Man, Machine and DDoS Mitigation

Similar documents
Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes

DDoS Attacks Can Take Down Your Online Services

Stop DDoS Attacks in Minutes

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

DDoS Protection Technology White Paper

Threat Intelligence UPDATE: Cymru EIS Report. cymru.com

TLP WHITE. Denial of service attacks: what you need to know

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Executive Suite Series An Akamai White Paper

How To Protect A Dns Authority Server From A Flood Attack

Securing data centres: How we are positioned as your ISP provider to prevent online attacks.

Denial of Service Attacks, What They are and How to Combat Them

The Anatomy of a Distributed Denial of Service Attack (DDoS) How Zombies Can Take Down Giants

CERT Seminar March, 2010

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Technical Series. A Prolexic White Paper. 12 Questions to Ask a DDoS Mitigation Provider

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

September 20, 2013 Senior IT Examiner Gene Lilienthal

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

How To Block A Ddos Attack On A Network With A Firewall

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

The Risk vs. Cost of Enterprise DDoS Protection

How To Protect Yourself From A Dos/Ddos Attack

Agenda , Palo Alto Networks. Confidential and Proprietary.

A Layperson s Guide To DoS Attacks

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Practical Steps To Securing Process Control Networks

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

E-BUSINESS THREATS AND SOLUTIONS

Akamai White Paper. Strategies for Cyber-Attack Protection: Managed Web Security Services

Bridging the Security Gap for IP Payment Networks

A Network Administrator s Guide to Web App Security

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean

U. S. Attorney Office Northern District of Texas March 2013

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

POLIWALL: AHEAD OF THE FIREWALL

Cloud Security In Your Contingency Plans

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

whitepaper Cloud Servers: New Risk Considerations

8 Steps for Network Security Protection

FortiDDos Size isn t everything

8 Steps For Network Security Protection

Chapter 11 Cloud Application Development

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Streamlining Web and Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Guideline on Firewall

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

POLIWALL: AHEAD OF THE FIREWALL

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewall and UTM Solutions Guide

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

CS 356 Lecture 16 Denial of Service. Spring 2013

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Limiting the Damage from a Denial of Service Attack

Defense for Distributed Denial of Service

Tuesday, May 13, :00-2:00 EDT. Is Your Credit Union Prepared for a DDoS Attack?

Payment Card Industry (PCI) Data Security Standard

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

E-Commerce: Attacks and Preventative Strategies. The majority of not only our nation, but most of the world, is performing and conducting

Beyond the Hype: Advanced Persistent Threats

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Executive Suite Series A Prolexic White Paper

How to Evaluate DDoS Mitigation Providers:

Denial of Service Attacks

SSDP REFLECTION DDOS ATTACKS

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

User Documentation Web Traffic Security. University of Stavanger

The Importance of Cybersecurity Monitoring for Utilities

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center

Campus-wide Firewall Project. Anne Oribello, Brown University

Successfully Combating

Automated Mitigation of the Largest and Smartest DDoS Attacks

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion


Transcription:

Man, Machine and DDoS Mitigation The case for human cyber security expertise

Automated DDoS mitigation poses risks Distributed denial of service (DDoS) attacks can overwhelm DDoS appliances Today s DDoS attacks are larger and more complex than in the past Experienced security professionals block DDoS attacks faster than machines Human eyes and creativity are needed to stop attacks from live attackers

What is a DDoS attack? A DDoS attack tries to make a computer resource unavailable to its users It succeeds by overwhelming the target with data, requests or both Hackers boost their attacks by calling on hoards of compromised Internet devices The zombie devices have fallen under the control of an attacker through a virus or malware

It s important to choose the right DDoS mitigation strategy Outages caused by DDoS attacks are increasing and damaging to businesses As a result, many organization have made big investments in DDoS mitigation technology Firewalls Intrusion prevention systems (IPS) Intrusion detection systems (IDS) Router appliances But often these devices fail to stop DDoS attacks

It s cheap to rent a botnet to crash a DDoS mitigation appliance For a few hundred dollars a day anyone can rent a botnet that can command up to 50,000 computers That s more than enough to take down a very wellprotected Internet-facing asset such as a router, load balancer or website

Mitigation appliances are no match for the size of today s DDoS attacks A local DDoS mitigation appliance can typically stop less than 10 gigabits per second (Gbps) of attack traffic A firewall offered by an ISP can usually handle less than 20 Gbps A cloud-hosting provider can usually handle less than 40 Gbps Many of today s DDoS attacks are too big for these solutions 100 Gbps: Prolexic has blocked multiple attacks of this size 179 Gbps: Largest attack mitigated by Prolexic as of December 2013

Mitigation appliances are no match for the complexity of today s DDoS attacks DDoS attacks continue to increase in complexity Attacks can target three different areas in one campaign Network layer, described in the Open Systems Interconnection model (OSI model) as Layer 3 Transport layer (Layer 4) Application layer (Layer 7) Layer 7 attacks often look like legitimate traffic Even simple application attacks can critically overload web servers and databases

All online companies and industries are at risk regardless of size Many company executives think it won t happen to their organization but they are attacked High-bandwidth attacks against the financial industry hit in 2012 and 2013 Gartner predicts a 10 percent growth in the financial impact that cybercrime will have on online businesses through 2016* Reason for an attack vary: extortion, corporate revenge or simply malicious hackers * Gartner Reveals Top Predictions for IT Organizations and Users for 2012 and Beyond, December 1, 2011

Learn more in the white paper Download the DrDoS white paper: Man, Machine and DDoS Mitigation In this white paper, find out why you need human cyber security expertise: Understand the current and future DDoS threatscape Learn the capabilities and limitations of specific types of DDoS mitigation appliances Find out how live attackers overwhelm automated systems Understand the weaknesses of the new breed of intelligent DDoS mitigation device Avoid blocking legitimate traffic when under attack Learn about Prolexic s Security Operations Center

About Prolexic Prolexic Technologies is the world s largest and most trusted provider of DDoS protection and mitigation services Prolexic has successfully stopped DDoS attacks for more than a decade Our global DDoS mitigation network and 24/7 security operations center (SOC) can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers