State of the Internet Security – Q2 2017

Slides:



Advertisements
Similar presentations
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Advertisements

IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Web Application Firewall (WAF) RSA ® Conference 2013.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Chapter 5: Implementing Intrusion Prevention
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Cybersecurity: Expanding the Front Lines of Defense Dr. George K. Kostopoulos Professor Electrical and Computer Engineering Cybersecurity New York Institute.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Kona Security Solutions - Overview
DDoS Things You Need To Know About DDoS Attacks DDoS.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Beyond Fast Flux: Parasitic Command And Control Networks in the Near Future.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
DISA Cyclops Program.
Botnets A collection of compromised machines
Are our smart devices really that smart ?
Internet Quarantine: Requirements for Containing Self-Propagating Code
DDoS In the Real World Do DDoS attacks really happen?
DDoS Attacks on Financial Institutions Presentation
Cisco 2017 Security Annual Report
A lustrum of malware network communication: Evolution & insights
Content Distribution Networks
IoT devices as an attack vector
Real-time protection for web sites and web apps against ATTACKS
Cybersecurity BGP hijacking DDoS Botnets What’s next?
Internet and Intranet.
Compliance with hardening standards
Defeat Tomorrow’s Threats Today
Announcing DDoS Protection preview for Azure
Daniel Kouril Sven Gabriel
DDoS In the Real World Do DDoS attacks really happen?
Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my.
Botnets A collection of compromised machines
Jon Peppler, Menlo Security Channels
DoS - DNS Attacks A famous DNS attack was a DDoS "ping" attack. The attackers broke into machines on the Internet (popularly called "zombies") and.
Internet and Intranet.
DRUPAL CON NASHVIllE 2018 DRUPALCON NASHVILLE.
Internet of Things Vulnerabilities
Internet Worm propagation
Sizing …today. T: Here’s how. .
AKAMAI INTELLIGENT PLATFORM™
Home Internet Vulnerabilities
DRDoS Attacks Jacob Wood.
Internet and Intranet.
Defending high value targets in the cloud using IP Reputation
Protect Your Ecommerce Site From Hacking and Fraud
F5 Networks Solutions Silverline Silverline
Protecting On-Line Services from the Internet of Compromised Things
Content Delivery and Remote DNS services
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
Modelli di Controllo e Mitigazione per Attacchi DDoS
Internet and Intranet.
Introduction to Internet Worm
Measurement and Analysis of Hajime: a Peer-to-peer IoT Botnet
Presented by Shashank Shekhar Sahoo
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

State of the Internet Security – Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager

Topics Introduction DDoS Attack Trends Web Application Attack Trends Spotlights Resources

Introduction

Introduction – Akamai Intelligent Platform Up to 30% of all Internet traffic Globally distributed cloud platform Akamai Intelligent Platform Scale │ over 230,000 servers │ seven scrubbing centers │ thousands of name servers Distribution │ 120 countries │ over 3,200 locations │ more than 1,400 networks Resiliency │ automatic failover within network │ multiple networks for independent services

Introduction – Akamai Cloud Security Integrated web security Akamai Intelligent Platform DDoS │ always-on │ automated response WAF │ proprietary rules engine │ highly accurate │ no performance impact Bot management │ manage, not mitigate │ customizable │ granular visibility and reporting IP reputation │ hundreds of millions of IPs monthly │ custom policies based on risk of attack

DDoS Attack Trends

Compared to Q2 2016 18%  Total DDoS attacks 17%  Infrastructure layer (3 & 4) attacks 13%  Reflection-based attacks 19%  Average number of attacks per target DDoS is a cyclic phenomenon. Attacks were down from Q2 last year, but not as much as might be expected given that the number of IP addresses involved in volumetric DDoS attacks dropped 98% from 595,000 in Q1 to 11,000 in Q2. Egypt was the origin of the greatest number of unique IP addresses used in frequent DDoS attacks with 32 percent of the global total. Last quarter, the United States held that spot and Egypt was not among the top five.

Compared to Q1 2017 28%  Total DDoS attacks 27%  Infrastructure layer (layers 3 & 4) attacks 21%  Reflection-based attacks 28%  Average number of attacks per target Largest attacks by quarter: The largest DDoS attack was 75 Gbps, which while quite large was much smaller than the largest attack in 2016 of 623 Gbps. For the first time in many years, Akamai observed no large attacks exceeding 100 Gbps. Q2 2017 Q1 2017 Q4 2017 Q3 2017 75 Gbps 120 Gbps 517 Gbps 623 Gbps

DDoS Attacks Per Target, Q3 2016 – Q2 2017 The average number of DDoS attacks per target in Q2 was 32. The most targeted organization faced 558 DDoS attacks.

DDoS Attack Frequency by Industry, Q1 2017 & Q2 2017 The gaming industry was targeted in 82% of DDoS attacks. A small number of gaming firms were the targets of most of these attacks. DDoS attackers are more persistent than ever, attacking targets an average of 32 times over the quarter. One gaming company was attacked 558 times or approximately six times a day on average.

DDoS Attack Vector Frequency, Q2 2017 NTP, CHARGEN, and DNS continued in the top three places. UDP Fragment traffic is technically in the top spot, but this is driven by the other UDP vectors and is extremely difficult to categorize.

Top 10 Most Frequent Attack Vectors, Q3 2016 to Q2 2017 DDoS attack traffic jumped markedly in late June, after two quarters of decline.

Reflection-Based DDoS Attacks, Q2 2016 – Q2 2017 Reflection DDoS vectors use common Internet protocols to generate DDoS traffic aimed at the attacker’s target. Reflection sources range from large servers to printers to small Internet of Things devices, such as surveillance cameras and home networking routers. Reflection sources range from large servers to printers to small Internet of Things devices, like surveillance cameras and home networking routers.

Top Reflection-Based DDoS Reflectors, Q2 2017 The most-used reflectors were SSDP and NTP. The use of SSDP reflection can be directly linked to Internet of Things devices. NTP reflection sources are typically unpatched servers. Sentinel reflection sources, the third most common reflectors, include powerful servers with high bandwidth availability, such as university servers.

Top Ten Reflection Source IP by ASN, Q2 2017 Two ASNs in China and an ASN in Argentina sourced the most DDoS reflection traffic, with the top 10 ASN reflection sources accounting for approximately 10% of reflection sources worldwide. Near the bottom of this chart, we see three ASNs (autonomous system number) with the most active reflector sources were in two China locations and one in Argentina.

ASN Reflector Ratio by Total ASN IP Count (IPv4), Q2 2017 The ratio of reflector IP addresses to total IP addresses was highest for ASN 22927 in Argentina, with 1.62% of all its IP addresses serving as DDoS reflectors.

Web Application Attack Trends

Compared to Q2 2016 25%  Total web application attacks 86%  Attacks from the U.S. (current top source country) 86%  Attacks from Brazil (Q2 2016 top source country) 44%  Increase in SQLi attacks While DDoS attacks were down, the total number of web application attacks were up compared to the same quarter a year ago. Much fewer attacks came from Brazil. SQLi attacks were up 44%.

Compared to Q1 2017 5%  Total web application attacks 4%  Attacks sourcing from the U.S. (top source country) 21%  SQLi attacks Application attacks continued to slowly grow with a 5% increase quarter-over-quarter and a 28% increase year-over-year. Unlike DDoS attacks, web application attacks involve relatively little traffic and can be hard to detect.

Web Application Attack Frequency, Q2 2017 SQL injection (SQLi) attacks were used in more than half (51%) of attacks, nearly 185 million alerts in Q2. This is up from 44% of all web application attacks in Q1. Attackers know these vulnerabilities exist in many sites and put increasing resources into finding ways to compromise them.

Top 10 Source Countries for Web Application Attacks, Q2 2017 The U.S. (34%) and China (10%) were the leading sources of web application attacks, followed by Brazil (8%) and the Netherlands (6%).

Top 10 Target Countries for Web Application Attacks, Q2 2017 The vast majority of web application attack targets were in the U.S.

Spotlights

PBot DDoS Botnets: More Power, Fewer Bots These UDP and DNS DDoS attacks occurred in May and June 2017. Attackers recycled PBot, decades-old PHP code. Infected devices appeared to be web servers. Method of infection might be Apache Struts vulnerabilities. Number of bots per botnet is fewer than 400, much smaller than IoT botnets. Largest attack to date was 75 Gbps, the largest DDoS attack in Q2. Targeted customer was in the financial industry

Identifying Behavior of Networks Infected by DGA Malware Domain generation algorithms (DGAs) are used by malware to establish command and control that is difficult to take down. This graph reveals a difference in the DNS NX response rate on infected and clean networks. Knowing this and using machine learning can lead toward the detection of malware activity.

Mirai Botnet Command and Control Structure and Behavior We found that Mirai command and control nodes are usually active for only a short time. This plot shows the activity of 12 Mirai C&C nodes. Each color is a unique IP address. The blue node, for example was active for a week, and then went quiet or disappeared.

Mirai Botnet Targeting Behavior This cloud of dots shows all the networks targeted by Mirai command and control nodes in our 288-day dataset. Some targets received very few DDoS attacks while others were targeted by thousands of DDoS attacks. The larger dots received more attacks. The largest dot represents more than 10,000 attack commands. Akamai is on the left, in orange outlined in black. Akamai was targeted more than 1,200 times.

Cloud Security Resources

Q2 2017 Cloud Security Resources The Akamai Blog is a timely source of threat intelligence. Some of the topics covered in Q2 include: Passive HTTP2 Client Fingerprinting, a white paper DDoS Attacks against DNS Infrastructure in the News Low Risk Threat: DDoS Extortion Letters Spotlight on Malware DGA Communication Technique WannaCry: What We Know Dealing with Petya Full Report: http://akamai.me/2faEf2k