Automated Mitigation of the Largest and Smartest DDoS Attacks

Similar documents
Automated Mitigation of the Largest and Smartest DDoS Attacks

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

SecurityDAM On-demand, Cloud-based DDoS Mitigation

DDoS Mitigation Techniques

TDC s perspective on DDoS threats

Enterprise-Grade Security from the Cloud

CS5008: Internet Computing

Optimal Traffic Distribution & High Availability from the Cloud. Intelligent Layer 7 Load Balancing. Datasheet Load Balancing & Failover.

Distributed Denial of Service protection

FortiDDos Size isn t everything

Stop DDoS Attacks in Minutes

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

F5 Silverline DDoS Protection Onboarding: Technical Note

The Top 10 DDoS Attack Trends

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Stop DDoS Attacks in Minutes

How To Block A Ddos Attack On A Network With A Firewall

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Four Steps to Defeat a DDoS Attack

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Arbor s Solution for ISP

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Four Steps to Defeat a DDoS Attack

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

A Layperson s Guide To DoS Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

Approaches for DDoS an ISP Perspective.

Data Sheet. DPtech Anti-DDoS Series. Overview

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Service Description DDoS Mitigation Service

How Cisco IT Protects Against Distributed Denial of Service Attacks

DDoS Overview and Incident Response Guide. July 2014

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

End-to-End Application Security from the Cloud

Application DDoS Mitigation

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Excellent DDoS Protection

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

How To Protect A Dns Authority Server From A Flood Attack

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Radware s Attack Mitigation Solution On-line Business Protection

SECURING APACHE : DOS & DDOS ATTACKS - I

/ Staminus Communications

DDoS Mitigation Solutions

Modern Denial of Service Protection

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Four Steps to Defeat a DDoS Attack

Mitigating DDoS Attacks at Layer 7

DDoS Protection on the Security Gateway

How To Make A Cloud Bursting System Work For A Business

Why Is DDoS Prevention a Challenge?

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

VALIDATING DDoS THREAT PROTECTION

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Powered by. Incapsula Cloud WAF

The Expanding Role of Service Providers in DDoS Mitigation

How To Mitigate A Ddos Attack

A Study of DOS & DDOS Smurf Attack and Preventive Measures

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

co Characterizing and Tracing Packet Floods Using Cisco R

Practical Advice for Small and Medium Environment DDoS Survival

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

IxLoad-Attack: Network Security Testing

Abstract. Introduction. Section I. What is Denial of Service Attack?

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Akamai to Incapsula Migration Guide

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 28 Denial of Service (DoS) Attack Prevention

How To Stop A Ddos Attack On A Website From Being Successful

Corero Network Security First Line of Defense Executive Overview

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Denial of Service Attacks, What They are and How to Combat Them

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

1. Firewall Configuration

A Primer for Distributed Denial of Service (DDoS) Attacks

Complete Protection against Evolving DDoS Threats

Security Toolsets for ISP Defense

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0

Safeguards Against Denial of Service Attacks for IP Phones

Are you safe from DDoS attacks?

Transcription:

Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application level (Layers 3, 4 & 7) attacks with minimal business disruption. Our cloud-based service keeps online businesses up and running at high performance levels even under attack, avoiding financial losses and serious reputation damage. Incapsula's service is built to handle the largest volume-based attacks, such as SYN flood and DNS amplifications, and also mitigates sophisticated application layer attacks by implementing advanced and progressive challenge mechanisms. The service automatically and transparently mitigates attacks with minimum false positives, so that site visitors won t know that the site is under attack. Incapsula's Protection service includes real-time dashboards to monitor & analyze attacks as they happen and features a dedicated 24/7 NOC, manned by our experienced security experts, in order to ensure enterprise-grade uptime SLA when under attack. Comprehensive Protection Against Any Type of Attack Incapsula protects your website against all types of threats, including network-based attacks, like Sloworis, ICMP or TCP & UDP floods, and application-level attacks such as GET flood, that attempt to overwhelm server resources. The service detects and mitigates advanced attacks that exploit applications, web server, and DNS server vulnerabilities, hit-and-run attacks and large botnet threats. Powerful backbone across globally distributed data centers Specialized support of massive SYN flood, DNS targeted, & DNS amplificiation attacks Advanced algorithms which mitigate sophisticated application layer attacks Real-Time dashboards to monitor & analyze attacks as they happen Dedicated 24/7 NOC for enterprise-grade uptime Support for anycast, unicast and hybrid routing techniques for effective mitigation. Infrastructure Protection enables protection for entire subnets from network layer attacks Why Incapsula? Automatic always-on detection & triggering of "under attack" mode Zero business disruption based on transparent mitigation with minimum false positives End-to-end protection against the largest and smartest attacks Legitimate Traffic What You Get Incapsula s Network Your Servers Activated by simple DNS change - no hardware or software installation, integration or changes to the website

Scalable High-Capacity Network to Handle Volume-Based Attacks Incapsula protects your website from all types of attacks: As the size of volume-based attacks, such as SYN flood and DNS amplifications, continues to grow, organizations require robust network capacity to mitigate any attack that might come their way. Incapsula's CDN offers a wide capacity to thwart multi-gigabit attacks. Our global network of scrubbing centers scales, on demand, to counter massive volumetric attacks. This ensures that mitigation is applied outside your own network, allowing only filtered traffic to reach your hosts. TCP SYN+ACK TCP FIN TCP RESET TCP ACK TCP ACK + PSH TCP Fragment UDP ICMP Intelligent Multi-Layer Protection IGMP Incapsula's ISP grade edge routers are set to filter out and isolate immediately identifiable malicious packets, such as DNS amplification and Martian packets. The rest of the traffic is prioritized by Class of Service and distributed across Incapsula's scrubbing centers, each with multiple 10-Gig uplinks. Each Incapsula scrubbing center holds several interconnected, high-powered scrubbing clusters. These clusters are used for real-time traffic profiling and blocking. When under attack, they seamlessly process incoming packets and HTTP sessions and use Incapsula's unique intelligent traffic profiling solutions and bot detection technology to accurately weed out malicious traffic, without affecting legitimate visitors. HTTP Flood Advanced Mitigation of Layer 7 Attacks Incapsula's visitor identification technology differentiates legitimate website visitors (humans, search engines, etc.) from automated or malicious clients. This capability is critical with respect to application layer (Layer 7) attacks, where the requests look like legitimate visitors. Unlike other protection services that are based on easy-to-evade and false-positive prone techniques (e.g., rate limiting or splash/delay screens), Incapsula distinguishes between humans and bot traffic, between "good" and "bad" bots, and identifies AJAX and APIs. Legitimate bots, such as Google and Bing, continue to access your website, even when it is under attack. Datasheet: Protection Brute Force Connection Flood Slowloris Spoofing DNS flood Mixed SYN + UDP or ICMP + UDP flood Ping of Death Smurf Reflected ICMP and UDP Teardrop Zero-day attacks Attacks targeting Apache, Windows or OpenBSD vulnerabilities Attacks targeting DNS servers And more

Incapsula s DNS feature protects DNS servers from targeted attacks, which is critical for site availability. Just change your NS records to point to Incapsula, and all DNS queries for the protected domains will be inspected and filtered for malicious traffic in the Incapsula cloud, ensuring that only safe queries reach your origin DNS server. This protects your server from direct attacks, as well as blocking attempts to use it as a platform for DNS amplification attacks against other servers. In the event of an attack, customers receive email alerts and GUI notifications. Transparent Mitigation Incapsula protects your site not only from complete denial of service, but also from disruptions related to attacks, mitigation false-positives, etc. We offer transparent mitigation with less than 0.01% false positives, and without degrading the normal user experience in any way. This lets you enjoy true protection, even from lengthy attacks, without disrupting business performance. Moreover, 99.99% of your legitimate site visitors will not be impacted in any way by the attack, and will continue browsing normally without annoying splash screens or delays. Automatic Detection and Triggering Incapsula offers automatic always-on mitigation, which is well-equipped to handle "hit and run" attacks consisting of short bursts of traffic in random intervals over a long period of time. This type of attack can wreak havoc with mitigation solutions that need to be manually turned on and off on every burst. Automatic detection and activation enables Incapsula to take full responsibility for both detection and mitigation of the attack. Fast, Easy Onboarding - DNS-Based Routing Protection can be rolled out without the need for hardware, software, integration or web application code changes. Customers can provision this service simply by changing their website's DNS setting. This effortless deployment allows customers to be protected in a matter of minutes while maintaining their existing hosting provider and application infrastructure. Datasheet: Protection Incapsula was able to withstand the massive distributed denial-of-service () attack and keep the targeted Website up and running... DNS Protection 1/10/13 Latest 100 Gigabit Attack Is One of Internet's Largest

Infrastructure Protection For enterprises that need to protect multiple service types and protocols across an entire subnet range of destination IP addresses, Incapsula offers on-demand protection based on BGP routing. In the event of an attack, traffic is re-routed through Incapsula s scrubbing centers using BGP announcements. From this point on, Incapsula acts as the ISP and advertises all protected IP range announcements. All incoming network traffic is inspected and filtered, and only legitimate traffic is securely forwarded to the enterprise network via GRE tunneling. 1 Upon detecting a attack, customers make a BGP announcement causing all traffic to route through Incapsula s global network of scrubbing centers. 2 Incapsula scrubbing centers identify and mitigate attacks, allowing only clean traffic to proceed to the protected infrastructure. Incapsula Network Legit Traffic 3 4 Website responses are sent back to visitors via their traditional route, using the customer s ISP. Customer Infrastructure Legitimate traffic is passed to the customer s network website via GRE Tunnels. Collaborative Security Incapsula protects websites using collective knowledge about threats, including new and emerging attack methods. Using crowdsourcing techniques, this information is aggregated across the entire service network, comprising thousands of websites, to identify new attacks as they happen and to detect known malicious users. Based on this information, mitigation rules can be applied in real-time across all protected websites. Datasheet: Protection

Cost-Effective Cloud-Based Protection Incapsula offers a cloud-based service that gives you 24x7 protection against attacks without the need for multi-gigabit Internet connections and additional hardware and operational costs. This eliminates the costs associated with over-provisioning bandwidth and deploying additional servers and load balancing appliances on premise. For enterprise plan customers, Incapsula assigns a personal account manager to act as a single point of contact for all security needs. World-Class Support by and Security Experts The Protection service provides organizations with continuous monitoring and mitigation by our battle-proven team of experienced Security Operations Center (SOC) engineers. Our service includes proactive security event management and response, continuous real-time monitoring, adept policy tuning, summary attack reports, and 24x7 technical support. T: +1 (866) 250-7659 E: info@incapsula.com www.incapsula.com 3400 Bridge Parkway, Suite 200, Redwood Shores, CA 94065, United States Copyright 2014, Incapsula. All rights reserved.