SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Security without sacrificing performance
Konrad Kaczanowski & Rafał Jaskulski
©2013 AKAMAI | FASTER FORWARDTM
Agenda
1.State of the Internet
2.Why use protection?
3.Choose wisely – you get what you pay for
©2013 AKAMAI | FASTER FORWARDTM
The numbers of Akamai
• Average traffic levels of over 6 Tbps
• Peak traffic levels to date of ~10Tbps
• Handling ~20 million hits/second, on average
700+
Cities
2,000+
Locations
80
Countries
The Akamai Intelligent Platform
1,100+
Networks
130,000+
Servers
©2013 AKAMAI | FASTER FORWARDTM
90% of Internet
users are within one
network hop of an
Akamai server
Close to the edge of the internet
©2013 AKAMAI | FASTER FORWARDTM
State of the internet
• 5% average connection speed
increase
• 4.6% average peak speed
increase
• 2.4% increase in unique IP v4 addresses
©2013 AKAMAI | FASTER FORWARDTM
Where do attacks come from?
 Attacks coming from wide range of countries (117 unique countries in Q4 2012)
 Rise in attacks originating from China – now account for 41% of worldwide attack traffic
 Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
©2013 AKAMAI | FASTER FORWARDTM
Attack trends
 Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25
Gbps
 Average attack duration increased by 7.14 percent from 32.2 hours to
34.5 hours
 Regional distribution:
 56% Asia
 25% Europe
 18% North & South America
 1% Africa
©2013 AKAMAI | FASTER FORWARDTM
What's your favorite port?
©2013 AKAMAI | FASTER FORWARDTM
Fancy an attack?
©2013 AKAMAI | FASTER FORWARDTM
Value of a hacked machine
Courtesy of http://krebsonsecurity.com/
©2013 AKAMAI | FASTER FORWARDTM
Real life example
• Top 500 online retailer generating just under 100,000 USD per hour in
revenue
• Internationally coordinated DDoS attack
• Shifting attack sources
• Changing attack signatures
• Peak attack traffic at ~112 Gbps (over 10000 more than usually)
• Akamai absorbed the attack traffic
• Savings of ~10 million USD over a period of several days
©2013 AKAMAI | FASTER FORWARDTM
• Inhouse solutions
• Dedicated security services
1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack
direct incoming traffic to go through a ‘scrubbing centre’.
2. Proactive – always-on model, 24h protection, adjust only for new attack
vectors
What are my security choices?
©2013 AKAMAI | FASTER FORWARDTM
In house security
Network
Firewall
Web
Application
Firewall
Application
or Database
Server
Customer
Database
Web
Server
(Origin)
Traditional Data Center Security
Limited scalability
Self-managed or MSSP
Off the shelf solution
©2013 AKAMAI | FASTER FORWARDTM
Scrubbers
©2013 AKAMAI | FASTER FORWARDTM
Akamai
• Distributed Intelligent Platform
• Security and Acceleration capabilities
• Several attack types dropped by default
• „Always on” protection
• Full control over features and configuration
• Real-time monitoring
• Acceleration, caching and more
©2013 AKAMAI | FASTER FORWARDTM
Akamai Intelligent Platform basic protection levels
• TCP SYN flood attacks
• UDP flood
• ICMP flood
• Some HTTP response splitting attacks (when the split is in the URL
path)
• Malformed request
• Port scanning
• Some basic DDoS protection (due to caching)
©2013 AKAMAI | FASTER FORWARDTM
Akamai Security Portfolio
Enhanced DNS:
Attack against the DNS infrastructure
Attack against the TLD (customer.com)
BIND vulnerability exploits
Basic DNS poisoning attacks (TSIG)
Advanced DNS poisoning attacks
(DNSSEC)
SiteShield:
Any layer 4-7 attacks directly against the origin
Still a risk to over at the layer 3
GTM:
Data center failure (load balancing, failover)
Web Application Firewall:
IP/CIDR/Geo whitelisting/blacklisting
XSS, SQLi
Protocol violations, Encoding abuse
Layer 7 floods
Shopper Prioritization:
Flash crowd (real or DDoS)
©2013 AKAMAI | FASTER FORWARDTM
(Cloud)
Datacenters
End User
1
10
100
10000
Origin
Traffic
1000
Akamai
Traffic
1
10
100
10000
1000 COVERED
Web Application security with Akamai
©2013 AKAMAI | FASTER FORWARDTM
Comparison
In-house Scrubbers Akamai
Pricing model Whatever you are
willing to pay
Moderate Monthly Fee +
Processed Traffic
Monthly Fee + Traffic (Insurance
option)
Protection Depending on what
is installed
On request Always on
Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team
notifications on ongoing and
planned attacks
Integration None (Internal) For each attack: BGP route
modification, GRE tunnel
configuration
Once:
DNS entry modification
Ports - All 80 & 443
Performance Possible decrease Decrease when activated Increase due to accelerated
©2013 AKAMAI | FASTER FORWARDTM
Before DDoS hits you
DDoS cheat sheet
• Decision makers list
• Define escalation paths
• Who to call and when (emergency contact information)
©2013 AKAMAI | FASTER FORWARDTM
Check out our app
©2013 AKAMAI | FASTER FORWARDTM
Questions?
©2013 AKAMAI | FASTER FORWARDTM
Under attack? Call us!
www.ddos-hotline.com
©2013 AKAMAI | FASTER FORWARDTM
Thank you!
Visit our booth at

Weitere ähnliche Inhalte

Andere mochten auch

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśBeyond.pl
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Bluerank
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasangmorrod
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The New School
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisJesus Mejia
 

Andere mochten auch (6)

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
 
BOMMA Certificado
BOMMA CertificadoBOMMA Certificado
BOMMA Certificado
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolas
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este pais
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

#IT fest 2013 - Security without sacrificing performance

  • 1. Security without sacrificing performance Konrad Kaczanowski & Rafał Jaskulski
  • 2. ©2013 AKAMAI | FASTER FORWARDTM Agenda 1.State of the Internet 2.Why use protection? 3.Choose wisely – you get what you pay for
  • 3. ©2013 AKAMAI | FASTER FORWARDTM The numbers of Akamai • Average traffic levels of over 6 Tbps • Peak traffic levels to date of ~10Tbps • Handling ~20 million hits/second, on average 700+ Cities 2,000+ Locations 80 Countries The Akamai Intelligent Platform 1,100+ Networks 130,000+ Servers
  • 4. ©2013 AKAMAI | FASTER FORWARDTM 90% of Internet users are within one network hop of an Akamai server Close to the edge of the internet
  • 5. ©2013 AKAMAI | FASTER FORWARDTM State of the internet • 5% average connection speed increase • 4.6% average peak speed increase • 2.4% increase in unique IP v4 addresses
  • 6. ©2013 AKAMAI | FASTER FORWARDTM Where do attacks come from?  Attacks coming from wide range of countries (117 unique countries in Q4 2012)  Rise in attacks originating from China – now account for 41% of worldwide attack traffic  Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
  • 7. ©2013 AKAMAI | FASTER FORWARDTM Attack trends  Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25 Gbps  Average attack duration increased by 7.14 percent from 32.2 hours to 34.5 hours  Regional distribution:  56% Asia  25% Europe  18% North & South America  1% Africa
  • 8. ©2013 AKAMAI | FASTER FORWARDTM What's your favorite port?
  • 9. ©2013 AKAMAI | FASTER FORWARDTM Fancy an attack?
  • 10. ©2013 AKAMAI | FASTER FORWARDTM Value of a hacked machine Courtesy of http://krebsonsecurity.com/
  • 11. ©2013 AKAMAI | FASTER FORWARDTM Real life example • Top 500 online retailer generating just under 100,000 USD per hour in revenue • Internationally coordinated DDoS attack • Shifting attack sources • Changing attack signatures • Peak attack traffic at ~112 Gbps (over 10000 more than usually) • Akamai absorbed the attack traffic • Savings of ~10 million USD over a period of several days
  • 12. ©2013 AKAMAI | FASTER FORWARDTM • Inhouse solutions • Dedicated security services 1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack direct incoming traffic to go through a ‘scrubbing centre’. 2. Proactive – always-on model, 24h protection, adjust only for new attack vectors What are my security choices?
  • 13. ©2013 AKAMAI | FASTER FORWARDTM In house security Network Firewall Web Application Firewall Application or Database Server Customer Database Web Server (Origin) Traditional Data Center Security Limited scalability Self-managed or MSSP Off the shelf solution
  • 14. ©2013 AKAMAI | FASTER FORWARDTM Scrubbers
  • 15. ©2013 AKAMAI | FASTER FORWARDTM Akamai • Distributed Intelligent Platform • Security and Acceleration capabilities • Several attack types dropped by default • „Always on” protection • Full control over features and configuration • Real-time monitoring • Acceleration, caching and more
  • 16. ©2013 AKAMAI | FASTER FORWARDTM Akamai Intelligent Platform basic protection levels • TCP SYN flood attacks • UDP flood • ICMP flood • Some HTTP response splitting attacks (when the split is in the URL path) • Malformed request • Port scanning • Some basic DDoS protection (due to caching)
  • 17. ©2013 AKAMAI | FASTER FORWARDTM Akamai Security Portfolio Enhanced DNS: Attack against the DNS infrastructure Attack against the TLD (customer.com) BIND vulnerability exploits Basic DNS poisoning attacks (TSIG) Advanced DNS poisoning attacks (DNSSEC) SiteShield: Any layer 4-7 attacks directly against the origin Still a risk to over at the layer 3 GTM: Data center failure (load balancing, failover) Web Application Firewall: IP/CIDR/Geo whitelisting/blacklisting XSS, SQLi Protocol violations, Encoding abuse Layer 7 floods Shopper Prioritization: Flash crowd (real or DDoS)
  • 18. ©2013 AKAMAI | FASTER FORWARDTM (Cloud) Datacenters End User 1 10 100 10000 Origin Traffic 1000 Akamai Traffic 1 10 100 10000 1000 COVERED Web Application security with Akamai
  • 19. ©2013 AKAMAI | FASTER FORWARDTM Comparison In-house Scrubbers Akamai Pricing model Whatever you are willing to pay Moderate Monthly Fee + Processed Traffic Monthly Fee + Traffic (Insurance option) Protection Depending on what is installed On request Always on Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team notifications on ongoing and planned attacks Integration None (Internal) For each attack: BGP route modification, GRE tunnel configuration Once: DNS entry modification Ports - All 80 & 443 Performance Possible decrease Decrease when activated Increase due to accelerated
  • 20. ©2013 AKAMAI | FASTER FORWARDTM Before DDoS hits you DDoS cheat sheet • Decision makers list • Define escalation paths • Who to call and when (emergency contact information)
  • 21. ©2013 AKAMAI | FASTER FORWARDTM Check out our app
  • 22. ©2013 AKAMAI | FASTER FORWARDTM Questions?
  • 23. ©2013 AKAMAI | FASTER FORWARDTM Under attack? Call us! www.ddos-hotline.com
  • 24. ©2013 AKAMAI | FASTER FORWARDTM Thank you! Visit our booth at