DDoS attacks and Cyber-threats Common Misconceptions, Uncommon Defense What s your First Line of Defense?



Similar documents
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Understanding and Defending Against the Modern DDoS Threat

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

On-Premises DDoS Mitigation for the Enterprise

Corero Network Security plc

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

First Line of Defense to Protect Critical Infrastructure

WHITE PAPER Hybrid Approach to DDoS Mitigation

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

First Line of Defense

Corero Network Security First Line of Defense Executive Overview

First Line of Defense

How To Block A Ddos Attack On A Network With A Firewall

SecurityDAM On-demand, Cloud-based DDoS Mitigation

TDC s perspective on DDoS threats

Stop DDoS Attacks in Minutes

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

How To Protect A Dns Authority Server From A Flood Attack

Acquia Cloud Edge Protect Powered by CloudFlare

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Cloud Security In Your Contingency Plans

Stop DDoS Attacks in Minutes

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

FortiDDos Size isn t everything

Cheap and efficient anti-ddos solution

CloudFlare advanced DDoS protection

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

A Layperson s Guide To DoS Attacks

VALIDATING DDoS THREAT PROTECTION

DDoS Overview and Incident Response Guide. July 2014

Automated Mitigation of the Largest and Smartest DDoS Attacks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

DDoS Attacks Can Take Down Your Online Services

How To Mitigate A Ddos Attack

Securing Your Business with DNS Servers That Protect Themselves

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Networking for Caribbean Development

10 Things Every Web Application Firewall Should Provide Share this ebook

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

How Cisco IT Protects Against Distributed Denial of Service Attacks

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

The Expanding Role of Service Providers in DDoS Mitigation

Practical Advice for Small and Medium Environment DDoS Survival

co Characterizing and Tracing Packet Floods Using Cisco R

RETHINK SECURITY FOR UNKNOWN ATTACKS

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Protect Yourself From A Dos/Ddos Attack

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

End-to-End Application Security from the Cloud

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

A Primer for Distributed Denial of Service (DDoS) Attacks

Unified Security, ATP and more

Hope is Not a Strategy

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

Four Steps to Defeat a DDoS Attack

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

SECURING APACHE : DOS & DDOS ATTACKS - II

ADC Survey GLOBAL FINDINGS

Akamai Cloud Security Solutions:

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

Check Point DDoS Protector

CS 356 Lecture 16 Denial of Service. Spring 2013

Corero Network Security

Application DDoS Mitigation

McAfee Network Security Platform

Breaking the Cyber Attack Lifecycle

Agenda , Palo Alto Networks. Confidential and Proprietary.

Next-Generation Firewalls: CEO, Miercom

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Transcription:

DDoS attacks and Cyber-threats Common Misconceptions, Uncommon Defense What s your First Line of Defense? Nirav Shah, Director of Product Management Corero Network Security

Presenter and Session Agenda Nirav Shah, Director of Product Management Nirav oversees strategy and roadmap development for Corero's network security products and solutions. He is a 20-year veteran in the networking industry with a unique blend of product management, business development and engineering experience. In the past, Nirav has held product management, engineering leadership, and technical roles in large networking and software companies (Alcatel-Lucent, Bay Networks, Mercury, BMC) as well as venture-backed startups (Xedia, Reva Systems). He is a co-holder of a US patent in configuration and management of RFID systems (patent no. 7,567,179). http://www.linkedin.com/in/niravshah nirav.shah@corero.com Agenda Today s DDoS threat landscape Who is behind them and what is at risk? Demystifying common misconceptions and misnomers about DDoS Demonstrations and defense mechanisms 2

Today s DDoS Threat Landscape

There s No Shortage of Headlines Dirt Jumper DDoS Toolkit Gets Security Evasion Functionality DDoS Attacks Pulling Attention Away from Bank Cyberheists DDoS is Back; 3 Banks Attacked Verizon report: DDoS is a threat to every business sector WordPress Sites Attacked; May Be Prep for DDoS Barrage The largest DDoS attack didn't break the internet, but it did try Bank Attackers Restart Operation Ababil DDoS Disruptions Cyber attack stops access to JPMorgan Chase site Gartner: One in Four DDoS Attacks in 2013 Will Be Application-Based DDoS Attack on Bank Hid $900,000 Cyberheist Survey Reveals That Most Americans Are Uninformed About DDoS Attacks Historic DDoS Attacks Against Major U.S. Banks Continue Automated Toolkits Named in Massive DDoS Attacks Against U.S. Banks US firms over-reliant on firewalls to defend against DDoS attacks DDoS attackers turning to simple server booster scripts The largest DDoS attack didn't break the internet, but it did try

Who is an attack target? Industry Doesn t Matter Financial Retail MFG Services 5 *Verizon 2013 Data Breach Investigations Report

Who is an attack target? Company Size Doesn t Matter SMALL LARGE 6 *Verizon 2013 Data Breach Investigations Report

Who is Attacking and Why? Attack Motives Have Increased Over Time Hacker/Crackers Cyber Criminals Cyber Armies Cyber Terrorist Cyber Hacktivist Notoriety Profit ($) Politics Fear Agenda 7 2013 Corero www.corero.com

What Are The Repercussions? Lost Business, Brand Damage, Threat Exposure, Customer Attrition Damage occurs immediately Recovery takes days to weeks 8 *Verizon 2013 Data Breach Investigations Report 2013 Corero www.corero.com

What is the Real Cost of DDoS? How much will your business lose if your site went down for an hour? What is the manpower cost of figuring out the attack and mitigating it? What will it cost for you to clean up after the attack? Industry Impact of Unplanned Downtime Source Banking Online Retail Gaming In April 2013, Wells Fargo lost $30K per minute due to a DDoS attack During June 2010, Amazon.com lost an estimated $1.75M in a single hour of downtime Earlier in 2013, a sustained DDoS attack on SG Interactive cost its gaming customers 12 hours of downtime Dark Reading Data Center Knowledge Network World Average downtime due to DDoS attacks is 54 minutes Average cost of this downtime is $22,000/minute Source: Ponemon Institute 9 2013 Corero www.corero.com

Common Misconceptions Myth: There is only type of DDoS attack Reality: DDoS attacks come in all shapes and sizes

DDoS Digital Attack Map Google - http://www.digitalattackmap.com/ 11 2013 Corero www.corero.com

Categories of Attacks and Cyber-threats Attack Traffic comes in all Shapes and Sizes Network Level DDoS Attacks Reflective DDoS Attacks Outbound DDoS Attacks Application Layer DDoS Attacks Specially Crafted Packet Attacks Pre- Attack Recon (Scans) Advanced Evasion Techniques (AET) Other Unwanted Traffic Defense Defense Defense Defense Defense Defense Defense Defense IP Threat- Level Assessment Stateful Flow Awareness Bi-Directional Flood Detection Behavior Analysis Protocol Analysis Scan Obfuscation Advanced Evasion Detect Deep Packet Inspection Your Web Presence 12 2013 Corero www.corero.com

Network Flood Classic DDoS Attack Legitimate users complete the normal TCP 3-way handshake Legitimate User SYN SYN ACK ACK Web Servers Hping3 Attackers send repetitive SYNs without sending ACKs Internet Attacker 1000s of SYNs 1000s of SYN ACKs Web Servers Customer Traffic Customer Traffic Customer Traffic Botnet of attackers overload the servers essentially making legitimate customer transactions impossible 13

Application Layer Attacks HTTP Floods HTTP Flood remains the most popular type of attack (80%) Attackers simultaneously sending a large number of HTTP requests to the site being attacked Popular tools are Low Orbit ION Cannon (LOIC) and High Orbit ION Cannon (HOIC) Low Orbit ION Cannon High Orbit ION Cannon www.yoursite.com 14

15

Some Application Attack Examples Home Page, Home Page, Home Page, Home Page, Cached content, easiest to serve, most common click. Login attempt, user=johndoe, pw=letmein Dynamic lookup on back-end server (encryption) Forgot my password, email=johndoe@anybank.com Backend CGI, email generation (spam) Home Page Search (keyword 1) (keyword 2) Repeat forever, ties up site search database Stock Quote Lookup (quote 1) (quote 2) (quote 3) Request Information - Download PDF guide (repeat) 16

Sample of Attack Tools & Demonstration Hping3 NMAP Low Orbit ION Cannon www.yoursite.com TCP SYN Floods Pre-Attack Recon HTTP & DNS Floods High Orbit ION Cannon KillApache.pl Slowloris Booster Scripts HULK High Memory Consuming Metasploit Low & Slow Resource Hog Dirt Jumper Randomized HTTP Attacks TCP SYN Floods Security Evasion 17

Attacks from Mobile Devices? Can you launch a Denial of Service Attack from a Mobile Phone? YES! Nearly Any Device with an IP address can be used to Launch an Attack. Low Orbit Ion Cannon for Droid Where can you download LOIC for Android? https://play.google.com/store/apps/details?id=l.o.i.c&feature=search_result#?t=w251bgwsmswyldesimwuby5plmmixq 18

Real World Attack Example

Spamhaus Attack DNS Amplification Attackers control a botnet of 1000s of computers Open resolvers respond with a much larger message than originally requested Each computer pretends to be Spamhaus and sends DNS requests to an open resolver Spamhaus is flooded with 300Gbps of traffic and cannot handle legitimate traffic http://www.nytimes.com/interactive/2013/03/30/technology/how-the-cyberattack-on-spamhaus-unfolded.html 20 2013 Corero www.corero.com

Anatomy of a Successful DDoS Attack Today s sophisticated DDoS Attackers will: 1. Footprint (profile) the Web Presence 2. Scan the infrastructure and Web resources 3. Initiate network-level volumetric attack 4. Test if Web Presence is impacted 5. Maintain Flood spoof all source IPs 6. Initiate low-and-slow application attacks 7. Initiate specially-crafted packet attacks 8. Initiate DNS reflective/amplified attacks 9. Attempt to exploit (compromise) downstream servers 10.Simultaneously launch as many types of attacks as possible.not relent or subside they stand very firm in their resolve A combined attack simply increases the chance of success! 21 2013 Corero www.corero.com

Are You Ready For Today s Attacks? What s Your First Line of Defense?

Common Defense Misconceptions Myth: Firewalls protect against DDoS attacks Reality: Open firewall ports are DDoS entry points

Firewall Locked down: No Service Access Internet Unwanted Traffic Buffer Overflows Internal Network Application Layer DDoS Code Injections 24 Brute-Force Password Specially Crafted Packets Inbound Service Requests Blocked by firewall 2013 Corero www.corero.com Firewall has no inbound holes open

DDoS Entry Points - Open Firewall Ports Attacks pass right through open firewall ports which are intended to allow access to legitimate users Firewall NGFW Services Web TCP Ports 80, 443 Good Users Internet DNS TCP/UDP Port 53 Router Attackers All Firewalls work the exact same way! Mail TCP Port 25 FTP/SSH TCP Ports 21, 22 Firewalls/NGFWs do not protect against DDoS attacks 25 2013 Corero www.corero.com

New Security Solutions are Required Firewalls don't cut it anymore as the first line of defense IT Best Practices Alert By Linda Musthaler, Network World October 19, 2012 Among the key barriers impacting banks' ability to deal with DDoS attacks, 50% cited insufficient personnel and expertise and a lack of effective security technology as the most serious concerns, followed by insufficient budget resources. A Study of Retail Banks & DDoS Attacks - Ponemon Institute January, 2013 By Linda Musthaler, Network World - January, 2013 Don't count on a firewall to prevent or stop a DDoS attack. The first step is to recognize that your firewall is insufficient protection against the types of DDoS attacks that are increasingly common today. Even a nextgeneration firewall that claims to have DDoS protection built-in cannot deal with all types of attacks. The best protection against DDoS attacks is a purpose-built device or service that scrutinizes inbound traffic before it can hit your firewall or other components of the IT infrastructure. While network security devices have matured and are extremely capable of thwarting certain attacks, they are insufficient when it comes to mitigating DDoS attacks. Distributed Denial of service (DDos) attacks: evolution, impact & solutions - VeriSign 26 2013 Corero www.corero.com

DDoS Defense More than a Checkbox Caution: Many security devices claim to have DDoS Protection Most have a single configuration = DDoS On/DDoS Off Ensure that your DDoS defenses can: Provide granular DDoS configurations (policies) Defend against all known DDoS attack vectors Handle the load while under DDoS attack Cannot be DDoS ed itself as part of a DDoS attack Provide access to 24x7 DDoS defense Support Services

What s The Recommendation?

Gartner: Best Practices - Mitigating DDoS Attacks Ensure That Business Continuity/Disaster Recovery and Incident Response Plans Address Planning-for and Response-to DDoS Evaluate ISP "Clean Pipe" Services Evaluate DDoS "Mitigation as a Service" Options Deploy DDoS Detection and Mitigation Equipment on Premises Why does Gartner mention on-premises defenses? On-premises defenses can defeat the broadest spectrum of attacks 24x7! Hybrid Anti-DDoS Cloud + On-Prem Makes the Most Sense 29 2013 Corero www.corero.com

On-Premises DDoS Mitigation Enterprise s new First Line of Defense filters out DDoS attacks and cyberthreats and allows in genuine traffic Firewall NGFW Services Good Users Internet Web TCP Ports 80, 443 DNS TCP/UDP Port 53 Router Attackers Mail TCP Port 25 First Line of Defense FTP/SSH TCP Ports 21, 22 On-premises DDoS Mitigation provides always-on protection and ensures maximum business continuity 30 2013 Corero www.corero.com

Hybrid anti-ddos: On-Premises + Cloud Good Users Good Traffic First Line of Defense On-Premises anti-ddos Always on Attackers DDoS Attacks & Cyber-threats X Full Pipe Attacks Volumetric Attacks X Cloud anti-ddos On demand An always-on on-premises DDoS Defense combined with on-demand cloud-based mitigation provides comprehensive protection & visibility X Encrypted Attacks Protected Critical Infrastructure 31 2013 Corero www.corero.com

Key Steps of Protection Allow only EXPECTED traffic Evaluate AMOUNT of traffic Enforce CORRECTNESS of traffic 1 2 Ethernet IP TCP HTTP Server Side Exploits Advanced Evasions 3 Good Traffic Analyze INTEGRITY of traffic 4 5 Provide VISIBILITY into unwanted traffic Who is attacking, at what rate, and using what attack vectors? 32

Defense-in-Depth Security Solution Landscape Corero stops more attacks and threats than competitor s DDoS products (based on customer tests conducted with Corero) Intelligence Cloud Security as a Service First Line of Defense Firewall NGFW IPS/APT SLB/WAF Service Analytics SIEM Big Data Internet IPS/APT Router SLB WAF Webroot McAfee Symantec Kaspersky Neustar Prolexic Akamai Arbor Corero Radware Arbor Checkpoint Palo Alto Fortinet Juniper Cisco Sourcefire Fortinet IBM HP F5 Fireeye SilverTail Trusteer Acertify ArcSight Splunk Q1 Labs 33 2013 Corero www.corero.com

Thank You For more information please contact us at info@corero.com