DDoS Open Threat Signaling (DOTS) Working Group. draft-ietf-dots-use-cases-00



Similar documents
DDoS Open Threat Signaling (DOTS) Working Group. Operational Requirements. Chris Morrow netman.net> Network Security Engineer, Google

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

Scalable DDoS mitigation using BGP Flowspec

Distributed Denial of Service Attacks & Defenses

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Arbor s Solution for ISP

White Paper: Librestream Security Overview

IS-IS Extensions for Flow Specification

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

How To Block A Ddos Attack On A Network With A Firewall

Where every interaction matters.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

IndusGuard Web Application Firewall Test Drive User Registration

State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

The Pension Portal. Helping you take your pension business into the paperless age

Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update

Analysis of a DDoS Attack

First Line of Defense

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May Cisco and/or its affiliates. All rights reserved.

Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology

Security & Cloud Services IAN KAYNE

PRIVACY, SECURITY AND THE VOLLY SERVICE

CISCO IOS NETWORK SECURITY (IINS)

How To Manage Security On A Networked Computer System

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

VODAFONE G-CLOUD SMS-SERVICE

Pravail 2.0 Technical Overview. Exclusive Networks

Cloud computing: benefits, risks and recommendations for information security

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

W204 - LMS Consolidation, Underlying Design More Important Than Platform

New Systems and Services Security Guidance

Quattra s Cloud Vision & Framework Value

Privacy and Electronic Communications Regulations

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

OpenDaylight Project Proposal Dynamic Flow Management

Cisco Network Foundation Protection Overview

NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality

How To Create Situational Awareness

Fortigate Features & Demo

ITL BULLETIN FOR JANUARY 2011

SDN. Roadmap to Operating SDN-based Networks Workshop July 15, Kireeti Kompella CTO, JDI. Copyright 2014 Juniper Networks, Inc.

Overview of the Transportation Secure Data Center (

Logging In: Auditing Cybersecurity in an Unsecure World

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Working Group 5: Remediation of Server Based DDoS Attacks. Status Update

Symantec Mobile Security

White Paper How Noah Mobile uses Microsoft Azure Core Services

VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

First Line of Defense

State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Cloud security architecture

Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares

SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer

Ranch Networks for Hosted Data Centers

End-to-End Application Security from the Cloud

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Session Border Controller

Practical Advice for Small and Medium Environment DDoS Survival

NSC E

Application Note. Onsight Connect Network Requirements v6.3

Service Description DDoS Mitigation Service

Mobile Security and Management Opportunities for Telcos and Service Providers

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

eprism Security Appliance 6.0 Release Notes What's New in 6.0

RETHINK SECURITY FOR UNKNOWN ATTACKS

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

Transcription:

DDoS Open Threat Signaling (DOTS) Working Group draft-ietf-dots-use-cases-00 Roland Dobbins Arbor Networks Stefan Fouant Corero Network Security Daniel Migault Ericsson Robert Moskowitz HTT ConsulAng Nik Teague Verisign Liang Frank Xia Huawei

IntroducAon & Context 2

draft-ietf-dots-use-cases-00 Summary Provides example use-cases for DOTS (actually, categories). All examples can be CE/PE or PE/PE. Room for wide variation within each category (see 4.1.1). All DOTS communications in each example can be directly between DOTS servers and DOTS clients, or mediated by DOTS relays. DOTS relays can forward messages between DOTS clients and servers using either stateless transport, stateful transport, or a combination of the two. DOTS relays can aggregate service requests, status messages, and responses. DOTS relays can filter service requests, status messages, and responses 3

draft-ietf-dots-use-cases-00 Summary (cont.) Use-cases in -00 are not exhaustive, are illustrative. Use-cases in -00 focus on DDoS mitigation using dedicated mitigation devices. S/RTBH, flowspec, OpenFlow, etc. can also be used to leverage network infrastructure for DDoS mitigation. 4.1.1 use-case in this presentation illustrates full DOTS communications cycle, variants. Other use-cases in this presentation are summarized diffs illustrating DOTS communications model in widely varying circumstances. Use-cases in this presentation focus on protecting servers under DDoS attack on destination networks. DOTS can also be used to suppress attack traffic on origin networks or as it traverses intermediary networks. 4

4.1 - Primary Use Cases 5

ReflecAon/AmplificaAon 4.1.1 CPE or PE MiAgators Request Upstream DDoS MiAgaAon DDoS AYacks 6

7

8

9

10

DDoS a&ack ini+ated. 11

A&ack mi+gated on- prem. 12

On- prem mi+ga+on capacity exceeded. 13

On- prem mi+ga+on capacity exceeded. 14

DOTS client signals for upstream mi+ga+on. 15

DOTS server acknowledges mi+ga+on request, mi+ga+on ini+ated. 16

Mi+ga+on in progress. 17

Status messages exhanged during mi+ga+on efficacy, mi+ga+on status, etc. 18

A&ack terminated. 19

Mi+ga+on status change message transmi&ed. 20

Mi+ga+on termina+on service request. 21

Mi+ga+on termina+on service acknowledgement. 22

Mi+ga+on terminated, return to status quo ante. 23

DOTS communica+on rela+onships. 24

ReflecAon/AmplificaAon 4.1.1 VariaAon with DOTS Relay MediaAng CommunicaAons DDoS AYacks 25

26

27

Mi+ga+on in progress. 28

Mi+ga+on in progress. 29

DOTS communica+on rela+onships. 30

ReflecAon/AmplificaAon 4.1.1 VariaAon with Overlay DDoS MiAgaAon Service Provider DDoS AYacks 31

32

Mi+ga+on in progress. 33

DOTS communica+on rela+onships. 34

ReflecAon/AmplificaAon 4.1.1 VariaAon with MulAple Upstream DDoS MiAgaAon Providers DDoS AYacks 35

36

Mi+ga+on in progress. 37

Mi+ga+on status messaging between providers. 38

DOTS communica+on rela+onships. 39

4.1.2 Network Infrastructure ReflecAon/AmplificaAon Device Requests Upstream DDoS DDoS AYacks MiAgaAon 40

41

Mi+ga+on in progress. 42

DOTS communica+on rela+onships. 43

ReflecAon/AmplificaAon 4.1.3 AYack Telemetry DetecAon/ ClassificaAon System Requests Upstream DDoS AYacks DDoS MiAgaAon 44

45

Mi+ga+on in progress. 46

DOTS communica+on rela+onships. 47

ReflecAon/AmplificaAon 4.1.4 Targeted Service/ApplicaAon DDoS AYacks Requests Upstream DDoS MiAgaAon 48

49

Mi+ga+on in progress. 50

DOTS communica+on rela+onships. 51

ReflecAon/AmplificaAon 4.1.5 Manual Web Portal Request to Upstream MiAgator DDoS AYacks 52

53

Mi+ga+on in progress. HTTP/S between Web browser & DOTS client on Web portal. 54

Mi+ga+on in progress. HTTP/S between Web browser & DOTS client on Web portal. 55

Communica+on rela+onships. DOTS on upstream mi+ga+on network only. 56

ReflecAon/AmplificaAon 4.1.6 Manual Mobile Device ApplicaAon Request to Upstream DDoS AYacks MiAgator 57

58

Mi+ga+on in progress. 59

DOTS communica+on rela+onships. 60

s 4.1.7 Unsuccessful CPE or PE ReflecAon/AmplificaAon MiAgator Request for Upstream DDoS AYacks DDoS MiAgaAon 61

62

Mi+ga+on in progress. 63

Another a&ack ini+ated, different target. 64

Mi+ga+on service request refused due to mi+ga+on capacity constraints. 65

DOTS communica+on rela+onships. 66

4.2 - Ancillary Use Cases 67

4.2.1 Auto-Registration Beyond attack mitigation requests, responses, and status messages, DOTS can also be useful for administrative tasks. Administrative tasks are a significant barrier to effective DDoS mitigation. DOTS clients with appropriate credentials can auto-register with DOTS servers on upstream mitigation networks. This helps with DDoS mitigation service on-boarding, moves/adds/changes. 68

4.2.2 Automatic Provisioning of DDoS Countermeasures DDoS countermeasure provisioning today is a largely manual process, errors and inefficiency can be problematic. This can lead to inadequately-provisioned DDoS mitigation services which often are not optimized for the assets under DDoS protection. Mitigation rapidity, efficacy suffers. On-boarding organizations during an attack an all-toocommon situation can be very challenging. The self-descriptive nature of DOTS registration and mitigation status requests can be leveraged to automate the countermeasure selection, provisioning, and tuning process. Mitigation efficacy feedback from DOTS clients to DOTS servers during an attack can be leveraged for real-time mitigation tuning and optimization. 69

4.2.3 Informational DDoS Attack Notification to Third Parties In addition to service requests from organizations under attack to upstream mitigators, DOTS can be used to send DDoS attack notification and status messages to interested and authorized third parties. It may be beneficial in some circumstances to automatically provide attack notifications and status messages econdary or tertiary backup mitigation providers, security researchers, vendors, law enforcement agencies, regulatory agencies, etc. Any such sharing of information with third parties should only take place in accordance with all relevant laws, regulations, contractual obligations, privacy and confidentiality agreements. 70

s Next ReflecAon/AmplificaAon Steps for Use- Cases DDoS Drac AYacks 71

To-Do List for draft-dots-ietf-use-cases-01 Fix typos (doh!). Remove duplicative verbiage. Wordsmith phrasing for clarity. Present use-cases via diffs i.e., refer to commonalities with other use-cases, emphasize specific factors unique to each use-case. Reconcile definitions of terminology with dots-ietfrequirements draft. Add use-cases illustrating suppression of DDoS attack traffic on origin networks, filtering on intermediate networks. Add use-cases illustrating specific PE-PE scenarios (e.g., overflow requests for additional DDoS mitigation capacity, etc.). 72

Request for Feedback from WG Participants What should we add? What should we remove? What should we change? Should we include variations (via diffs ) on each use-case similar to what was done with 4.1.1 in this presentation? Other input? 73

This Presentation http://bit.ly/1n6u8za

DDoS Open Threat Signaling (DOTS) Working Group Thank you! Roland Dobbins Arbor Networks Stefan Fouant Corero Network Security Daniel Migault Ericsson Robert Moskowitz HTT ConsulAng Nik Teague Verisign Liang Frank Xia Huawei