Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities



Similar documents
Cisco Network Foundation Protection Overview

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Security Toolsets for ISP Defense

Putting the Tools to Work DDOS Attack

How Cisco IT Protects Against Distributed Denial of Service Attacks

FortiDDos Size isn t everything

CISCO DDOS PROTECTION SOLUTION DELIVERING CLEAN PIPES CAPABILITIES FOR SERVICE PROVIDERS AND THEIR CUSTOMERS

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Complete Protection against Evolving DDoS Threats

TDC s perspective on DDoS threats

Distributed Denial of Service protection

Automated Mitigation of the Largest and Smartest DDoS Attacks

Stop DDoS Attacks in Minutes

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Arbor s Solution for ISP

Service Description DDoS Mitigation Service

Hunting down a DDOS attack

SecurityDAM On-demand, Cloud-based DDoS Mitigation

NSFOCUS Web Application Firewall White Paper

Automated Mitigation of the Largest and Smartest DDoS Attacks

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

DDoS Overview and Incident Response Guide. July 2014

Cisco IOS Flexible NetFlow Technology

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

DDoS Protection Technology White Paper

How To Block A Ddos Attack On A Network With A Firewall

Gaining Operational Efficiencies with the Enterasys S-Series

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS

CS 356 Lecture 16 Denial of Service. Spring 2013

DEFENSE NETWORK FAQS DATA SHEET

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Radware s Behavioral Server Cracking Protection

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Stop DDoS Attacks in Minutes

Bleeding Edge DDoS Mitigation Techniques for ISPs

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Deploying Firewalls Throughout Your Organization

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Chapter 1 The Principles of Auditing 1

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Radware s Attack Mitigation Solution On-line Business Protection

Cheap and efficient anti-ddos solution

Network Bandwidth Denial of Service (DoS)

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

/ Staminus Communications

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

IINS Implementing Cisco Network Security 3.0 (IINS)

SolarWinds Certified Professional. Exam Preparation Guide

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

Basics of Internet Security

NSFOCUS Anti-DDoS System White Paper

How To Classify A Dnet Attack

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Solution Brief. Secure and Assured Networking for Financial Services

DDoS Mitigation Solutions

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

SURVEY OF INTRUSION DETECTION SYSTEM

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

State of Texas. TEX-AN Next Generation. NNI Plan

DDoS Mitigation Techniques

Strategies to Protect Against Distributed Denial of Service (DD

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Computer System Security Updates

Introducing FortiDDoS. Mar, 2013

Application DDoS Mitigation

Denial of Service Attacks, What They are and How to Combat Them

Network Performance Monitoring at Minimal Capex

A Primer for Distributed Denial of Service (DDoS) Attacks

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

Top tips for improved network security

Campus LAN at NKN Member Institutions

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

How To Protect Your Network From Attack From A Hacker On A University Server

Pravail 2.0 Technical Overview. Exclusive Networks

DDoS attacks in CESNET2

Implementing Cisco IOS Network Security

Transcription:

Service Provider Solutions Enabling Clean Pipes Capabilities June 2005 1

Service Provider Security Highlights Security is the heart of internetworking s future A secure infrastructure forms the foundation for service delivery We have moved from an Internet of implicit trust to an Internet of pervasive distrust The Miscreant Economy is here to stay and has created a damaging business opportunity of criminal intent All the other functionality of the router merges into a pervasive policy enforcement model QoS = Security HA = Security Edge Policy = Security We must improve reaction times, reduce windows of vulnerability, and ensure service delivery across the network 2

Macro Trends Fueling DDoS Attacks World Internet usage between 2000 2005 has grown 146.2% to 800+ million Broadband explosion has resulted in an increasing number of poorly secured home PCs with always-on Internet connections just waiting to be discovered and taken over by miscreants ecommerce growth has made dependence on Internet more critical than ever Globalization due to the dot com explosion, outsourcing, and peer-to-peer applications has increased international traffic exchange significantly Most attacks launched from multinational origins very hard to isolate and take action on the extortionists 3

Evolution of Threats and Exploits High Exploiting Known Vulnerabilities Back Doors Packet Forging/Spoofing Stealth Diagnostics Sniffers Sweepers BOT Ware and P80 Services Root Kits Hijacking Sessions Disabling Audits Sophistication of Tools Blended Threats Pulsing Zombies Low Self-Replicating Code Password Guessing Password Cracking Technical Knowledge Required 4

BOTNETs Making DDoS Attacks Easy Extortionist CE ISP Edge Router Last-Mile Connection Customer Premise: Zombies Server/FW/Switch/router BOTNETs for Rent A BOTNET is comprised of computers that have been broken into and planted with programs (zombies) that can be directed to launch attacks from a central controller computer BOTNETs allow for all the types of DDOS attacks: ICMP attacks, TCP attacks, UDP attacks, and http overload Options for deploying BOTNETs are extensive and new tools are created to exploit the latest system vulnerabilities A relatively small BOTNET with only 1000 zombies can cause a great deal of damage For example: 1000 home PCs with an average upstream bandwidth of 128 kbps can offer more than 100 MBps Size of attacks are ever increasing 2-for-1 Special 5

Elements Impacted by DDoS Applications Attacks will exploit the usage of TCP/HTTP to overwhelm the computational resources Host/servers Attacks will attempt to overload the resources using protocol attacks Critical servers will not respond to normal request Bandwidth Attacks will saturate the bandwidth on IP data connections that limit or block legitimate traffic flows Infrastructure Attack target critical assets of network including routers, DNS/DHCP servers, and others devices that deliver network connections Collateral damage Attacks that impact devices not originally targeted such as computation overload by devices that carry the DDoS attack 6

Impacts Caused by Denial of Service Sabotage System Penetration Website Defacement Misuse of Public Web App Telecom Fraud Unauthorized Access Laptop Theft Financial Fraud Abuse of Wireless Network Insider Network Abuse Theft of Proprietary Info Denial of Service Virus $871,000 $901,500 $958,100 $2,747,000 $3,997,500 $4,278,205 $6,734,500 $7,670,500 $10,159,250 $10,601,055 $11,460,000 CSI/FBI 2004 Computer Crime and Security Survey Source: Computer Security Institute $26,064,050 $55,053,900 0 10M 20M 30M 40M 50M 60M Total Losses for 2004 $141,496,560 2004: 269 Respondents 7

Quotes from the Industry Extortion is becoming more commonplace, says Ed Amoroso, chief information security officer at AT&T. It s happening enough that it doesn t even raise an eyebrow anymore. We ve had [extortion attempts] happen to our customers, says Bruce Schneier, CTO at managed security services provider Counterpane Internet Security. More often than I d like, they re paying up. Antidistributed DoS services cost around $12K per month from carriers such as AT&T and MCI, says John Pescatore, Gartner security analyst. The most popular type of antidistributed DoS equipment used by SPs is Cisco Riverhead gear and Arbor Networks detection tools. This equipment can filter about 99% of the attack traffic. 8

The Risk to Your Business At risk: The network is at risk to extortion Maintaining business availability Preserving reputation and customer retention Regulatory obligations SOX, GLBA, Legal and service-level liabilities What can you do Take a proactive stance Plan and prepare for the worst case Apply appropriate security tools DDoS prevention solution X X BOTNET Internet Service Provider 9

What are Clean Pipes Capabilities? A solution set to protect against security threats on the data pipe that are critical to deliver connectivity and services The data pipe choke point could be: Enterprise/SMB/Consumer Last-mile data connection Federal Data connections accessing critical information Service Provider All data connections (i.e., Peering Points, Peering Edges, Data Center ) Most damaging types of threats that reside on the data pipe: Distributed Denial of Service (DDoS) Worms Viruses Goal is to remove the malicious traffic from the data pipe and only deliver the legitimate traffic before the link is compromised Service providers can protect themselves from attacks and can deliver security services for protection 10

Overview Network Management Network Foundation Protection 11

DDoS Protection Models DDoS Protection Model Managed Network DDoS Protection Managed Hosting DDoS Protection Managed Peering Point DDoS Protection DDoS Infrastructure Protection Core Function(s) Last-mile bandwidth protection for the service provider customers Protection of data center assets hosted by the provider Provide DDoS-free wholesale connections for downstream ISPs Protection model for the service provider to defend their networks and protect service delivery Key Capabilities New SP revenue model Primary function to enhance business continuance for customers Protection of critical last-mile bandwidth Ensure the continual delivery of enhanced services offered over data connections New SP revenue model Ensure uptime of critical assets hosted by the service provider Differentiation of the hosting service New SP revenue model Provide clean wholesale connections Better promote a DDoS-free environment Protect critical assets in the data center Mitigate attacks on critical routing infrastructure (Peering Points, Provider Edges and Core routers) Reduce OPEX by reduction of unwanted traffic across expensive transoceanic links Reduce collateral damage impacts 12

Managed Service DDoS Protection Solution Architecture Infrastructure Security Infrastructure DDoS Protection Hosting DDoS Protection Internet Transoceanic Peer ASBR Server Farms ASBR ASBR Netflow Netflow ASBR RR Guard XT/AGM Netflow Cleaning Center 1 Service Provider PE Guard XT/AGM Netflow Cleaning Center 2 ASBR Arbor Peakflow SP CE Customer Cisco Detector OutOut-ofofband Network DDoS Protection 2005 Cisco Systems, Inc. All rights reserved. SP NOC ASBR Downstream ISP Peering Point DDoS Protection Cisco Public 13

Lifecycle of DDoS Protection 14

Detection Process Steps 1. Attacks are launched by extortionist via BOTNETS. 2a. Cisco Detector on the customer premise can precisely detect when the customer is under attack. 2b. Netflow statistics from Cisco routers are exported to Arbor Peakflow SP for correlation. Anomalies are inspected for unexpected traffic behavior. 2c. The Detector or Arbor Peakflow SP indicates to the Guard that an attack has commenced. 15

Diversion and Mitigation Process Steps 3a. A BGP announcement is the mechanism used to divert traffic to the Cisco Guard. 3b. All traffic (malicious and legitimate) to the attacked destination is redirected to the Guard. 4. The Cisco Guard drops the DDoS anomalies and allows only the legitimate traffic to continue. 5. Cleaned traffic is injected back to the data path to reach the actual destination. Traffic is continually monitored by Netflow and the Cisco Detector. 16

Network Foundation Protection Protects infrastructure, enables continuous service delivery Data Plane Detects traffic anomalies and responds to attacks in realtime Technologies: NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools Control Plane Defense-in-depth protection for routing control plane Technologies: Receive ACLs, control plane policing, routing protection Management Plane Secure and continuous management of Cisco IOS network infrastructure Technologies: CPU and memory thresholding, dual export syslog, encrypted access, SNMPv3, security audit NetFlow, ACLs, urpf Customer CE NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools, PE-PE encryption PE ASBR Core Internet ASBR Service Provider NetFlow, IP source tracker, ACLs, urpf, RTBH, QoS tools Control Plane and Management Plane Protection 17

Cisco Traffic Anomaly Detector Detecting and Defeating Complex DDoS Attacks Programmable Element Enabling: Sophisticated behavior-based anomaly detection Granular, per-connection state analysis of all packets Behavioral recognition engine eliminates the need to continually update profiles Session-state context recognizes validated session traffic Delivering: Highly accurate identification of all types of known and Day Zero attacks Fast and thorough detection of the most elusive and sophisticated attacks Elimination of the need to continually update profiles Reduced number of alerts and false positives common with static signature-based approaches Detects per-flow deviations Identifies anomalous behavior Responds based on user preference Traffic Anomaly Detector XT 5600 Traffic Anomaly Detector Module 18

Cisco Guard Detecting and Defeating Complex DDoS Attacks Programmable Element Enabling: Detailed, granular, per-flow analysis and blocking Integrated dynamic filtering and active verification technologies Protocol analysis and rate limiting Intuitive, Web-based GUI simplifies policy definition, operational monitoring, and reporting Delivering: Precision traffic protection, while allowing legitimate transactions to flow Rapid, auto protection against all types of assaults, even Day Zero attacks Admission of only traffic volumes that will not overwhelm downstream devices Identification/blocking all sizes of attacks, including those launched by distributed zombie hosts Helps ensure uninterrupted business operations from even the most malicious assaults Traffic Anomaly Guard XT 5650 Traffic Anomaly Guard Module 19

Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network changes and services Improve network usage and application performance Reduce IP service and application costs Optimize network costs Detect and classify security agents Cisco 800 Cisco 1700/1800 Cisco 2600/2800 Cisco 3600/ 3700/ 3800 Cisco 4500/ 4700 Cisco 5300/ 5400/ 5800 Supported Platforms Cisco 7200/ 7300/ 7400/ 7500 Cisco 4500 ASIC Cisco 6500/ 7600 ASIC Cisco 10000/ 12000 CRS-1 20

Day Zero Attack Detection with NetFlow Benefits: Monitor traffic for anomalies Identify and classify the attack Trace attack to its source 21

References Product and Technology Enablers NetFlow IOS on Cisco Routers http://www.cisco.com/go/netflow Network Foundation Protection http://www.cisco.com/go/nfp Cisco Guard XT Appliance and Cisco Anomaly Guard Service Module http://www.cisco.com/en/us/products/ps5888/index.html http://www.cisco.com/en/us/products/ps6235/index.html Cisco Traffic Anomaly Detector XT Appliance and Cisco Traffic Anomaly Detector Service Module http://www.cisco.com/en/us/products/ps5887/index.html http://www.cisco.com/en/us/products/ps6236/index.html Router Security http://www.cisco.com/go/security Arbor Networks (a Cisco Partner) http://www.arbor.net/products_sp.php 22

Conclusion DDoS is a real and growing threat that can impact your business delivery and business reputation Take a proactive approach to handling security on your network DDoS protection is a managed security service opportunity Protect your infrastructure with DDoS protection and NFP Cisco has the leading products and solutions to address the security threats Contact your sales contact to find out more today 23

2005 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Network Foundation Protection Features and Benefits Plane Data Plane Control Plane Management Plane Cisco IOS Services NetFlow IP source tracker Access control lists (ACLs) Unicast reverse path forwarding (urpf) Remotely triggered black holing (RTBH) QoS tools PE-to-PE encryption Receive ACLs Control plane policing Routing protection CPU and memory thresholding Dual export syslog Encrypted access SNMPv3 Security audit Benefits Macro-level anomaly-based DDoS detection; provides rapid confirmation and isolation of attack Quickly and efficiently pinpoints the source interface an attack is coming from Protect edge routers from malicious traffic; explicitly permit the legitimate traffic that can be sent to the edge router s destination address Mitigates problems caused by the introduction of malformed or spoofed IP source addresses into either the service provider or customer network Drops packets based on source IP address; filtering is at line rate on most capable platforms. Hundreds of lines of filters can be deployed to multiple routers even while the attack is in progress. Protects against flooding attacks by defining QoS policies to limit bandwidth or drop offending traffic (identify, classify, and rate limit) Provides strong encryption within service provider network Control the type of traffic that can be forwarded to the processor Provides QoS control for packets destined to the control plane of the routers; ensures adequate bandwidth for high-priority traffic such as routing protocols MD5 neighbor authentication protects routing domain from spoofing attacks Redistribution protection safeguards network from excessive conditions Overload protection (e.g., prefix limits) enhances routing stability Protects CPU and memory resources of IOS device against DoS attacks Syslog exported to dual collectors for increased availability Encryption access for users (SSHv2, SSL) and management applications Secure SNMP management for third-party or custom-built applications Provides audit trail of configuration changes 25