How Cisco IT Protects Against Distributed Denial of Service Attacks



Similar documents
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

How To Block A Ddos Attack On A Network With A Firewall

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

DDoS Overview and Incident Response Guide. July 2014

Architecture Overview

A Layperson s Guide To DoS Attacks

co Characterizing and Tracing Packet Floods Using Cisco R

Strategies to Protect Against Distributed Denial of Service (DD

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

CS 356 Lecture 16 Denial of Service. Spring 2013

DEFENSE NETWORK FAQS DATA SHEET

Service Description DDoS Mitigation Service

Secure Software Programming and Vulnerability Analysis

Security Toolsets for ISP Defense

Cisco Network Foundation Protection Overview

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

TDC s perspective on DDoS threats

Cisco Protects Internal Infrastructure from Web-Based Threats

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Application Security Backgrounder

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Networking for Caribbean Development

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

FortiDDos Size isn t everything

WAN Traffic Management with PowerLink Pro100

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Automated Mitigation of the Largest and Smartest DDoS Attacks

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Stop DDoS Attacks in Minutes

Distributed Denial of Service (DDoS)

Pravail 2.0 Technical Overview. Exclusive Networks

Modern Denial of Service Protection

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Protect A Dns Authority Server From A Flood Attack

Complete Protection against Evolving DDoS Threats

Denial of Service Attacks

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

Securing Your Business with DNS Servers That Protect Themselves

Distributed Denial of Service protection

Firewalls, IDS and IPS

Mitigating DDoS Attacks at Layer 7

Why Is DDoS Prevention a Challenge?

Secure Pipes with Network Security Technology Showcase

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

SURE 5 Zone DDoS PROTECTION SERVICE

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Denial of Service Attacks

Denial of Service Attacks, What They are and How to Combat Them

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Cisco IPS Tuning Overview

DDoS Protection on the Security Gateway

Automated Mitigation of the Largest and Smartest DDoS Attacks

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Firewall Firewall August, 2003

DDoS attacks in CESNET2

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Intelligent. Data Sheet

DDoS Mitigation. Maintaining Business Continuity in the Face of Malicious Attacks. Technical Note

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Radware s Attack Mitigation Solution On-line Business Protection

PROFESSIONAL SECURITY SYSTEMS

Securing Your Business with DNS Servers That Protect Themselves

The Expanding Role of Service Providers in DDoS Mitigation

Chapter 11 Cloud Application Development

About Firewall Protection

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Acquia Cloud Edge Protect Powered by CloudFlare

Chapter 15. Firewalls, IDS and IPS

Firewall Defaults and Some Basic Rules

Stop DDoS Attacks in Minutes

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

IxLoad-Attack: Network Security Testing

Chapter 8 Security Pt 2

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Abstract. Introduction. Section I. What is Denial of Service Attack?

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IINS Implementing Cisco Network Security 3.0 (IINS)

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Transcription:

How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN / : Cisco IT uses a variety of techniques to protect the Cisco network from DDoS attacks. When the attacks originate from a broad range of spoofed addresses and target mission-critical servers, Cisco often uses Cisco Guard, which provides an added layer of protection. This case study describes Cisco IT s internal use of Cisco Guard within the Cisco global network, a leading-edge enterprise environment that is one of the largest and most complex in the world. Cisco customers can draw on Cisco IT's real-world experience in this area to help support similar enterprise needs. The threat from low-bandwidth DoS attacks was a hole in our overall security strategy. It wouldn t necessarily be exploited very often, but the risk was significant. We needed a solution to specifically protect servers with high business value. John Banner, Network Engineer BACKGROUND An increase in the rate of network attacks is spurring IT groups to find new efficiencies in protecting network resources. In the current business climate, it s a much greater effort to detect and prevent attacks, but we don t have more people to do the work, says John Banner, a Cisco network engineer. This makes it especially important to automate some portions of network security to create a self-defending network. Cisco Systems is highly motivated to automate network defense. Network availability is crucial for business continuity because 93 percent of the company s revenue more than US$43,000 in sales per minute is booked online using Cisco Internet connections and internal networks. And more than 80 percent of Cisco products are manufactured by partners that rely on Cisco extranet connections to Cisco campuses. Cisco successfully uses a variety of technologies to prevent various types of network attacks. The most common attacks originate from a small range of addresses or come in on ports other than HTTP and FTP, such as Windows control ports. To protect against these types of attacks, Cisco uses a technique called black-holing, which places access control lists (ACLs) at the edge of the Cisco network. This provides coarse filtering of traffic that is clearly unwanted, such as servers spoofing Cisco addresses, or traffic to Windows control ports. In addition, immediately in front of Cisco.com, Cisco IT places another set of ACLs that are much more granular. CHALLENGE In 2003, Cisco began experiencing a new kind of threat: low-bandwidth denial of service (DoS) attacks coming from a broad range of spoofed addresses (Figure 1). ACLs are not effective against this type of threat because of the large number of addresses involved. ACLs would block legitimate traffic to Cisco.com as well as malicious traffic. In addition, Cisco IT would need to constantly shift the block as the apparent origin of the attack shifted. The first time this type of attack occurred, Cisco worked with its service providers to block the threat close to the source. Until the remedy was in place, however, approximately one-quarter of IPv4 addresses were prevented from reaching Cisco.com. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6

Figure 1. Low-Bandwidth DoS Attacks from Spoofed Addresses ACLs also lack the sophistication to deal with attacks from sites using Network Address Translation (NAT), which makes all traffic from every user at the site appear to come from the same address. Therefore, if one user at a site with NAT is a legitimate user and another is an infected computer participating in a DoS attack, black-holing the address can prevent the legitimate user from conducting important tasks such as downloading Cisco IOS Software updates or opening a Technical Assistance Center (TAC) case. Our challenge was to distinguish between malicious and legitimate traffic and to block only the former, says Banner. The threat from low-bandwidth DoS attacks was a hole in our overall security strategy. It wouldn t necessarily be exploited very often, but the risk was significant. We needed a solution to specifically protect servers with high business value. SOLUTION Cisco IT found the solution in Cisco Guard, a product developed by a company called Riverhead, which Cisco aquired in April 2004. Cisco Guard is deployed in Cisco s major ISP points of presence (POPs) around the world to provide an added layer of protection for mission-critical servers, including e-commerce servers, e-mail servers, and Domain Name System (DNS) servers. Each Cisco Guard mitigation appliance sits on the server s traffic path. During ordinary operations, traffic follows its ordinary path through the network (Figure 2). All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6

Figure 2. Cisco Guard Solution When Cisco IT learns that a potential attack appears imminent usually by notification from Arbor PeakFlow DoS system, which interprets data collected from Cisco NetFlow technology Cisco engineers analyze the data to determine the nature of the attack and the most effective mitigation technology. If the attack is small and originates from few IP addresses, one option is to use black-hole technology or simply shut down specific devices. If the attack is large and originates from dozens or hundreds of IP addresses, Cisco IT frequently turns on Cisco Guard to protect the servers under attack. Cisco Guard can be turned on manually or automatically, by an internal detector or an external system such as Arbor PeakFlow DoS or Cisco Intrusion Detection System (IDS). After Cisco Guard is turned on, it uses dynamic routing to divert traffic headed for the protected properties, based on destination addresses and netblocks. To differentiate malicious from legitimate traffic, Cisco Guard compares it to the normal traffic profile for that server developed during a learning period (Figure 3). The Cisco Guard applies a series of algorithms to distinguish between good and bad traffic, and allows the good traffic to pass through, says Banner. During an incident, Cisco can dynamically tune parameters for protected properties in order to maximize protection against shifting attack profiles. To minimize the possibility of dropping legitimate traffic along with malicious traffic, the algorithms are conservative in characterizing traffic as malicious. If good traffic is dropped, Cisco IT can add specific hosts to a white list. This might occur, for example, if the Cisco Guard protection is turned on during an attack, and a customer calls to say he cannot access Cisco.com. If this occurs because the Cisco Guard thinks the source looks malicious, we can simply add the customer s host to the white list and allow the traffic, says Banner. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6

Figure 3. Cisco Guard Verification Process The Cisco network experiences no performance degradation when Cisco Guard protection is turned on. And if the Cisco Guard becomes unavailable for any reason, it simply stops advertising its route, which it ordinarily advertises using Border Gateway Protocol (BGP). This graceful failure avoids disruption to business continuity. At worst we might experience a brief disruption in traffic while the route is removed, says Banner. Cisco deployed redundant Cisco Guard appliances so that Cisco IT can eliminate the possibility that a bug in an individual Cisco Guard appliance is causing problems, and can upgrade the Cisco Guards without having to turn off protection. Cisco is collaborating with its global ISPs to deploy the Cisco Guard in their facilities as well, to protect Cisco s upstream bandwidth from becoming clogged with distributed DoS (DDoS) traffic. Deploying Cisco Guards in Cisco s own POPs protects our e-commerce servers from attacks originating from computers within Cisco, says Talukdar. Deploying Cisco Guards in the public Internet protects Cisco servers and upstream bandwidth from large-scale attacks originating from locations outside of the Cisco network. Cisco selected Cisco Guard over several public domain tools. The main advantages of Cisco Guard are that it processes more packets per second than other options, and is not inline, says Banner. Because it is not inline, upgrades or other outages on the server do not cause network problems, and bugs in the Cisco Guard do not cause outages on protected services when protection is not turned on. RESULTS Cisco Guard has been successful in mitigating attacks directed toward Cisco s e-commerce applications, says William Ku, project manager for the Cisco INS product team. Following are some of the instances in which Cisco has prevented interruptions to the business by using Cisco Guard. Ruling out a SYN Flood Attack When Arbor s PeakFlow DoS revealed an excessive number of SYN packets at the same time Cisco wasexperiencing problems with the Cisco.com servers, Cisco IT suspected a SYN flood attack, and turned on Cisco Guard to filter SYN packets. The SYN packet is the first packet of a TCP handshake. Whenever a host receives a SYN packet it sets up a new session. But if the SYN packet is not eventually followed by a packet to end the session, All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6

the host can quickly run out of memory and other resources. Cisco Guard used its sophisticated algorithms to analyze the traffic, and concluded that the traffic was legitimate, although it was, indeed, out of spec. Armed with this information, Cisco IT turned its attention to other potential sources of the problem, eventually identifying the cache engines in front of Cisco.com. Whether or not Cisco Guard identifies the problem as an attack, it s a useful tool, says Banner. In this case it helped us narrow our scrutiny to more quickly identify the source of the network trouble. Preventing Spamming of a Customer Website In January 2004, a new worm was released that was scheduled to begin spamming the website of a major company (and Cisco customer) on a particular date, an event that was widely publicized. To ensure that no Cisco hosts were going to participate in the attack, Cisco IT set up Cisco Guard with that company as a victim, monitoring traffic between Cisco and the company. As it happens, the infected hosts were remediated before the attack started, says Banner. But had our antivirus measures been less effective, Cisco Guard would have enabled us to block any malicious traffic originating from our servers without blocking legitimate traffic to the other company. LESSONS LEARNED Banner notes that IT staff need to let each other know when Cisco Guard is turned on. Cisco inadvertently validated the effectiveness of Cisco Guard when someone turned on protection on the Cisco load test network without informing other staff members. This network is used to test applications before they are put into production on Cisco.com. When a single PC sent application traffic, it arrived at its destination as expected, but when the application generators sent the traffic in higher volumes, it was dropped. Cisco Guard determined that the traffic was coming in too quickly for normal patterns, making it look like an automated attack, says Banner. It is also important to check profile information periodically during learning. If a real attack started while Cisco Guard was in learning mode, Cisco Guard would consider the malicious traffic normal. Therefore, if the attack occurred on the last day of a seven-day learning cycle, the learning cycle would have to be restarted and Cisco Guard would not be effective for mitigating the attack. Cisco avoids this problem by checkpointing profile information at various times during the learning cycle. Similarly, it is advisable to periodically repeat the learning cycle for protected hosts. Otherwise, changing traffic patterns can also invalidate the profile. NEXT STEPS Cisco has begun working with service providers to offer the Cisco Guard solution to other enterprise customers. The Clean Pipes solution will drop malicious traffic before it arrives at the company that is the target of the attack. When Clean Pipes becomes part of every ISP s service infrastructure, DDoS attacks can be contained at the ISP site so that they do not affect a company s Internet connection, says Ku. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6

FOR MORE INFORMATION To read the entire case study or for additional Cisco IT case studies on a variety of business solutions, visit Cisco on Cisco: Inside Cisco IT www.cisco.com/go/ciscoit NOTE This publication describes how Cisco has benefited from the deployment of its own products. Many factors may have contributed to the results and benefits described; Cisco does not guarantee comparable results elsewhere. CISCO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties, therefore this disclaimer may not apply to you. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6