Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.



Similar documents
Arbor s Solution for ISP

Pravail 2.0 Technical Overview. Exclusive Networks

Security Solutions for the New Threads

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes

The Risk vs. Cost of Enterprise DDoS Protection

SecurityDAM On-demand, Cloud-based DDoS Mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Being Ready to Face DDoS Challenge. Vodafone Power to you. DDoS

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Cloud Security In Your Contingency Plans

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

TDC s perspective on DDoS threats

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

Distributed Denial of Service protection

WHITE PAPER Hybrid Approach to DDoS Mitigation

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

FortiDDos Size isn t everything

How To Block A Ddos Attack On A Network With A Firewall

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

On-Premises DDoS Mitigation for the Enterprise

CALNET 3 Category 7 Network Based Management Security. Table of Contents

A Layperson s Guide To DoS Attacks

How To Mitigate A Ddos Attack

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Securing Your Business with DNS Servers That Protect Themselves

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

DDoS Overview and Incident Response Guide. July 2014

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

Stop DDoS Attacks in Minutes

Complete Protection against Evolving DDoS Threats

How To Protect A Dns Authority Server From A Flood Attack

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Service Description DDoS Mitigation Service

DDoS Attacks Advancing and Enduring: A SANS Survey

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

McAfee Network Security Platform

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Arbor Networks DDoS Solutions. Alex Lopez

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

First Line of Defense to Protect Critical Infrastructure

Safeguard Your Internet Presence with Sophisticated DDoS Mitigation

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Business Case for a DDoS Consolidated Solution

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Advantages of Managed Security Services

The Expanding Role of Service Providers in DDoS Mitigation

VALIDATING DDoS THREAT PROTECTION

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

Four Steps to Defeat a DDoS Attack

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

How Cisco IT Protects Against Distributed Denial of Service Attacks

Securing Your Business with DNS Servers That Protect Themselves

Transcription:

Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1

Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology Overview Recent DDoS Attacks in India TCL DDoS Service World s largest ISP deployment Q&A 2

DDoS Why Should Financial Companies Care A DDoS attack can (and will) Cause substantial revenue loss due to system downtime Reduce customer confidence Leave systems vulnerable for hacking exploits Prevention Is Easier Than The Cure! RBI s Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds mandates the deployment of systems for DDoS mitigation RBI/ 2010-11/ 494 DBS.CO.ITC.BC.No. 6/31.02.008/ 2010-11 April 29, 2011 3

Industry Trends Operational & Security Threats DDoS attacks cost an average enterprise $6.3M* for a 24-hour outage * McAfee, January 2010 4

DDoS Attack Trend Increased Volume Largest volumetric DDoS has grown from 9 to 100 Gbps in 5 years Increased Complexity Over quarter of attacks are now application-based DDoS mostly targeting HTTP, DNS, SMTP Increased Frequency More than 50% of data center operators are seeing more than 10 attacks per month 5

The Evolution of DDoS Attacks Other IRC SIP/VOIP HTTPS SMTP DNS HTTP Services Targeted by Application Layer DDoS Attacks 7% 11% 19% 24% 25% 67% 87% Have You Experienced Multi-vector Application / Volumetric DDoS Attacks 32% 41% 27% Don't Know No Yes 0% 20% 40% 60% 80% 100% 50% 40% 30% 20% 10% 0% Number of DDoS Attacks per Month 9% 47% 15% 7% 10% 11% 0 1-10 10-20 20-50 50-100 100-500 1% > 500 2000 1500 1000 500 0 Average Monthly Mbps of Attacks 1843 6

The Evolution of DDoS Attacks Other IRC SIP/VOIP 50% 40% 30% 20% 10% HTTPS Services Targeted by Application Layer DDoS Attacks 7% 11% 19% 24% Have You Experienced Multi-vector Application / Volumetric DDoS Attacks SMTP 25% No DNS protection technologies. The 67% threats that increased continued 41% to be multivector Yes HTTP approaches for reconnaissance, 87% attack, and command and control. The most serious 0% 20% attacks 40% have 60% been 80% targeted 100% ones using evasive malware techniques, with 0% During 2011, an increase in threats and attacks has challenged infrastructure some customized for the target enterprise. These attacks are primarily financially motivated. 2011 also saw an increase in large-scale nuisance attacks. Source: Number Gartner, of DDoS Hype Attacks Cycle for per Infrastructure Protection Average 2011 Monthly Mbps of Attacks 2000 Month 9% 47% 15% 7% 10% 11% 0 1-10 10-20 20-50 50-100 100-500 1% > 500 1500 1000 500 0 32% 27% 1843 Don't Know 7

DDoS Misconceptions Successful DDoS Attacks My firewall/ips provides DDoS protection I have enough bandwidth to absorb DDoS attacks No one would want to attack my business. FACT FACT FACT Most large data center operators have seen their firewalls/ips fail due to DDoS Multigigabit attacks are common and can overwhelm the largest networks Most data centers suffer downtime every year due to DDoS. Did Your Firewall/IPS Fail Due to DDoS Within Last 12 13% 38% 49% No Yes Largest Attack in 150 Gbps 100 50 0 0.14 1.2 2.5 10 17 24 Source: Arbor Worldwide Infrastructure Security Report 40 49 100 60 Rent a botnet for as little as $50 per day 8

The Broad Impact of DDoS Attacks Modern DDoS Attacks are Complex & Diverse IPS Load Balancer DATA CENTER Attack Traffic Good Traffic (1) saturation upstream, (2) state exhaustion, or (3) service outages critical services are no longer available! 9

Today s Defenses Are Not Designed for DDoS Existing perimeter security devices focus on integrity and confidentiality but not on availability Firewalls including WAFs help enforce confidentiality or that information and functions can be accessed only by properly authorized parties Information Security Triangle IPS Intrusion Prevention Systems (IPS) help enforce integrity or that information can be added, altered, or removed only by authorized persons All firewalls and IPS are stateful devices which are targeted by state-based DoS attacks from botnets! DATA CENTER IPS Load Balancer 10 10

IPS choke during DDoS attack - IPS does not offer protection from DDoS. - IPS one of the prime targets of DDoS attack - weakest link in chain. - IPS blocks traffic but does not mitigate DDoS attacks. 11

DDoS Attacks in India - News 2012 12

DDoS Attacks on BFSI segment in India - Many banks, mutual funds, credit rating agencies, etc. have faced multiple DDoS attacks in last 1 year - Most DDoS attacks have been on website which have direct impact on revenue or reputation of the organization - Cert-in and RBI have issued guidelines for banks to take DDoS protection - Many leading private sector banks in India have already taken DDoS services from Tata Communications 13

Our Customers Leading Mutual Fund Company in India - Customer s website got DDoS attack at 6:00 pm on a Friday. The attack size was multiples times bigger than Internet port size - Website went down immediately. End users could not access the website - Within a couple of hours Tata Communications implemented DDoS protection in the cloud - Customer website was up and running again Protecting Formula 1 Service turned up in ~24 hours! Tata-protected F1 Bahrain assets, withstood DDoS attacks throughout the race weekend. "Their rapid response and technology solution were most impressive. In an incredibly short time Tata Communications had the service up and running and within 24hrs we were protected - Eddie Baker, CIO, Formula 1 14

Enterprise Services under DDoS Attacks DNS, HTTP attacked : Ports cannot be blocked. DDoS Preferred Choice of attack for hackers ANY WHERE ANY TIME ANY TYPE ANY NUMBER OF TIMES 15

Global Network Largest ISP DDoS Service TGN-Northern Europe TGN-Pacific TGN-Atlantic TGN-Western Europe TGN-EurAsia* TGN-Pacific TIC TGN-Intra Asia Largest ISP DDoS Deployment 16

DDoS : Advantages of Cloud Mitigation DDoS Attacks DDoS Attacks DDoS Mitigation in the Cloud 17

Comprehensive DDoS protection CPE + Cloud Internet SCRUBBING CENTER Peakflow SP/TMS Cloud Signalin g DATA CENTER Cloud-based DDoS Protection ISP Firewall IPS Load Balancer Internet CPE-based DDoS Protection Target Applications & Services 18

DDoS Detection & Mitigation Process Customer Premise Customer Server DDoS Attack Normal Traffic Internet End Users NetFlow Remove attack in the Internet Cloud DDoS Scrubbing Farm Advanced Protection No CAPEX or software in customer premise 19

Our DDoS Detection & Mitigation Service Features World s largest deployment of detection and mitigation capabilities Network-based service addresses distributed threats at the network edge Scrutinizes traffic in real-time to identify anomalies Only malicious traffic is blocked legitimate traffic continues to flow so network and applications remain available Benefits Improves traditional fault resolution procedures with real-time monitoring and alerting Lower Cost of Ownership (TCO) and greater efficacy than premise-based solutions Protect Internet application availability without costly over-provisioning of IP 20

Tata and the Arbor Networks Advantage Tier-1 ISP with Cloud DDoS Service Globally Distributed DDoS Scrubbing Capabilities Extensive Experience in DDoS Attack Management Securing online business availability with SLA Assurance Global 24x7 Security Operations Centers with Arbor Security Intelligence Botnet Attack Fingerprints Updated Threat Descriptions Country -> IP Updates ASERT Attack Risk Settings Inbound HTTP Botnet Attacks ASERT Severity Levels IP Location Data Cloud and CPE DDoS Comprehensive & Seamless DDoS protection 21

Thank You Sumit Narula Cell +91-9711003705 Email sumit.narula@tatacommunications.com Samuel Sathyajith Cell +91-9845430169 Email ssathyajith@arbor.net