How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks



Similar documents
A Living Example of DDoS Mitigation

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

TDC s perspective on DDoS threats

VALIDATING DDoS THREAT PROTECTION

Automated Mitigation of the Largest and Smartest DDoS Attacks

FortiDDos Size isn t everything

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

DDoS Overview and Incident Response Guide. July 2014

Mitigating DDoS Attacks at Layer 7

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

How To Protect A Dns Authority Server From A Flood Attack

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Automated Mitigation of the Largest and Smartest DDoS Attacks

Introducing FortiDDoS. Mar, 2013

How Cisco IT Protects Against Distributed Denial of Service Attacks

Cloud Security In Your Contingency Plans

DDoS Mitigation Techniques

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

Stop DDoS Before They Stop You! CNNIC Conference

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

CS 356 Lecture 16 Denial of Service. Spring 2013

Cisco Integrated Services Routers Performance Overview

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Safeguards Against Denial of Service Attacks for IP Phones

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

NSFOCUS Anti-DDoS System White Paper

DDoS Protection on the Security Gateway

DoS: Attack and Defense

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Business Case for a DDoS Consolidated Solution

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

A Primer for Distributed Denial of Service (DDoS) Attacks

DDoS Mitigation Solutions

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

AntiDDoS8000 DDoS Protection Systems

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Architecture of a new DDoS and Web attack Mitigation System for Data Center

Cheap and efficient anti-ddos solution

- Introduction to PIX/ASA Firewalls -

A Layperson s Guide To DoS Attacks

DDoS Attacks & Mitigation

Distributed Denial of Service protection

AntiDDoS1000 DDoS Protection Systems

Denial of Service Attacks

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

Radware s Attack Mitigation Solution On-line Business Protection

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

How to launch and defend against a DDoS

Check Point DDoS Protector

How To Block A Ddos Attack On A Network With A Firewall

Complete Protection against Evolving DDoS Threats

McAfee Network Security Platform A uniquely intelligent approach to network security

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

NSFOCUS Web Application Firewall White Paper

How To Attack A Website With An Asymmetric Attack

Analysis of a DDoS Attack

Company Overview. October 2014

How To Make A Cloud Bursting System Work For A Business

Practical Advice for Small and Medium Environment DDoS Survival

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

Huawei Traffic Cleaning Solution

Global DDoS Prevention Market

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Secure Cloud-Ready Data Centers Juniper Networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Characterization and Analysis of NTP Amplification Based DDoS Attacks

Data Sheet. DPtech Anti-DDoS Series. Overview

McAfee Network Security Platform A uniquely intelligent approach to network security

/ Staminus Communications

Seminar Computer Security

Transcription:

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21)

What Is Distributed Denial of Service A Denial of Service attack (DoS) is any intended attempt to prevent legitimate users from reaching a specific network resource, from a single source. Distributed Denial of Service attack (DDoS) is an extension to a DoS attack however is harder to mitigate because source traffic is from multiple source addresses. The attack traffic can be difficult to distinguish from legitimate traffic.

The Open Systems Interconnection model (OSI)

Types of DoS Attacks Layer 3 (Network Protocol) - (DoS, DDoS, DRDoS, CDRDoS) IP Address attacks targeting network bandwidth - UDP Flood style attacks DNS, NTP, SSDP, CHARGEN, SNMP. Layer 7 (Application Protocol) (DoS, DDoS) TCP attacks on server sockets HTTP attacks on Web server threads Protocol Attacks (SYN flood, fragments) Packet Storm (Excessive PPS) Resource Starvation (CPU, I/O, Memory) Stealth/Creeper (Slowloris, Slow POST) Exploit (Application or OS Specific DoS) They attack the top layer OSI model, They have low bandwidth consumption. They have a legitimate and stealth appearance. They re mostly non-volumetric. They re increasingly popular. There are a variety of methods, targets, and open-source tools. They re difficult to defend against.

Common DDoS Defensive Techniques Simple Site Failover Null Route (Black Hole) (Automated or Manual) Anycast BGP Multi Home Onsite Web Application Firewall Load Balancing Appliances Commercial Hardware Solutions On Premises Commercial Solutions In the Cloud

Large Global Denial of Service attacks Largest 400G DDoS Attack in History February 2014 NTP Reflection Attack Second Largest300G DDoS Attack in History March 2013 DNS Reflection Attack Gaben Laser Beam (GLB )

Large Denial of Service attacks Micron21

CDRDoS 40gbit Internationally 1.2gbit Domestic

Micron21 Statistics Long Term Average Since Jan 2013 Long term average attack lasts 34.5 hours China is #1 origin of DDoS traffic, making up 40-50% of all unwanted traffic activity 25% of attacks are against Infrastructure (Layers 3 attacks) 75% against Connection and Applications (layer 4 to 7 attacks) 75% of all attacks are under 1 Gbit 20% of all attacks are under 4 Gbit 5% of all attacks are above 4 Gbit

Layer 4 to 7 Attack Vectors Tools used by Faceless Hacker in Layer 4 to 7 Attacks HTTP GET Flood Syn Flood Attack Ack Flood Attack SSL Based Attacks - CURL back track, THC SSL very hard to detect LOIC Low Orbit Ion Cannon R.U.DY R U Dead Yet Slowloris Pylorius DDoSim THC-SSL-DOS Dirt Jumper Drive2 Method: HTTP flood, SYN flood, POST flood, and more. Tor s Hammer Method: Slow POST Nuclear DDoSer Method: Slow POST Railgun Method: Slow POST HTTP has a 60 known vulnerabilities which can be attacked

Micron21 Total Attacks Since January 2013 Attack Type Attack Count Dropped Traffic Dropped Traffic (packets) Percentage of Dropped Traffic Percentage of Attack Type SYN-Flood 544,272 260.7 G 547.4 M Less than 1.0% 43% ACK-Flood 161,204 175.9 G 227.1 M Less than 1.0% 12.8% UDP-Flood 111,429 2,660,087 G (2597 TB) 47 Billion 98.0% 8.9% ICMP-Flood 2,962 243.2 G 310.6 M Less than 1.0% 0.23% Conn-Flood 173,042 44.2 G 8.6 M Less than 1.0% 13.8% Stream-Flood 131,076 734.8 G 93.4 M Less than 1.0% 10.4% Others 126,926 2979.8 G 12.8 M Less than 1.0% 10.1%

Current Active DDoS Attacks - 42 Current 19 th Aug 2014 8:14pm Total Data PPS Target Type Port Peak Speed 0.05GB 49111.223.226.91 Others 80 0.0Mbps 0.0GB 20103.4.18.149 Stream Flood 80 0.0Mbps 0.0GB 4111.223.232.30 SYN-Flood 443 0.0Mbps 0.0GB 127.131.75.35 Conn-Flood 80 0.0Mbps 0.0GB 1111.223.231.34 ACK-Flood 80 0.0Mbps 0.0GB 127.131.75.36 SYN-Flood 80 0.0Mbps 0.0GB 127.131.75.35 Conn-Flood 80 0.0Mbps 0.0GB 127.131.105.189 SYN-Flood 80 0.0Mbps 0.0GB 1111.223.228.178 SYN-Flood 80 0.0Mbps 0.0GB 1111.223.231.34 ACK-Flood 80 0.0Mbps 0.0GB 127.131.75.35 SYN-Flood 80 0.0Mbps 0.0GB 127.131.105.189 Conn-Flood 25 0.0Mbps 0.0GB 1111.223.228.186 ACK-Flood 80 0.0Mbps 0.0GB 1111.223.228.178 SYN-Flood 80 0.0Mbps 0.0GB 1111.223.231.34 ACK-Flood 21 0.0Mbps 0.0GB 127.131.75.36 SYN-Flood 443 0.0Mbps 0.0GB 127.131.75.35 SYN-Flood 80 0.0Mbps 0.0GB 127.131.105.189 ACK-Flood 80 0.0Mbps 0.0GB 1111.223.228.178 SYN-Flood 25 0.0Mbps 0.0GB 1111.223.231.34 Conn-Flood 443 0.0Mbps 0.0GB 1111.223.228.178 Conn-Flood 80 0.0Mbps 0.0GB 127.131.66.209 Others 80 0.0Mbps 0.0GB 127.131.105.189 SYN-Flood 80 0.0Mbps 0.0GB 1111.223.228.178 SYN-Flood 80 0.0Mbps 0.0GB 127.131.75.35 ACK-Flood 443 0.0Mbps 0.0GB 127.131.105.189 SYN-Flood 80 0.0Mbps 0.0GB 1111.223.231.34 Conn-Flood 25 0.0Mbps

Firewalls and Layer 4 to 7 Attacks Why they FAIL

Juniper SSG550M Firewall Specifications ScreenOS version tested ScreenOS 6.2 Firewall Perf (Large Packets) Firewall Performance (IMIX) Firewall Packets Per Second 3DES+SHA-1 VPN Perf 1+ Gbps 1 Gbps 600,000 PPS 600 Mbps Concurrent VPN Tunnels 1,000 Max Concurrent Sessions 256,000 New Sessions/Second 15,000 Max Security Policies 4,000 Max Security Zones 60

Juniper SSG 550m Hardware Firewall

ACK Flood Juniper SSG 550m Firewall BOTNET 983 hosts Each bot sends 8 packets per second at 25 bytes in size 7832 packets per second 1.5mbits of traffic Juniper SSG 550m 0.25m TCP sessions fails in 32 seconds Juniper SRX 1400 / Sonic Wall SuperMassive 9000 1.5m TCP sessions fails in 3.2 minutes Juniper SRX 3400 / Sonic Wall SuperMassive E10200 TCP 3.0m sessions fails in 6.4 minutes Juniper SRX 5800 / 100m sessions (over $1m investment) unlikely to fail with this attack

Layer 4 to 7 Attacks Prevention How Does Micron21 Prevents Stateful devices from failing? IE. Firewalls and Load Balancers?

Micron21 DDoS Mitigation Shield

So How Does NSFOCUS work How Does the ADS Clean Traffic

NSFOCUS ADS - 6020 Collapsar Attack Mitigation 流 量 清 洗 系 列 ADS ADS 2010 (2G) ADS 2020 (4G) ADS 4020(10-20G) ADS 6020 (20-40G) 1,488,000 pps 2,976,000 pps 8,928,000 pps 14,880,000 pps

ADS -- Multilayer Cleaning Attacker Internet Traffic Cleaning Center 1 2 3 4 5 Protocol Analysis Access Control List Reputation List Layer 4 Flood Mitigation Layer 7 Flood Mitigation 6 Rate Limit 1. Protocol Analysis Protocol Validation by RFC Check 2. Access Control List Layer 4 ACL Conn-Exhaustion ACL URL ACL 3. Reputation List White/Black List Dynamic Prioritizing 4. Layer 4 Flood Mitigation Source/destination IP address check/verification Various mitigation algorithms 5. Layer 7 Flood Mitigation Various mitigation algorithms Pattern Matching 6: Rate Limit Restricts traffic and ensures the critical business.

Packet Inspection and Capture Netflow information is useless in application DDoS detection; you need advance packet inspection along with behavioral patterns.

Dr Julian Hirst ACK Attack

Zero Day Real time Defense

Selected Clients - NSFOCUS provides over 4000G+ DDoS mitigation capacity to global customers Hosting, IDC, ISP, MSSP Internet Service Providers/Online Gaming Telecommunications Korea Telecom Banking and Finance Enterprises

About NSFOCUS Corporate Member HQ Overview Regional Subsidiaries Global Business HQ: Santa Clara, USA Place your text here CN HQ: Beijing Founded in 2000 Over 1,600 employees Place your text here Jan. 2014 IPO Over 13 years experience in DDoS mitigation Dedicated to network security Place your text here US: Santa Clara, US EMEA: London, UK Japan: Tokyo, JP APAC: Singapore

THANK YOU! come and talk with us on our booth. Contact James@micron21.com