SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Intro
 56% of Internet traffic is generated by bots
 95% of sites breaches and infecting are automatic
 300% annual increase in DDoS attacks on the Application layer
 30% annual increase in total number of DDoS attacks
 Average indications of DDoS attacks are 9.7 Gb/s and 19 Mpps
 Major attacks increased beyond 600 Gb/s
 Increase in number of users using NAT and proxy
 Increase in number of mobile users
 Mass transfer from http to https
 PCI DSS requirement to prohibit transferring ssl certificates
to third parties
 CAPTCHA is not efficient any longer
Intro 2
Necessary to block ALL queries by bots
New paradigms of breaches
 High reliability of the service
 Wide channels for protection from L3&4 DDoS attacks
 Protection from DDoS attacks at the Application layer
 Capability to detect singular queries by bots
 Protection from bots without blocking IP addresses
 Capability to filter https without disclosure of traffic
Requirements for security systems
In protection
 Active bot Protection (ABP)
 Protection from DDoS layer 7
 Protection from DDoS layer 3
 Protection of HTTPS
 Detection of bots without
CAPTCHA
 WAF
 Zero Day
 White and black lists
Increase is site availability
 Site boost (caching, optimization, SPDY)
 Site balancing (for multiple platforms
including)
 Optimization (for a mobile client through
traffic compression)
 Site monitoring and statistics
 IPv6
 Always Online
 Custom pages of errors
Capacities of Cloud
Cloud fail safety:
 2 Tb/s – capacity of communication channels from different operators
 2N backup of all Cloud components
ISP 1 client's platform
General working principles of clearing cloud
Cloud connection:
 Change A of a DNS record
 Network notice on BGP (not less than /24)
ISP 2
ISP N
client's platform
client's platform
Basic protection principles
border
packet
filter
hardware
packet
filter
software
packet
filter
stateful
analyzer
Application
Layer
verification
Implementation features:
 Detection of some attacks by means of traffic analysis for L3&4 using original
math algorithms
 Active interaction with bots
 System of automated security levels control
 Different security levels for different URL simultaneously are available
 Interaction with bots within 0.2 – 64 Kb of traffic
 Counter-bot system (we make an attack to be resource-intensive and
economically unsound).
Active Bot Protection (basic principles)
Benefits for client:
 Protection from DDoS at the Application layer
 Protection from scanning
 Protection from automated replication
 Protection from spam-bots in comments and forums
 Avoiding necessity to use CAPTCHA
 Protection beginning from the first query for HTTPS, both with
and without disclosure of traffic
Active Bot Protection for client
Operation modes of the complex:
✓ Filtration at the Application layer disabled.
✓ “DDoS protection” – we analyze every query, but do not make changes to user-application interaction until the
user seems to be suspicious to us. This is the most common mode, suitable for most sites. If any suspicion arises
concerning user's legitimacy, then, before proxying his queries, we enable mechanisms of additional verifications -
watching his reaction. If everything is good - we allow the query.
✓ "Active Bot Protection" - in this mode we test every user regardless his prior activity. This mode is used when the
maximum protection is required, even against a singular bot query. At that approach, analytics is not disabled. User
testing modes are selected depending on personal account settings and user's activity. This approach is good for
saving a site from bots totally.
Operation principles of traffic filtration at Application layer
ssl certificate with key
transferred
Traffic disclosure
HTTPS traffic filtration (with disclosure)
Benefits
 Requires no integration with security
system (except certificate transfer)
 Easy setting
Drawbacks
 Certificate transfer is necessary
 PCI DSS requirements are not met
Benefits
 Certificate transfer is not required
 PCI DSS requirements are met
Drawbacks
 Integration with security system is necessary
 Time lags on protection activation
 Impossible to block sessions, only IP addresses
Transfer of access logs for analysis
and registering bots in blacklists
HTTPS filtration (without traffic disclosure, with logs transfer)
HTTPS filtration (without traffic disclosure, with token)
Redirect to security system for user
verification and granting a token, after
that the user is not subject to
verification for a certain period of time
Benefits
 Certificate transfer is not required
 PCI DSS requirements are met
 No time lags on protection activation
 Blocking sessions, not IP
Drawbacks
 Integration with security system is necessary
 During token validity period an attack with use
of this token is possible
If we reckon the user is legitimate
If we reckon that additional
verification is required
Information provided by client:
URL, IP, t, UA
HTTPS filtration (without traffic disclosure, with validation service)
Benefits
 Certificate transfer is not required
 PCI DSS requirements are met
 No time lags on protection activation
 Blocking sessions, not IP
Drawbacks
 Integration with security system is necessary
WAF capacities:
 Protection from SQL Injections
 Protection from Cross-site scripting
 Protection from illegal resources access
 Protection from Remote file inclusions
 System has self learning mechanisms
 Custom rules can be added
client
Protection from manual breach (WAF)
Balancing for multiple platforms
platform 1
platform N
Balancing modes:
 Round robin
 With weight ratio
 Active-passive
Caching
client
The complex is capable of:
 Caching queried URLs for a set period of time
It enables a client to:
 Reduce channel load
 Reduce hardware load
 Smoothen “Habra effect”
The complex is capable of:
 Storing static copies of a client’s site and updating them in certain period of time
It enables a client to:
 Provide users with static part of the site if the client’s infrastructure fails
 Save clients
 To improve rating in search engines
client
Always online
Competitors
ip pier solution

Weitere ähnliche Inhalte

Was ist angesagt?

Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwarePhú Phùng
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki conceptMostafa El Lathy
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Threat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine LearningThreat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine LearningPriyanka Aash
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurityhimajareddys
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE - ATT&CKcon
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 
Security in Design of Cloud Application
Security in Design of Cloud  ApplicationSecurity in Design of Cloud  Application
Security in Design of Cloud ApplicationRafal Korszun
 

Was ist angesagt? (17)

Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted software
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Sangfor ngfw 修订版
Sangfor ngfw 修订版Sangfor ngfw 修订版
Sangfor ngfw 修订版
 
Https interception
Https interceptionHttps interception
Https interception
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Threat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine LearningThreat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine Learning
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurity
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Security in Design of Cloud Application
Security in Design of Cloud  ApplicationSecurity in Design of Cloud  Application
Security in Design of Cloud Application
 
AS2 vs. SFTP
AS2 vs. SFTPAS2 vs. SFTP
AS2 vs. SFTP
 
QualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application FirewallQualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application Firewall
 

Andere mochten auch

Innovation in government the global challenges
Innovation in government the global challengesInnovation in government the global challenges
Innovation in government the global challengesMartin Brunet
 
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...Dr R Chelliah Jes Chelliah
 
Creative commons
Creative commonsCreative commons
Creative commonsirmiuxalba
 
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi Ganguly
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi GangulySEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi Ganguly
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi GangulyDr. Karabi Ganguly
 
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнезема
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнеземаПобедитель (ОМЗ).Переработка ЗШО с извлечением кремнезема
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнеземаtstart
 
Washington Global Health Landscape Study 2015 Final Report
Washington Global Health Landscape Study 2015 Final ReportWashington Global Health Landscape Study 2015 Final Report
Washington Global Health Landscape Study 2015 Final ReportAnson Fatland
 
Framework Use in Clinical Research
Framework Use in Clinical ResearchFramework Use in Clinical Research
Framework Use in Clinical Researchjetweedy
 
Telehealth and Mental Health
Telehealth and Mental HealthTelehealth and Mental Health
Telehealth and Mental Healthjetweedy
 
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)tstart
 
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralization
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralizationA new AerosolnanoCatalysis technology for organic (oil) wastes neutralization
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralizationSergey_1
 

Andere mochten auch (12)

Innovation in government the global challenges
Innovation in government the global challengesInnovation in government the global challenges
Innovation in government the global challenges
 
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...
Poster-final Page One and Page Two in 25% size...needs to be expanded to 50% ...
 
Creative commons
Creative commonsCreative commons
Creative commons
 
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi Ganguly
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi GangulySEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi Ganguly
SEPTEMBER 2015 CONFERENCE SEMINAR ATTENDEDKarabi Ganguly
 
Valor de uso
Valor de usoValor de uso
Valor de uso
 
Mundo físico
Mundo físicoMundo físico
Mundo físico
 
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнезема
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнеземаПобедитель (ОМЗ).Переработка ЗШО с извлечением кремнезема
Победитель (ОМЗ).Переработка ЗШО с извлечением кремнезема
 
Washington Global Health Landscape Study 2015 Final Report
Washington Global Health Landscape Study 2015 Final ReportWashington Global Health Landscape Study 2015 Final Report
Washington Global Health Landscape Study 2015 Final Report
 
Framework Use in Clinical Research
Framework Use in Clinical ResearchFramework Use in Clinical Research
Framework Use in Clinical Research
 
Telehealth and Mental Health
Telehealth and Mental HealthTelehealth and Mental Health
Telehealth and Mental Health
 
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)
1 место (нт) технология маркет – эксецентрико циклоидальное зацепление (томск)
 
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralization
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralizationA new AerosolnanoCatalysis technology for organic (oil) wastes neutralization
A new AerosolnanoCatalysis technology for organic (oil) wastes neutralization
 

Ähnlich wie ip pier solution

Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010Krzysztof Binkowski
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar Kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetBaqar kazmi
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetMaliha Ali
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetbakar kazmi
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management nullowaspmumbai
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 

Ähnlich wie ip pier solution (20)

Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
CyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheetCyberoamNGSeriesUTMTechSheet
CyberoamNGSeriesUTMTechSheet
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 

Kürzlich hochgeladen

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 

Kürzlich hochgeladen (20)

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

ip pier solution

  • 1.
  • 2. Intro  56% of Internet traffic is generated by bots  95% of sites breaches and infecting are automatic  300% annual increase in DDoS attacks on the Application layer  30% annual increase in total number of DDoS attacks  Average indications of DDoS attacks are 9.7 Gb/s and 19 Mpps  Major attacks increased beyond 600 Gb/s
  • 3.  Increase in number of users using NAT and proxy  Increase in number of mobile users  Mass transfer from http to https  PCI DSS requirement to prohibit transferring ssl certificates to third parties  CAPTCHA is not efficient any longer Intro 2
  • 4. Necessary to block ALL queries by bots New paradigms of breaches
  • 5.  High reliability of the service  Wide channels for protection from L3&4 DDoS attacks  Protection from DDoS attacks at the Application layer  Capability to detect singular queries by bots  Protection from bots without blocking IP addresses  Capability to filter https without disclosure of traffic Requirements for security systems
  • 6. In protection  Active bot Protection (ABP)  Protection from DDoS layer 7  Protection from DDoS layer 3  Protection of HTTPS  Detection of bots without CAPTCHA  WAF  Zero Day  White and black lists Increase is site availability  Site boost (caching, optimization, SPDY)  Site balancing (for multiple platforms including)  Optimization (for a mobile client through traffic compression)  Site monitoring and statistics  IPv6  Always Online  Custom pages of errors Capacities of Cloud Cloud fail safety:  2 Tb/s – capacity of communication channels from different operators  2N backup of all Cloud components
  • 7. ISP 1 client's platform General working principles of clearing cloud Cloud connection:  Change A of a DNS record  Network notice on BGP (not less than /24) ISP 2 ISP N client's platform client's platform
  • 9. Implementation features:  Detection of some attacks by means of traffic analysis for L3&4 using original math algorithms  Active interaction with bots  System of automated security levels control  Different security levels for different URL simultaneously are available  Interaction with bots within 0.2 – 64 Kb of traffic  Counter-bot system (we make an attack to be resource-intensive and economically unsound). Active Bot Protection (basic principles)
  • 10. Benefits for client:  Protection from DDoS at the Application layer  Protection from scanning  Protection from automated replication  Protection from spam-bots in comments and forums  Avoiding necessity to use CAPTCHA  Protection beginning from the first query for HTTPS, both with and without disclosure of traffic Active Bot Protection for client
  • 11. Operation modes of the complex: ✓ Filtration at the Application layer disabled. ✓ “DDoS protection” – we analyze every query, but do not make changes to user-application interaction until the user seems to be suspicious to us. This is the most common mode, suitable for most sites. If any suspicion arises concerning user's legitimacy, then, before proxying his queries, we enable mechanisms of additional verifications - watching his reaction. If everything is good - we allow the query. ✓ "Active Bot Protection" - in this mode we test every user regardless his prior activity. This mode is used when the maximum protection is required, even against a singular bot query. At that approach, analytics is not disabled. User testing modes are selected depending on personal account settings and user's activity. This approach is good for saving a site from bots totally. Operation principles of traffic filtration at Application layer
  • 12. ssl certificate with key transferred Traffic disclosure HTTPS traffic filtration (with disclosure) Benefits  Requires no integration with security system (except certificate transfer)  Easy setting Drawbacks  Certificate transfer is necessary  PCI DSS requirements are not met
  • 13. Benefits  Certificate transfer is not required  PCI DSS requirements are met Drawbacks  Integration with security system is necessary  Time lags on protection activation  Impossible to block sessions, only IP addresses Transfer of access logs for analysis and registering bots in blacklists HTTPS filtration (without traffic disclosure, with logs transfer)
  • 14. HTTPS filtration (without traffic disclosure, with token) Redirect to security system for user verification and granting a token, after that the user is not subject to verification for a certain period of time Benefits  Certificate transfer is not required  PCI DSS requirements are met  No time lags on protection activation  Blocking sessions, not IP Drawbacks  Integration with security system is necessary  During token validity period an attack with use of this token is possible
  • 15. If we reckon the user is legitimate If we reckon that additional verification is required Information provided by client: URL, IP, t, UA HTTPS filtration (without traffic disclosure, with validation service) Benefits  Certificate transfer is not required  PCI DSS requirements are met  No time lags on protection activation  Blocking sessions, not IP Drawbacks  Integration with security system is necessary
  • 16. WAF capacities:  Protection from SQL Injections  Protection from Cross-site scripting  Protection from illegal resources access  Protection from Remote file inclusions  System has self learning mechanisms  Custom rules can be added client Protection from manual breach (WAF)
  • 17. Balancing for multiple platforms platform 1 platform N Balancing modes:  Round robin  With weight ratio  Active-passive
  • 18. Caching client The complex is capable of:  Caching queried URLs for a set period of time It enables a client to:  Reduce channel load  Reduce hardware load  Smoothen “Habra effect”
  • 19. The complex is capable of:  Storing static copies of a client’s site and updating them in certain period of time It enables a client to:  Provide users with static part of the site if the client’s infrastructure fails  Save clients  To improve rating in search engines client Always online