDoS mitigation partners above network Arbor cloud based TMS platform at a scrubbing centre in the UK. This system is capable of mitigating and cleaning both higher (>20Gbps attacks) and also some more specialist targeted attacks before returning cleaned traffic directly to our network. A specialist 3rd Party Security Operation Centre (SOC) operates and manages our above network high capacity Arbor TMS based DDoS Cloud platform, providing supplementary multi-layer protection to our network. This multi-layer multi-vendor approach to DDoS protection offers a unique system designed to provide the best possible blend of on and above net DDoS detection, mitigation protection and resilience. A DDoS attack has a potential revenue loss of up to $1,495,134 PER HOUR for financial institutions. Source: Gartner Group

Specialist Platform Management The entire Sure DDoS platform, on-net and above-net, is managed by a team of 24x7x365 DDoS security specialists. Located at a dedicated Security Operations Centre (SOC) in the UK and contracted by Sure to monitor and support Sure s on-net Arbor TMS systems and above net Arbor TMS systems, SOC staff will be available 24x7x365 to support all our DDoS customers and to ensure that any DDoS mitigation, traffic profiling, DDoS platform and portal configurations are performed to the highest possible security standard. From years of experience we know that critical to the success of any DDoS platform is its management, which must be undertaken by specialist staff continually focused on DDoS detection and mitigation to be truly effective. The Sure SOC delivers this level of specialist skill, focus and support to all of our clients. Furthermore our Sure s own Network Operations Centre (NOC) is also available 24x7x365 to provide and coordinate any additional specialist DDoS, IP & Core Network support required, to issue proactive service notifications to clients and to ensure all customers have a dedicated single point of contact during any escalation around the clock. Internet 0.0.0.0/0 Tier 1 IP Transit Level 3 NTT Above Network DDoS Platform Level 3 NTT 10Gbps 10Gbps London Powergate London Global SW ARBOR Active 10Gbps TMS 3110 DDoS GSR 12000 AS8680 GSR 12000 Paris Global SW ARBOR Standby 10Gbps TMS 3110 DDoS Carrier resillience (VTL) West (CWW) Carrier resillience (VTL) East (CWW) East (MEA) Hugo North Hugo North Hugo South Hugo East IOM On Net Sure On Net CIEG Fibre IOM ASR IOM ASR DC5 ASR Core Director Mesh DC2 ASR Jersey ACR Jersey ACR IOM On Net Jersey PoP 1 Jersey PoP 2 IOM PoP (Douglas) IOM PoP Casltetown DC7 6500 DC1 6500 DC4 6500 DC6 6500 Pan - CI DWDM & MPLS MPLS Core Centenary House Campus Guernsey Management Network DDoS System & 24 x 7 x 365 NOC Guernsey Mesh Exchange

Platform Protection Summary Key Features Automated and manual protection is available via the platform. High alerts that the platform can detect and mitigate include but are not limited to: DDoS Attacks (TCP, UDP, ICMP, Spoofed SYN Flood, Non-Spoofed SYN Flood, UDP Flood, FIN, SYNACK Flood, (Spoofed and Non Spoofed SYN Flood), PING flood, Smurf Flood or Combined UDP/TCP/ICMP etc). Fragmentation attacks such as IP/UDP, IP/ICMP, IP/TCP HTTP Attacks such as a connection flood, (client attack) HTTP errors 404 etc. http Half connections BGP attacks DNS attacks Signature based anomalies Netflow loss SNMP loss / BGP loss / Physical Link failure & Client specific alerts 2 x 10Gbps mitigation deployed at high bandwidth gateway - Sure Network Edge nodes in London and in Paris Industry leading Arbor On-net and above-net protection and mitigation systems (Arbor Threat Management Systems (TMS), Arbor Collector Portal (CP) & Arbor Service Portal (SP) ) Real time customer portal access Specialist 24x7x365 Security Operations Centre (SOC) 24x7x365 Sure Network Operations Centre (NOC) Sure is also a member of the Arbor Network s DDoS Global Finger Print Alliance sharing and receiving attack mitigation profiles and traffic ranges with other carrier members enables Sure to proactively protect and to block globally monitored attack profiles and specific DDoS BOT IP addresses before they reach or are used to target Sure clients. Statistics on size, frequency and costs of DDOS attacks taken from papers by Arbor Networks

Guernsey Centenary House La Vrangue St Peter Port Guernsey GY1 2EY 01481 757757 www.sure.com Jersey Richmond House 8 David Place St Helier Jersey JE2 4TD 01534 888291 Isle of Man 2nd Floor 14 Athol Street Douglas Isle of Man IM1 1JA 01624 692222