Surviving a DDoS Attack



Similar documents
Service Description DDoS Mitigation Service

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Web Application Defence. Architecture Paper

SecurityDAM On-demand, Cloud-based DDoS Mitigation

FortiDDos Size isn t everything

TDC s perspective on DDoS threats

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Overview and Incident Response Guide. July 2014

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Pravail 2.0 Technical Overview. Exclusive Networks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

How To Block A Ddos Attack On A Network With A Firewall

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM FOR VMWARE VCLOUD AIR

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Chapter 11 Cloud Application Development

Technical Series. A Prolexic White Paper. 12 Questions to Ask a DDoS Mitigation Provider

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Cheap and efficient anti-ddos solution

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Application DDoS Mitigation

Arbor s Solution for ISP

Intro to Firewalls. Summary

Load Balancing Security Gateways WHITE PAPER

Manage the unexpected

Acquia Cloud Edge Protect Powered by CloudFlare

Debunking Myths About DDoS Attacks: Radware 2011 Global Security Report.

Stingray Traffic Manager Sizing Guide

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Internet Services. Amcom. Support & Troubleshooting Guide

How To Attack A Website With An Asymmetric Attack

and 26th november 2016

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

BASICS OF SCALING: LOAD BALANCERS

Executive Suite Series A Prolexic White Paper

Business Case for a DDoS Consolidated Solution

CloudFlare advanced DDoS protection

Automated Mitigation of the Largest and Smartest DDoS Attacks

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

The Risk vs. Cost of Enterprise DDoS Protection

How To Protect A Dns Authority Server From A Flood Attack

White Paper. Intelligence Driven. Security Monitoring. v nexusguard.com

How Cisco IT Protects Against Distributed Denial of Service Attacks

allow all such packets? While outgoing communications request information from a

Network Agent Quick Start

Gradwell VoIP Migration Issues Report

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Complete Protection against Evolving DDoS Threats

Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS

DDoS Attacks & Mitigation

NEFSIS DEDICATED SERVER

Securing data centres: How we are positioned as your ISP provider to prevent online attacks.

At dincloud, Cloud Security is Job #1

The Application Front End Understanding Next-Generation Load Balancing Appliances

CLOUD SERVICE SCHEDULE

DDoS Protection on the Security Gateway

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance

Business Values of Network and Security Virtualization

Security. 26 November 2012 Vol.18 No11

Reducing the impact of DoS attacks with MikroTik RouterOS

How Effective CSOs Prepare for DDoS Attacks. Rob Kraus & Jeremy Scott Solutionary SERT

Network monitoring and analysis tools:

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

PART D NETWORK SERVICES

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

DNSSEC and DNS Proxying

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage

Why Managed DNS Services

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DEFENSE NETWORK FAQS DATA SHEET

CALNET 3 Category 7 Network Based Management Security. Table of Contents

DDoS attacks in CESNET2

Mitigating DDoS Attacks at Layer 7

Coyote Point Systems White Paper

<Insert Picture Here> Oracle Web Cache 11g Overview

Practical Advice for Small and Medium Environment DDoS Survival

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Cloud Security In Your Contingency Plans

Transcription:

Surviving a DDoS Attack Matt Johnson, Technical Director, Eduserv Networkshop14, April 2014 www.eduserv.org.uk

Agenda Background Diary of the DDoS Attack profiles & social media Analysis and solution overview Costs Lessons learned Q&A

Background Eduserv is a registered charity providing IT services to public good organisations Operates primary services from our Swindon datacentre, secondary and DR services from Slough / London Providing hosting services since 1996 IT services customer base 20+ customers, across government, health, education and the charity sectors Some of the government customers are high-profile targets

Day 1 Initial attack was seen on the evening of Sunday 13 th May Lasted around 2 hours Attack was TCP-based, volumetric, probably HTTP-based Primary sources in Brazil, Canada Attack claimed by hacker via Twitter

Day 2 Second attack on afternoon of 14 th May Against a range of Govt. websites Attack was UDP-based Probably DNS-amplification Diverse source addresses 1 hour DoS for a number of customers Damage limitation Re-address and black-hole the address block of the targeted website services One sacrificed to save the many

Day 3 Attacked website brought back online Separate ISP link to mitigate impact to other services DDoS attacks resumed immediately HTTP volumetric based attack overwhelmed web server cluster Web service was a 3 rd party legacy build, with poor caching

Attack Methods Range of attack methods used Low Orbit Ion Cannon (LOIC), High Orbit Ion Cannon (HOIC) DNS Amplification, HTTP Idle Attacks, Scale of the attack Bandwidth peak estimated >5 Gbps 200+ malformed requests p/sec (normally 2-3 requests p/sec) Lack of support from upstream ISP for real-time blocking Without this support, in a volumetric attack, hands are tied

Social Media Many attackers like to promote their work can give an early insight into what s happening (or about to happen) Don t believe everything you read J

Incident Analysis Crisis Management Team formed Multi-disciplinary teams can bring new insight into solutions Whiteboard-based evaluation of options Continual comms with the impacted customer Possible solutions Block or disable attacking platforms at source Rebuild the web service to cope with the additional workloads Filter the DDoS traffic whilst allowing legitimate requests

Starting Situation user attack attack attack attack attack attack attack attack www.customer.gov.uk routers firewalls web

Proposed Solution user attack attack attack attack attack attack attack attack www.customer.gov.uk Load Bal. LogServer Proxy-2 Proxy-1 www.customer.gov.uk safe.customer.gov.uk routers Black Hole firewalls web

Web Proxy in the Cloud Cloud provider choice Amazon Web Services Already had expertise in deploying AWS services Huge bandwidth capacity (estimated at 600 Gbps+) AWS Marketplace offers quick deployment of application servers Proxy choice - AiCache Searched the AWS Marketplace AiCache seemed to deliver the functionality required Available on a PAYG basis with no up-front licensing commitments Configured and implemented inside of 4 hours

Enabling DDoS protection Total HTTP requests Valid HTTP requests Bad HTTP requests DDoS protection enabled

Enabling IP Throttling Initial (Test) IP throttling finished Full IP Throttling enabled Initial (Test) IP throttling started

Traffic profile before and after proxy implementation Initial DDoS causing outages Ongoing DDoS proxy in place Normal traffic profile

Costs IT costs: 350, comprising: AWS: 150 GB of data transfer, load-balancing; 2 large VMs; 100 GB of data storage: ~$270 over 14 days AiCache: 2 licences & support: $280, again over 14 days People costs: 25k, comprising Incident response: ~ 15k Incident analysis: ~ 10k Indirect costs: ~ 20k Impact on customer services, 3 rd party effort, opportunity costs

Lessons Learned Bandwidth is king In a sustained attack, whoever has the most, wins Janet customers are in a pretty good place compared to commercial ISPs Build your relationship with upstream network providers Janet have a great team make sure you know who to contact Don t forget your non-janet links

Lessons Learned DNS flexibility is vital Having a well-architected DNS infrastructure allows you to change service endpoints quickly in response to targeted attacks Make sure you have a diverse route into your DNS management Keep at least one DNS server on a separate network Building your own works, but consider using specialist Cloud-based security providers CloudFlare Imperva

Thank you! Questions? Matt Johnson Technical Director, Research Matt.Johnson@eduserv.org.uk @mhj_work www.eduserv.org.uk www.slideshare.net/eduserv

Proposed Solution user attack attack attack attack attack attack attack attack Load Bal. LogServer Proxy-2 Proxy-1 www.customer.gov.uk safe.customer.gov.uk routers firewalls web

Proposed Solution user attack attack attack attack attack attack attack attack www.customer.gov.uk Load Bal. LogServer Proxy-2 Proxy-1 safe.customer.gov.uk routers firewalls web

Proposed Solution user attack attack attack attack attack attack attack attack www.customer.gov.uk Load Bal. LogServer Proxy-2 Proxy-1 safe.customer.gov.uk routers firewalls web

Issues we encountered Capturing log data from proxy/aws infrastructure Needed to enable x-forwarding headers on the AWS ELBs SSL website services Where do you decrypt and inspect? Insight into what s happening AWS has great tools, but only maintains 2 weeks of log files AiCache can generate LOTS of log traffic

SSL services AiCache doesn t cache SSL by default Luckily the DDoS target was the standard (non-https) website, so we had some breathing space Made a decision to decrypt SSL in the Cloud (AiCache), and then re-encrypt for onward transit to the web service This was done with the consent of the customer Involved moving the SSL private key onto the AiCache VM Generated a new SSL certificate post-attack Following best practice, rather than in response to any thought that the key might be compromised