Architecture of a new DDoS and Web attack Mitigation System for Data Center



Similar documents
Stop DDoS Before They Stop You! CNNIC Conference

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Web Application Vulnerability Testing with Nessus

Where every interaction matters.

A Living Example of DDoS Mitigation

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Adobe Systems Incorporated

Cloud Security:Threats & Mitgations

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

DDoS Overview and Incident Response Guide. July 2014

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

(WAPT) Web Application Penetration Testing

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Report

Magento Security and Vulnerabilities. Roman Stepanov

NSFOCUS Web Application Firewall

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web application security

Data Breaches and Web Servers: The Giant Sucking Sound

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

What is Web Security? Motivation

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

NSFOCUS Web Application Firewall White Paper

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Attack Vector Detail Report Atlassian

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

NSFOCUS Web Vulnerability Scanning System

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Web App Security Audit Services

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

MANAGED SECURITY TESTING

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

FortiWeb 5.0, Web Application Firewall Course #251

Web Application Security

Intrusion detection for web applications

Application Security Best Practices. Wally LEE Principal Consultant

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Executive Summary On IronWASP

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Load Balancing Security Gateways WHITE PAPER

Thick Client Application Security

Sitefinity Security and Best Practices

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security

Using Nessus In Web Application Vulnerability Assessments

Secure development and the SDLC. Presented By Jerry

IJMIE Volume 2, Issue 9 ISSN:

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

How to complete the Secure Internet Site Declaration (SISD) form

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Learn Ethical Hacking, Become a Pentester

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Hacking de aplicaciones Web

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Web Application Security Assessment and Vulnerability Mitigation Tests

Ethical Hacking as a Professional Penetration Testing Technique

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

OWASP AND APPLICATION SECURITY

Pentests more than just using the proper tools

From the Bottom to the Top: The Evolution of Application Monitoring

CYBERTRON NETWORK SOLUTIONS

Table of Contents. Page 2/13

Web Application Firewall on SonicWALL SSL VPN

DDoS Attacks Can Take Down Your Online Services

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Implementation of Web Application Firewall

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Web application testing

SAST, DAST and Vulnerability Assessments, = 4

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Basic & Advanced Administration for Citrix NetScaler 9.2

2013 MONITORAPP Co., Ltd.

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA Minneapolis

Application Security Testing

Reducing Application Vulnerabilities by Security Engineering

AppDefend Application Firewall Overview

Nixu SNS Security White Paper May 2007 Version 1.2

Addressing Cyber Security in Oracle Utilities Applications

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

ensuring security the way how we do it

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Transcription:

Architecture of a new DDoS and Web attack Mitigation System for Data Center LIANG ZHAO NSFOCUS Information Technology Co., Ltd. CONGYU LI NSFOCUS Information Technology Co., Ltd. Session ID: DAS-T01 Session Classification: Intermediate

Data Center Web Hosting Web1 Web2 Web3 OS OS OS Hypervisor Server ISP-1 ISP-2 Web DB App Web DB App Web DB App

DDoS Attack Attacker Hire C&C Servers Client : The one behind the scene Zombie PC/Servers BBS, IM, Social Network Botnet creator X Supply tools Tool developer Complaint ICP Target website Portal ICP Users Innocent

Web Attack Technology Protocol Application Web Plug-in Web Server OS DB Web Examples HTTP, HTTPS HTML, CSS, XHTML, CGI, ASP, JSP, PHP Structs, Wordpress, ECShop IIS, Apache, WebSphere, WebLogic Windows, Linux, Unix SQL Server, MySQL, DB2, Sybase, Access Web2.0, HTML5, WAP Business Driven, new Technologies Change Frequently Change Frequently Many Evasion Techniques in attack payload Vul Original: http://example/scripts/foo.cgi?page=menu.txt Attack: http://example/scripts/foo.cgi?page=../scripts/foo.cgi%00txt Outsource Software 3rd party Software Open source Software Web Application Organization OWASP Top 10 2013 Inside Developed Software Injection Broken Authentication and Session Cross Site Scripting (XSS) Insecure Direct Object References Security Misconfiguration Sensitive Data Exposure Missing Function Level Access Control Cross-Site Request Forgery (CSRF) Using Components with Known Vulnerabilities Unvalidated Redirects and Forwards

Attack Case 1 <Operation Ababil>

Background/Phase Protest 2012.7 Disaster cased by a film clip Attack 2012.9.18 Cyber Fighters set up DDoS attack to Banks of the U.S. Named as Operation Ababil 2 Phases Phase 1, 5 weeks (9.18-10.23) Phase 2, 7 weeks (12.10-1.28) Pause/Continue 2013.1.29 attack pause 2013.3.5 attack continue

Characteristics Big Traffic Volume 1. Web Servers as Zombie 2. Dozens of G 3. Numerous Zombies Last Long Time DDoS Multiple Attack Methods 1. Network Layer: TCP/UDP/ICMP Flood 2. Application Layer: HTTP/DNS Flood Multiple targets 1. Several months 2. APT alike 1. Dozens of finance institute 2. ISP

Operation Steps Vulnerable admin passwords Software Vulnerabilities Known: Zombies are Web Server!! 1. TimThumb of WordPress 2. Joomla Penetrate Web Servers Use multi-layer attack mode Launch DDoS attack Penetrate numerous high-bandwidth Web Servers Use some Web servers as C&C servers, the others as zombies; Upload PHP DDoS tools to zombies; Zombies launch DDoS attack to targets

Attack Tools Name Itsoknoproblembro Type TCP Flood UDP Flood HTTP Get Flood HTTP Post Flood Kamikaze Amos HTTP Get Flood HTTP Post Flood

Attack Case 2 <Spamhaus VS. Cyberbunker>

ICP VS DC, 2013.3.18 Cyberbunker has relationship with criminals from East Europe and Russia, is behind recent network attacks 1 2 Spamhaus abused its position, it has no right to decide what content can appear on the Internet and what cannot.

MSSP step out, VS DC 5 4 Just 75G, got it done, you can do some marketing Help! I got attacked DDoS!! 3 We have been attacked continuously for 1 week, but we kept standing, never down. You cannot imagine how much efforts our engineers made. Such attack can swallow everything.

MSSP became Target 5 6 You dare to help him! I will strike you instead. 4 Help! I got attacked DDoS!! Just 75G, got it done, you can say something about it Attacked from Mar 23, 300-600G, targets are not ordinary equipments, but CloudFlare BGP direct peering and IX, attacks are totally out of control. Attacks to IX include London LINK, Amsterdam AMS-IX, HK-IX, Frankfurt DE-CIX, etc. Among them, London IX got influenced most significantly, caused direct effects to Internet Business within.

ISP got effected 6 You dare to help him! I will strike you instead. 4 Help! I got attacked DDoS!! 5 Just 75G, got it done, you can say something about it If this goes on, the entire network of Europe will down, you have to stop, CloudFlare, we need to talk about how to solve the problem. 7

Words after Event We will continue our righteous career, we will not be stroked down, we are the best! There is no evidence saying that we are responsible of the action. We will persist in our belief, Freedom Internet! We should keep low-profile, thanks for the collaboration of everyone, we need to improve. You made so much trouble to us, and we did not earn any money from these work. Last year, we have warned that we need to pay attention to the right configuration of DNS server, you see

Thoughts DDoS and Web attack devastate Data Center Web Hosting business. Both of the 2 attacks are complicated, but in different ways. Data Centers need to mitigate DDoS and Web attack simultaneously, accurately and cost-effectively. How to transfer from DDoS attack mitigation to Web attack mitigation smoothly as the attack changes? For instance, DDoS attack from 1G to 10G to 40G to 100G to 400G, and change from DDoS attack to Web attack.

DDoS Attack Mitigation 400G 100G 40G 10G 1G Internet ISP2 ISP1 IDC2 IDC1 Web Hosting 1. IP address Verification Source/destination IP address check/verification 2. Access Control List Layer 4 ACL Conn-Exhaustion ACL URL ACL 4. Protocol Analysis Protocol Validation by RFC check 5. Layer 4 Flood Mitigation Source/destination IP address check/verification Various mitigation algorithms 6. Layer 7 Flood Mitigation Various mitigation algorithms Pattern Matching 3. Reputation List White/Black List Dynamic Prioritizing 7: Rate Limit Restricts traffic and ensures the critical business. It has been consensus in Data Center industry that the best place to stop DDoS attack, e.g. SYN flood, is in backbone network, since the attack traffic volume can be large, e.g. 10Gbps. Data Center usually provides DDoS attack mitigation as a part of its infrastructure service.

Web Attack Mitigation 400G 100G 40G Internet ISP2 ISP1 On the other hand, Web attack, e.g. SQL Injection, is not large in volume, but its payload goes up to data level. Data Center usually provides Web attack mitigation as a dedicated service to Web Hosting customer. 1. Network Access Control 6. HTTP Flood Protection 7. HTTP Validation 2. TCP Flood Protection 5. Data Normalization 8. HTTP Access Control 3. HTTP Termination 4. SSL Decryption 9. Web Server and Plug-in Protection 10G 1G IDC2 IDC1 Web Hosting 12. Customized Protection Mechanism White List Smart Patch Custom Security Exception Policy 11. Behavior-Based Protection Illegal File Upload Illegal Download Information Disclosure Leech CSRF Scanning Cookie Hijacking 10. Rule-Based Protection Crawler XSS SQL Injection LDAP Injection SSI Command Injection XPath Injection Command Line Injection Path Traverse Remote File Inclusion

Current Situation 400G 100G 40G Internet ISP2 ISP1 ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS ADS Security as a Service Security as a Service IDC2 ADS ADS ADS ADS 10G Security as a Service IDC1 ADS 1G Web Hosting WAF In current market, professional Anti-DDoS System, ADS for short, can mitigate large volume DDoS attack, and professional Web Application Firewall, WAF for short, can mitigate Web attack and small volume DDoS attack and SSL encrypted attack. However, to Data Center, separate operation of ADS and WAF is not ideal. Web Hosting customer cannot be transferred from DDoS attack mitigation service to Web attack mitigation service smoothly as the attack changes.

New System 2. DDoS Attack Mitigation System 3 Web Attack Clean Center ADS-M NTA ADS Network 2 Large Volume DDoS Attack 1 Small Volume DDoS Attack 3. Web Attack Mitigation Engine 1. Anti-DDoS Module WAF Web DB App Benefits 1. Mitigate DDoS and Web Attack Simultaneously and accurately 2. Adaptability to Changes of attack 3. Cost-effectiveness

System Architecture DDoS Mitigation System UI-Configs System Logs UI Sub-System of Collaboration Anti-DDoS Status Security Logs Audit Logs Control tool Logs Engine Anti-DDoS Module Web Attack Mitigation System

Process of Start Collaboration Y Abandon Collaboration of this time Surpass Retry Times of Notice? N N N Traffic surpass Collaboration Threshold? Y Collaboration Start Send Diversion Notice Get Response Before Timeout of Notice? Y Record Response Diversion Succeed? Y Stop DDoS Module End of Start collaboration DDoS Alarm Log System Log System Log System Log DDoS Alarm Log

Process of Traffic Inquiry Y Abandon Inquiry of this time Surpass Retry Times of Inquiry? N N Start Inquiring Send Inquiry Request Get Response Before Timeout of Inquiry? Y Record Response End Inquiry System Log System Log

Process of Stop Collaboration Y Abandon Stop Collaboration of this time Surpass Retry Times of Notice? N N N Stop Collaboration Send Stop Diversion Notice Get Response Before Timeout of Notice? Y Record Response Diversion Stopped? Y Start DDoS Module End of Stop collaboration System Log System Log DDoS Alarm Log

Cost-effective? Probably 400G 100G 40G 10G 1G Internet ISP2 ISP1 IDC2 IDC1 Web Hosting Web attack Mitigation 60,000$ 1G WAF DDoS attack Mitigation Equipment 16,000,000$ 400G ADS 4,000,000$ 100G ADS 1,600,000$ 40G ADS 400,000$ 10G ADS Service 40,000$ 400G/1 hour 10,000$ 100G/1 hour 4,000$ 40G/1 hour 1,000$ 10G/1 hour 40,000$ 1G Anti-DDoS Module For instance, a customer meet consistent Web attack and 1, 10, 40, 100 and 400G DDoS Attack for 1 hour respectively. To completely defense, overall infrastructure investment is 22,100,000$. In new architecture, to the Web Hosting customer, it costs 155,000$ in total, and 55,000$ is service fee.

Summary 1. DDoS and Web Attacks are complicated and primary threats to Data Center. 2. Attackers will use both of these 2 attacks in one round of attack. 3. Current situation is separate operation of 2 kinds of attack mitigation system. 4. New System connects 2 existing attack mitigation systems together, and make security service can be transferred to different security service providers in network, as quick as attack changes.

Thank you! Congyu Li