SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Re-Writing the Rules for
DDoS Defense
On-Prem + Cloud Based Protection
Stephen Gates - Chief Security Evangelist
© 2014 Corero www.corero.com
DDoS Attacks, 2013-2014
Total Attack Bandwidth Gbps
Data shown represents the top ~2% of reported attacks
JUN 1 JUL 1 AUG 1 SEP 1 OCT 1 NOV 1 JAN 1
2014
FEB 1 APR 1 MAY 1MAR 1 JUN 1 JUL 1
100
200
300
400
DEC 4
2013
MAR 17 2014 JUNE 23 2014
HONG KONG
VOTING SITES
JUNE 21 2013
AUG 9
2013
DEC 1
MAR 29 2014DEC 31 2013
MAJOR HOSTING
SITES
Source: Network Computing/Ponemon Institute
© 2014 Corero www.corero.com2
20% of data center downtime
is caused by a DDoS attack86minutes is an average of data center
downtime due to DDoS attacks$8K per minute is the average
cost of this downtime$700K per incident is the
average cost of a DDoS outage
Source: Digital Attack Map - DDoS attacks around the globe
DDoS Digital Attack Map
© 2014 Corero www.corero.com
http://www.digitalattackmap.com/
Volumetric
Application
TCP Connect
Fragmented
According to a recent survey conducted by the
SANS Institute…
“The most damaging DDoS attacks mix volumetric attacks with
targeted, application-specific attacks.”
Are the attackers getting smarter?
 Researchers are finding an uptick in the number of new
techniques
 Attackers defeating traditional protection (Firewall, ACL,
Blackhole)
 Attackers are developing new methods of bypassing
defenses
© 2014 Corero www.corero.com
High Orbit ION Cannon
HULK SlowHTTPtest
Hping3 NMAP
Metasploit
Slowloris
Low Orbit ION Cannon
www.yoursite.com
KillApache.pl
What tools are the attackers using?
© 2014 Corero www.corero.com
Can your existing security layers handle the
onslaught?
Volumetric Attack Components
 Bandwidth Saturation
 Connection Saturation
 Spoofed Connections
 Reflections/Amplifications
 Fragments
 Partial Saturation
6 © 2014 Corero www.corero.com
Concerns with partial saturation attacks
 Beyond very small attacks exhausting or slowing a particular
resource
 Worse than traditional attacks targeted at disabling
infrastructure
 New attacks that are a diversion for some larger threat
(data exfiltration, planting malware, etc.)
7 © 2014 Corero www.corero.com
Businesses need protection from the Internet
With a first line of defense that:
network/service
outages by blocking
attacks in real time
PREVENTS
the effective life of
your existing
security investments
EXTENDS
insight into attacks
and evolving threats
PROVIDES
customers can
access online
services
ASSURES
© 2014 Corero www.corero.com8
Proper DDoS Protection
Three options
© 2014 Corero www.corero.com9
On-Premises
Hybrid
Cloud/Hosted
Hybrid
On-premises and in-line
• Always-on, real-time protection
• Complete, comprehensive security event visibility
• Inspection, analysis, alerting and real-time mitigation
• Protects against layer 3–7 attacks
• Do-no-harm approach
Threat mitigation benefits
10
On-premise and in-line:
• Improved response time and mitigation for the vast majority
of attacks
• Allows highly-trained staff to focus on more nefarious
threats
• Broad protection at all layers protects critical infrastructure
and optimizes its performance
• Service availability protects business integrity, and increases
productivity
Operational benefits
11
On-premises and in-line:
• Fraction of the cost compared to scrubbing or out of
band solutions
• Protects downstream security investments
• Allows skilled (and highly-paid) staff to focus on higher-
layer threats, not mundane operational tasks
Cost benefits
12
Cloud/Hosted Scenario
 If scrubbing is an option that your business is committed
to, consider the following:
• Always on, or on demand
• Cost implications
• Total event traffic captured and analyzed
• Manual/human intervention
• Duration of large scale attacks
• Application layer attacks
1
What will it take to eliminate this problem?
© 2014 Corero www.corero.com14
Service Provider Defenses
L3-L4
Attack
Traffic
Attack
Leakage
Good
Traffic
Protected Critical
Infrastructure
Good Traffic
Attack Traffic
On-Premises
Defenses L3-L7
Good
Traffic
Good
Users
Attackers
N
Always on
Redirection
Method
Attack Type
Size of Attack
Base Service
$
$$
$$$
$$$$
Cloud Service Pricing
30 Mins.
20Mins.
10 Mins.
Attack
Begins
Attack
Detected
Rerouted to
Scrubbing
Center
Time to Reroute
Attack Detection to Prevention Process
Conclusions: There is no one-size-fits-all solution
15
r
Plan for day-to-day
protection against
baseline attacks
Consider
solutions that
you can turn
around and
monetize
Think about the
cost of mitigation in
a 24/7 attack
environment:
human and capital
Prepare for
larger sustained
attacks and
massive spikes
What is Your DDoS Protection Plan?
Advanced DDoS/Cyber
Threat Protection
Comprehensive
Visibility
© 2014 Corero www.corero.com16
Next Generation
Architecture
Corero SmartWall® Network Threat Defense
ADVANCED DDOS & CYBER
THREAT DEFENSE TECHNOLOGY
BUILT ON NEXT GENERATION
ARCHITECTURE
COMPREHENSIVE ATTACK
VISIBILITY & NETWORK FORENSICS
SmartWall Threat Defense System (TDS)
 Enterprises & Service/Hosting Providers
 On-Premises or Cloud deployments
 Protection in modular increments of 10 Gbps
 In-line or scrubbing topologies
© 2014 Corero www.corero.com17 Confidential
Comprehensive Visibility
Security
Events
Threat
Intelligence
System Health
Data
Forensics
Data
Network
Statistics
Powered by
Corero First Line of Defense®
VALUABLE RAW DATA
ACTIONABLE SECURITY ANALYTICS & VISUALIZATION
Real-time Dashboards
Historical Reporting Forensic AnalysisBehavioral Analysis
Virtual
SOC Portal
Powerful
Analytics Engine
© 2014 Corero www.corero.com18
10:00 PM
Visibility – Attack Analytics & Reporting
© 2014 Corero www.corero.com
Internet
Corero SecureWatch® Analytics Portal
Corero Secure
Operations Center
CORERO SOC CAN
REMOTELY ASSIST
CUSTOMERS AND PARTNERS Corero Partner
CORERO PARTNERS CAN
VIEW DASHBOARDS OF
CUSTOMERS THEY MANAGE
Corero Customer
CORERO CUSTOMERS CAN
VIEW DASHBOARDS OF
THEIR OWN DATA
DASHBOARD 1 DASHBOARD 2
DASHBOARD 3 DASHBOARD 4
DASHBOARD 5
DASHBOARD 6
Corero SecureWatch Analytics App
Site A Site B
© 2014 Corero www.corero.com20
First Line of Defense Applications
© 2014 Corero www.corero.com8
Protected Critical
Infrastructure
and Services
In the Cloud
Service providers, IT hosting and Cloud providers
On Premises
Enterprises – financial services, e-commerce providers,
gaming, education
1- 10 Gbps
SLB/ADC
IPS/APT
WAF
SP
Internet
© 2014 Corero www.corero.com22
Arrange for a proof of concept
Learn more at: www.corero.com
Join the Conversation
@Corero
@StephenJGates
@SecurityBistro
Corero Security Blog – The Security Bistro
www.securitybistro.com
NEXT STEPS
Thank You!
For a copy of this presentation: info@corero.com

Weitere ähnliche Inhalte

Was ist angesagt?

12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident HandlingMarcelo Silva
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDeivid Toledo
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time Haltdos
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16Radware
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideImperva
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware
 
Time line-of-ddos-campaigns-against-mit-threat-advisory
Time line-of-ddos-campaigns-against-mit-threat-advisory Time line-of-ddos-campaigns-against-mit-threat-advisory
Time line-of-ddos-campaigns-against-mit-threat-advisory Andrey Apuhtin
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIGaurav "GP" Pal
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantHaltdos
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
Hitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentHitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentF _
 

Was ist angesagt? (20)

DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Is DNS a Part of Your Cyber Security Strategy?
Is DNS a Part of Your Cyber Security Strategy? Is DNS a Part of Your Cyber Security Strategy?
Is DNS a Part of Your Cyber Security Strategy?
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
Time line-of-ddos-campaigns-against-mit-threat-advisory
Time line-of-ddos-campaigns-against-mit-threat-advisory Time line-of-ddos-campaigns-against-mit-threat-advisory
Time line-of-ddos-campaigns-against-mit-threat-advisory
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
Hitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentHitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian Environment
 

Ähnlich wie Rewriting the Rules for DDoS Protection in 2015

DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersCorero Network Security
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersStephanie Weagle
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622IJRAT
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigationAmeya Vashishth
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...IJECEIAES
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 

Ähnlich wie Rewriting the Rules for DDoS Protection in 2015 (20)

DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customers
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigation
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 

Kürzlich hochgeladen

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Rewriting the Rules for DDoS Protection in 2015

  • 1. Re-Writing the Rules for DDoS Defense On-Prem + Cloud Based Protection Stephen Gates - Chief Security Evangelist © 2014 Corero www.corero.com
  • 2. DDoS Attacks, 2013-2014 Total Attack Bandwidth Gbps Data shown represents the top ~2% of reported attacks JUN 1 JUL 1 AUG 1 SEP 1 OCT 1 NOV 1 JAN 1 2014 FEB 1 APR 1 MAY 1MAR 1 JUN 1 JUL 1 100 200 300 400 DEC 4 2013 MAR 17 2014 JUNE 23 2014 HONG KONG VOTING SITES JUNE 21 2013 AUG 9 2013 DEC 1 MAR 29 2014DEC 31 2013 MAJOR HOSTING SITES Source: Network Computing/Ponemon Institute © 2014 Corero www.corero.com2 20% of data center downtime is caused by a DDoS attack86minutes is an average of data center downtime due to DDoS attacks$8K per minute is the average cost of this downtime$700K per incident is the average cost of a DDoS outage Source: Digital Attack Map - DDoS attacks around the globe
  • 3. DDoS Digital Attack Map © 2014 Corero www.corero.com http://www.digitalattackmap.com/ Volumetric Application TCP Connect Fragmented According to a recent survey conducted by the SANS Institute… “The most damaging DDoS attacks mix volumetric attacks with targeted, application-specific attacks.”
  • 4. Are the attackers getting smarter?  Researchers are finding an uptick in the number of new techniques  Attackers defeating traditional protection (Firewall, ACL, Blackhole)  Attackers are developing new methods of bypassing defenses © 2014 Corero www.corero.com
  • 5. High Orbit ION Cannon HULK SlowHTTPtest Hping3 NMAP Metasploit Slowloris Low Orbit ION Cannon www.yoursite.com KillApache.pl What tools are the attackers using? © 2014 Corero www.corero.com
  • 6. Can your existing security layers handle the onslaught? Volumetric Attack Components  Bandwidth Saturation  Connection Saturation  Spoofed Connections  Reflections/Amplifications  Fragments  Partial Saturation 6 © 2014 Corero www.corero.com
  • 7. Concerns with partial saturation attacks  Beyond very small attacks exhausting or slowing a particular resource  Worse than traditional attacks targeted at disabling infrastructure  New attacks that are a diversion for some larger threat (data exfiltration, planting malware, etc.) 7 © 2014 Corero www.corero.com
  • 8. Businesses need protection from the Internet With a first line of defense that: network/service outages by blocking attacks in real time PREVENTS the effective life of your existing security investments EXTENDS insight into attacks and evolving threats PROVIDES customers can access online services ASSURES © 2014 Corero www.corero.com8
  • 9. Proper DDoS Protection Three options © 2014 Corero www.corero.com9 On-Premises Hybrid Cloud/Hosted Hybrid
  • 10. On-premises and in-line • Always-on, real-time protection • Complete, comprehensive security event visibility • Inspection, analysis, alerting and real-time mitigation • Protects against layer 3–7 attacks • Do-no-harm approach Threat mitigation benefits 10
  • 11. On-premise and in-line: • Improved response time and mitigation for the vast majority of attacks • Allows highly-trained staff to focus on more nefarious threats • Broad protection at all layers protects critical infrastructure and optimizes its performance • Service availability protects business integrity, and increases productivity Operational benefits 11
  • 12. On-premises and in-line: • Fraction of the cost compared to scrubbing or out of band solutions • Protects downstream security investments • Allows skilled (and highly-paid) staff to focus on higher- layer threats, not mundane operational tasks Cost benefits 12
  • 13. Cloud/Hosted Scenario  If scrubbing is an option that your business is committed to, consider the following: • Always on, or on demand • Cost implications • Total event traffic captured and analyzed • Manual/human intervention • Duration of large scale attacks • Application layer attacks 1
  • 14. What will it take to eliminate this problem? © 2014 Corero www.corero.com14 Service Provider Defenses L3-L4 Attack Traffic Attack Leakage Good Traffic Protected Critical Infrastructure Good Traffic Attack Traffic On-Premises Defenses L3-L7 Good Traffic Good Users Attackers N Always on Redirection Method Attack Type Size of Attack Base Service $ $$ $$$ $$$$ Cloud Service Pricing 30 Mins. 20Mins. 10 Mins. Attack Begins Attack Detected Rerouted to Scrubbing Center Time to Reroute Attack Detection to Prevention Process
  • 15. Conclusions: There is no one-size-fits-all solution 15 r Plan for day-to-day protection against baseline attacks Consider solutions that you can turn around and monetize Think about the cost of mitigation in a 24/7 attack environment: human and capital Prepare for larger sustained attacks and massive spikes What is Your DDoS Protection Plan?
  • 16. Advanced DDoS/Cyber Threat Protection Comprehensive Visibility © 2014 Corero www.corero.com16 Next Generation Architecture
  • 17. Corero SmartWall® Network Threat Defense ADVANCED DDOS & CYBER THREAT DEFENSE TECHNOLOGY BUILT ON NEXT GENERATION ARCHITECTURE COMPREHENSIVE ATTACK VISIBILITY & NETWORK FORENSICS SmartWall Threat Defense System (TDS)  Enterprises & Service/Hosting Providers  On-Premises or Cloud deployments  Protection in modular increments of 10 Gbps  In-line or scrubbing topologies © 2014 Corero www.corero.com17 Confidential
  • 18. Comprehensive Visibility Security Events Threat Intelligence System Health Data Forensics Data Network Statistics Powered by Corero First Line of Defense® VALUABLE RAW DATA ACTIONABLE SECURITY ANALYTICS & VISUALIZATION Real-time Dashboards Historical Reporting Forensic AnalysisBehavioral Analysis Virtual SOC Portal Powerful Analytics Engine © 2014 Corero www.corero.com18 10:00 PM
  • 19. Visibility – Attack Analytics & Reporting © 2014 Corero www.corero.com
  • 20. Internet Corero SecureWatch® Analytics Portal Corero Secure Operations Center CORERO SOC CAN REMOTELY ASSIST CUSTOMERS AND PARTNERS Corero Partner CORERO PARTNERS CAN VIEW DASHBOARDS OF CUSTOMERS THEY MANAGE Corero Customer CORERO CUSTOMERS CAN VIEW DASHBOARDS OF THEIR OWN DATA DASHBOARD 1 DASHBOARD 2 DASHBOARD 3 DASHBOARD 4 DASHBOARD 5 DASHBOARD 6 Corero SecureWatch Analytics App Site A Site B © 2014 Corero www.corero.com20
  • 21. First Line of Defense Applications © 2014 Corero www.corero.com8 Protected Critical Infrastructure and Services In the Cloud Service providers, IT hosting and Cloud providers On Premises Enterprises – financial services, e-commerce providers, gaming, education 1- 10 Gbps SLB/ADC IPS/APT WAF SP Internet
  • 22. © 2014 Corero www.corero.com22 Arrange for a proof of concept Learn more at: www.corero.com Join the Conversation @Corero @StephenJGates @SecurityBistro Corero Security Blog – The Security Bistro www.securitybistro.com NEXT STEPS
  • 23. Thank You! For a copy of this presentation: info@corero.com

Hinweis der Redaktion

  1. Corero First Line of Defense introduction
  2. DDoS attacks have been increasing in frequency, capacity and overall effectiveness in recent months. This is just a sampling. You will notice a variety of spikes on this chart that indicate single attacks that that neared or exceeded 300Gbps per second. 100Gbps attacks are no longer uncommon, and there are very few environments that can withstand that class of attack. 20% of datacenter downtime is attributed to DDoS attacks Average downtime of 86 min, translating to an average of 86k in costs. With Total outage damage averaging 700k This is a sophisticated problem that requires a First Line of Defense.
  3. In an era where more bandwidth is required, and more bandwidth is being purchased, organizations are increasing their attack surface from a volumetric DDoS attack perspective. Corero provides a FLoD that prevents network and service outages by blocking attacks in real time. We do this unlike most competitive offerings that provide strictly scrubbing center solutions. Our solution ensures that customers’ online services are maintained even while under attack. We block all attack traffic while allowing the good traffic to transit into your environment. We provide robust analytics/reporting to gain insight into the attacks and threats against your network. The FLoD extends the effective life of your security investments—your firewalls, IPS’s etc, by protecting those security solutions from attacks allowing them to operate as intended without forcing you into costly upgrades to support the expanded bandwidth requirements associated with the peak of attacks.
  4. The Corero FLoD employs a Next Generation architecture that delivers advanced DDoS and cyber threat protection, as well as comprehensive visibility into the attack landscape associated with your network. We will dig into each of these key areas in the following slides.
  5. Present the product line in context of the bandwidth requirements. Dave L to mark up Evolutionary deployment for existing customers Existing DDS deployments can be scaled up without a fork lift upgrade with a SmartWall as an added component
  6. From a visibility perspective the Corero FLOD correlates security event info along with threat intelligence – like information about clients perpetrating an attack, their geo-location, the targeted victim server, and a host of other correlated event information provided by the Corero security analytics . We incorporate system health data on our appliances in your network as well as network statistics and forensics data about all of the flows moving within your environment. We present this in a virtual security operations center portal, which allows you to utilize our package analytics tool without having to invest in your own. This incorporates a powerful analytics engine that can determine real actionable security recommendations and even visualization in real time. Our dashboards show attacks as they occur, top attacks against an environment over any period of time. We offer historical reporting, behavioral analysis, full drill down for forensics capabilities to investigate any attack against your environment.
  7. All of this is packaged within the Corero SecureWatch analytics portal. For customers that don’t want to invest in their own SOC or don’t have the IT Staff of expertise to build this type of tool, we have provide a tool that allows you to optionally connect to the Corero SOC where our security analysts can remotely assist our partners and customers. Our customers can have a view of their own data, while our partners that are servicing their customers can also have a view and provide managed services on behalf of their customers using eth Corero environment. SecureWatch analytics is built on Splunk. So, for customers that are already invested in Splunk, we offer an application that seamlessly integrates with the Splunk environment that can be integrated into any analysis tools on that platform. All of our data is provided in sys log and can be optimized to work with any log management tool.
  8. There are couple of applications for the FLoD highlighted here. The first is in the cloud. Our hosting, service providers customers utilize FLoD to protect against attack s on their internet peering points, shown in the top boxes connected to the cloud. Additionally these customers can provide managed services to their customers. Whether they be tenants in a multi-tenant environment or service provider subscribers by aggregating our system at their edge. We also provide on premises capabilities to enterprise sand data center environments where we support the ability to mitigates from 1GB to 10GB and even beyond. In all cases we can scale independently up to 40Gbps , 100GB and beyond. The right hand description shows the FLoD provides DDoS protection in front of traditional security infrastructure, like firewalls, IDCs, WAF, IPS’s etc…by deploying the product there, we are protecting everything to the right of our devices from DDoS attacks. in many cases if the enterprise owns the router we can even deploy to the left of the router and protect it as well.
  9. Connect with your local sales personnel to discuss a POC. Why? Because if you take and deploy the Corero our First Line of Defense in your environment, you will be amazed at the amount attacks that are already occurring in your environment whether that be initial probes looking for vulnerable surfaces, or already significant attacks that are already occurring that you are not aware of. Our systems can be deployed in under an hour, up and running and providing benefit.