Arbor s Solution for ISP

Similar documents
Security Solutions for the New Threads

Pravail 2.0 Technical Overview. Exclusive Networks

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

TDC s perspective on DDoS threats

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Being Ready to Face DDoS Challenge. Vodafone Power to you. DDoS

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Automated Mitigation of the Largest and Smartest DDoS Attacks

Distributed Denial of Service protection

Service Description DDoS Mitigation Service

Arbor Networks DDoS Solutions. Alex Lopez

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Securing Your Business with DNS Servers That Protect Themselves

How To Protect A Dns Authority Server From A Flood Attack

DDoS Protection on the Security Gateway

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Application DDoS Mitigation

Acquia Cloud Edge Protect Powered by CloudFlare

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

CloudFlare advanced DDoS protection

How To Block A Ddos Attack On A Network With A Firewall

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

DoS/DDoS Attacks and Protection on VoIP/UC

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

CS 356 Lecture 16 Denial of Service. Spring 2013

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Cloud Security In Your Contingency Plans

Complete Protection against Evolving DDoS Threats

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

DDoS Overview and Incident Response Guide. July 2014

Automated Mitigation of the Largest and Smartest DDoS Attacks

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Networking for Caribbean Development

FortiDDos Size isn t everything

VALIDATING DDoS THREAT PROTECTION

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Network Performance Monitoring at Minimal Capex

Securing Your Business with DNS Servers That Protect Themselves

DDoS Mitigation Techniques

VERISIGN DDOS PROTECTION SERVICES IN-THE-CLOUD SOLUTION FOR SCALABLE, RELIABLE, AND FLEXIBLE DDOS MONITORING AND MITIGATION

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Zero-Day Attack Finding Advanced Threats in ALL of Your Data. C F Chui, Arbor Networks

Radware s Attack Mitigation Solution On-line Business Protection

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

How To Stop A Ddos Attack On A Website From Being Successful

Analysis of a DDoS Attack

/ Staminus Communications

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

A Primer for Distributed Denial of Service (DDoS) Attacks

Four Steps to Defeat a DDoS Attack

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

IxLoad-Attack: Network Security Testing

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

The Hillstone and Trend Micro Joint Solution

First Line of Defense

Firewall Firewall August, 2003

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

How Cisco IT Protects Against Distributed Denial of Service Attacks

CS5008: Internet Computing

INSERT COMPANY LOGO HERE

Cheap and efficient anti-ddos solution

Stop DDoS Attacks in Minutes

On-Premises DDoS Mitigation for the Enterprise

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Transcription:

Arbor s Solution for ISP

Recent Attack Cases

DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard attacked Techwatch weathers DDoS extortion attack Greater Availability of Botnets Better Bots Easy Access More infected PCs with faster connections Using web 2.0 tools to control botnets Commoditized Cloud-based botnets, cheaper more attacks Increased Volume Increased Complexity Increased Frequency Largest volumetric DDoS has grown from 9 to 100 Gbps in 5 years Over 25% of attacks are now application-based DDoS mostly targeting HTTP, DNS, SMTP >50% of data center operators experience >10 attacks per month Largest single DDos Attack Observed per Year in Gbps Largest 7 DDos Attacks Against IDC Average Number of DDos Attacks per Month 4

Arbor Network

Who is Arbor Networks? A Trusted & Proven Vendor Securing the World s Largest and Most Demanding Networks 90% 105 43+ Tbps #1 12 Percentage of world s Tier 1 service providers who are Arbor customers Number of countries with Arbor products deployed Amount of global traffic monitored by the ATLAS security intelligence initiative right now 25% of global Internet traffic! Arbor market position in Carrier, Enterprise and Mobile DDoS equipment market segments 61% of total market [Infonetics Research Dec 2011] Number of years Arbor has been delivering innovative security and network visibility technologies & products 6 $16B 2011 GAAP revenues [USD] of Danaher Arbor s parent company providing deep financial backing

Sampling of Arbor s Customers vodaphone * These customers have given Arbor Networks authorization to use their names publicly. Over 300 customers use Peakflow SP & TMS today.

ASERT Arbor Security Engineering Research Team

Malware Analysis Example CnC For ATF/Peakflow SP: study bot-to-cnc traffic to alert on infected clients Bot/CnC comms For AIF/Pravail: study bot-to-victim DDoS traffic to distinguish legit web requests from HTTP flood requests Victim Web Server New Malware Specimen ASERT Sandbox HTTP Flood traffic

Arbor DDoS Solution

12 DDoS Attack? It WILL Happen

300Gbps of DDoS Attack!!

The DDoS Attack Surface Any part of your network or services that is vulnerable to an attack Network Interfaces Infrastructure Firewall/IPS Servers Protocols Applications Databases Attackers will find the weakness 14

The Broad Impact of DDoS Attacks Modern DDoS Attacks Are Complex & Diverse IPS Load Balancer DATA CENTER Attack Traffic Good Traffic Today s DDoS attacks can cause (1) saturation upstream, (2) state exhaustion, or (3) service outages many times a single attack can result in all three and all with the same end result: 15 critical services are no longer available!

Stopping Volumetric Attacks ISP 1 SCRUBBING CENTER Peakflow SP/TMS Cloud-based DDoS Protection DATA CENTER ISP 2 ISP Firewall IPS Load Balancer ISP n Cloud-based: Volumetric DDoS mitigation must be done up stream, before traffic gets to Data Center Activated on demand : only active when an attack is detected or reported 18

How it all works? (Peakflow SP/TMS)

Step 1: Have Visibility (x-flow based) Service Provider s Core Arbor Peakflow CP Peering Point POP Mobile Subscriber Network Core Router Peering Point POP Enterprise A Targeted Enterprise B

Comprehensive Dashboards

Traffic & Application Network: Top peers, ASNs, Countries, Cities Applications, Fingerprints, Growth Application: Customers, Ports, Peers, Markets Customer: Applications, Peers, Fingerprints, Markets, Alerts Router: Per router stats, Top Interfaces, Applications, Customers Benefits Better informed, more timely operations management

Cost Optimized Peering and Transit Transit reports Peer traffic exchange reports Peering what if analysis Interface reports Source and Destination Analysis Where is traffic going when it comes IN? Where has traffic come from when it goes OUT? How much in transit costs is customer A costing me? How much money will I save if I peer with XYZ? View where your customers traffic is truly destined Make intelligent decisions about peering expansions Assure that existing peering agreements are being used to their full potential Ensure that transit customers are abiding by service agreements like no-resell agreements

Global Geography Reporting Reports and tracking by country, region, city Track threat sources Country baselines and alerts Allow, drop, shape traffic based on country Identify growth markets Measure service usage by city A New Dimension of Network Intelligence Benefits Better threat response Better market analysis Better planning

Service Visibility Measure application usage Track Key Performance Indicators (KPIs): Jitter latency RTT 90 predefined applications Customer defined applications Top URL reports VoIP call reports Comprehensive DNS reports Real-time packet visibility Alerts on service changes Track baseline service levels Benefits Identify and address problems before users start to complain Reduce help desk calls Better business and operations planning

Subscriber Visibility Identify infected subscribers Track # of infected subscribers Track individual and aggregate subscriber traffic Identify top markets (IP Location cities) Identify top applications, top ports Protection and reporting for mobile and fixed networks Benefits Keep malicious traffic off the network Protect subscribers Serve markets better

The Attack Service Provider s Core Peering Point Arbor Peakflow CP Core Router 1- Detect POP 2 - Activate Mobile Subscriber Network Peering Point Surgical Mitigation Center POP 3 Divert only target s traffic Enterprise A Targeted Enterprise B

The Mitigation Service Provider s Core Arbor Peakflow CP Peering Point Arbor Peakflow CP POP Mobile Subscriber Network Core Router Peering Point 5 Forward the legitimate: GRE, MPLS, Surgical Mitigation Center POP Enterprise A Targeted 4 Identify and filter the malicious Enterprise B

Multiple Countermeasures for Multiple Attacks Vulnerability Exploits Generic Flood Attacks Fragmentation Attacks Application Attacks TCP Stack Flood Attacks Static & Dynamic Packet Filters Anti-Spoofing Mechanisms Baseline Enforcement Botnet screening Layer 7 Protections Rate-limiting

Service and Application Layer Protection HTTP / Web 2.0 Protection Block malformed HTTP Rate-limit HTTP requests Stop click fraud Stop low and slow attacks SSL Protection Neutralize SSL signaling protocol attacks VoIP Protection Block malformed SIP packets SIP request limiting DNS Protection DNS Regular Expressions (RegEx) DNS Authentication/Anti-Spoofing DNS Query Rate Limiting DNS Non-Existent Domain (NXDOMAIN) Rate Limiting DNS Reporting and Packet Sampling IP-based Protection Packet scrubbing (TCP / UDP/ ICMP) TCP Connection reset White list / black list Benefits Protect business critical applications from targeted attacks

Arbor s Unique Solution The Solution to Stop Advanced Threats Built on Global Network Visibility & Security Intelligence Global & Enterprise Visibility Know Your Network No Matter Where It Resides Security Intelligence Find the Threat No Matter Where the Threat Lurks Availability Protection Protect the Business at All Times A World-Class Research Team (ASERT) Analyzing all the World s Internet Traffic (ATLAS) to Stop Emerging Advanced Threats 32

Thank You