2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala

Slides:



Advertisements
Similar presentations
Managing IP addresses for your private clouds 2013 ASEAN CAS Summit Bangkok, Thailand 7 February 2013 George Kuo Member Services Manager.
Advertisements

SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
DDOS Defense by Offense OFFENSE Presented by: Anup Goyal Aojan Su.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Barracuda Web Application Firewall
FirePOWER Services for ASA Sizing Guidance and Performance Discussion
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
Web server security Dr Jim Briggs WEBP security1.
Arbor Multi-Layer Cloud DDoS Protection
Arbor Networks solutions
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense.
Worldwide Infrastructure Security Report C F Chui, Arbor Networks.
Department Of Computer Engineering
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
SiteLock Internet Security: Big Threats for Small Business.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Market Analysis Decision Group.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
© 2010 Akamai Headlines You May Have Seen. © 2010 Akamai Headlines You DID NOT See POWERING A BETTER INTERNET President Delays Trip Due to Cyber Attacks.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
Honeypot and Intrusion Detection System
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Akamai Technologies - Overview RSA ® Conference 2013.
--Harish Reddy Vemula Distributed Denial of Service.
Carleton University School of Computer Science Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte, P.C. van Oorschot, Evangelos.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Chapter 5: Implementing Intrusion Prevention
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Bandwidth Distributed Denial of Service: Attacks and Defenses.
Module 10: How Middleboxes Impact Performance
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
The Dark Menace: Characterizing Network-based Attacks in the Cloud
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
DoS/DDoS attack and defense
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Page 2 Biggest DDoS attack in history slows Internet, breaks record at 300 Gbps 'Biggest cyber-attack in history' slows down internet worldwide after.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security+ Simulations
Web Application Protection Against Hackers and Vulnerabilities
DDoS Attacks on Financial Institutions Presentation
Fraud Mobility Ken Meiser VP- Identity Solutions.
Real-time protection for web sites and web apps against ATTACKS
Security in Networking
6. Application Software Security
DhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com
Presentation transcript:

2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala

Page 2 - Company Confidential Agenda  DDoS Basics  Worldwide Infrastructure Security Report and ATLAS  LAT statistics

Page 3 - Company Confidential Distributed Denial of Service (DDoS)

Page 4 - Company Confidential Distributed Denial of Service (DDoS)

Page 5 - Company Confidential Distributed Denial of Service (DDoS)

Page 6 - Company Confidential During a Distributed Denial of Service (DDoS) attack, compromised hosts (bots) or vigilante users from distributed sources overwhelm the target with illegitimate traffic so that the servers can not respond to legitimate clients. What is a DDoS Attack? 6

Page 7 - Company Confidential The DDoS Attack Surface  Any part of your network or services that is vulnerable to an attack – Network Interfaces – Infrastructure – Firewall/IPS – Servers – Protocols – Applications – Databases  Attackers will find the weakness

Page 8 - Company Confidential DDoS Threats are Top of Mind  4 of the top 6 threats seen over the last 12 months are DDoS related  The top 4 perceived threats for the next 12 months are DDoS related  DDoS threat awareness is high Source: Arbor Networks 2011 Infrastructure Security Report

Page 9 - Company Confidential Sources of Data  2011 Worldwide Infrastructure Security Report – Survey of Internet operators focused on security practices, incidents and trends – 114 respondents worldwide – Data based on measurements, insights and opinions of respondents  ATLAS Data Trends – Data collected from 100+ Arbor deployments and honeynets sharing attack and traffic statistics – Empirical data based on measurements taken in production deployments

Page 10 - Company Confidential 2011 Infrastructure Security Survey  Survey conducted in October through November 2011  114 total respondents across different market segments  54% service providers, 15% T1 providers  “Other” includes VOIP, wholesale internet, DDoS mitigation, database repository payment and credit sites

Page 11 - Company Confidential Key Findings in the Survey  Ideologically-motivated ‘Hacktivism’ and On-line vandalism DDoS attacks are the most commonly identified attack motivations  10 Gbps and Large Flood-Based DDoS Attacks Are The “New Normal”  First-Ever Reports of IPv6 DDoS Attacks 'in the Wild' on Production Networks  Increased Sophistication and Complexity of Application Layer (Layer 7) DDoS Attacks and Multivector DDoS Attacks Are Becoming More Common  Continued Uncertainty Around Visibility & Security of Mobile/Fixed Wireless Networks  Stateful Firewalls, IPS and Load-Balancers Devices continue to Fall Short on DDoS

Page 12 - Company Confidential DDoS Attack Frequency over last 12 Months  91% of respondents see at least 1 DDoS attack per month up from 76% in 2010  44% of respondents see 10 or more attacks per month up from 35% in 2010

Page 13 - Company Confidential Top DDoS Motivations  Top two attack motivation categories are fueled by personal beliefs and inclinations of attackers  Exponential increase in risk of being attacked

Page 14 - Company Confidential Large Attacks are Now Commonplace  Aggregate attack sizes have leveled off but remain at levels capable of overwhelming most Internet operators  13% of respondents report attacks above 10 Gbps  40% of respondents report attacks above 1 Gbps  Largest pps attack reported is 35 Mpps keeping pace with 2010

Page 15 - Company Confidential Max BPS Misuse DDoS attacks per country in LAT 2011  Largest bps attack in LAT Gbps in Brazil  Largest bps attack reported is 60 Gbps WW

Page 16 - Company Confidential Avg BPS Misuse DDoS attacks per country in LAT 2011  Top Avg BPS attacks above 1 Gbps in LAT, Perú and Uruguay.  40% of respondents report WW attacks above 1 Gbps

Page 17 - Company Confidential Max PPS Misuse DDoS attacks per country in LAT 2011  Largest pps attack in LAT Mpps in Brazil  Largest pps attack reported is 35 Mpps WW

Page 18 - Company Confidential Avg PPS Misuse DDoS attacks per country in LAT 2011  Top Misuse Avg PPS attacks in LAT M pps in Perú

Page 19 - Company Confidential Application Layer and Multi-vector DDoS  A higher percentage of attacks reported on HTTP and IRC relative to 2010 – HTTP (87% vs 84%) and on IRC (11% vs 0%) relative to 2010  Lower percent of attacks on DNS, SMTP, HTTPS and VOIP – DNS (67% vs 76%), SMTP (25% vs 40%), HTTPS (24% vs 35%) and VOIP (19% vs 38%)  SSL based attacks reported included TCP and UDP floods against port 443, port scanning attempts and Slowloris

Page 20 - Company Confidential Destination ports breakout DDoS attacks in LAT %  53 7%  80 4%  IP fragment (0)

Page 21 - Company Confidential Most Common Application Layer Attacks Seen  Majority of known attack types are focused against web properties

Page 22 - Company Confidential DDoS Attacks Against Data Centers  56% of Data Center respondents observed DDoS attacks in 2011  The percentage is down from 2010 which showed 69%  25% of respondents observed DDoS attacks that exceeded the total bandwidth into the Data Center  2010 which was only 15%

Page 23 - Company Confidential Fragility of Stateful Devices in the IDC  Over 40% of respondents reported an inline firewall and/or IPS failing due to a DDoS attack.  This is slightly lower number than 2010 where 49% reported a firewall and/or IPS failure.  10% of respondents do not put firewalls/IPS in front of IDCs  96% of respondents use load balancers within their IDCs  43% of respondents reported a stateful Load Balancer (or ADC) going down due to a DDoS attack

Page 24 - Company Confidential DDoS Event Response Drills  Almost 70% of survey respondents have never practiced responding to a DDoS Attack event  Only 2% improvement in percentage of respondents that have rehearsed attack responses

Page 25 - Company Confidential CERTs  Not my job  None in my region  We don’t see a need  Organization not big enough  Input from such bodies not deemed useful  Does your organization have a CERT or CSIRT (e.g., KPRCERT)?  66% of respondents collaborate with a Government or National CERT/CSIRT  Those that don’t cite several reasons why. Most due to lack of time or CERT

Page 26 - Company Confidential Mobile Services are Pushing Technology Adoption  27% of survey respondents offered mobile services  Ranging from 1M to over 100M subs  Range of subs shifted up, reflecting growth in Mobile  LTE availability accelerating  LTE offered by 28.6%, up from 9% last year  Another 52% plan to have LTE deployed by 2014  IPv6 goes ahead  50% plan to introduce IPv6 within next 12 months.  9.6% already have it.

Page 27 - Company Confidential Mobile Infrastructure DDoS Attacks  50% see application layer attacks on their networks  Broad spread of attack types - similar to what we see elsewhere  DNS is the most common target – target with the most widespread damage potential  Surprise that HTTP was not top as last year, especially given general trends

Page 28 - Company Confidential IPv6 Rollout and Growth  Two thirds of respondents have deployed IPv6 in their networks  Majority of those who deployed IPv6 are using IPv6 for internal addressing of their network infrastructure  Two thirds of those who have not deployed IPv6 plan to do so in near term  Traffic and volume remain low with varied forecasts for growth  One respondent provided following answer indicating overall mood: – “depends of what youtube and company are doing ;)”

Page 29 - Company Confidential IPv6 DDoS Attacks  First report of an IPv6 DDoS attack in the history of the WISR  Low frequency of attacks reflect low adoption of IPv6 for critical services

Page 30 - Company Confidential DNS Security is a Focus  Numbers are consistent with 2011 survey.  87% of all respondents offer DNS services.  77% have security teams responsible for DNS Services – 63% Main Security Group – 23% No Security Group – 14% Specific Security Group

Page 31 - Company Confidential Outages from DNS Attacks  Overall attack frequency has increased year over year  DNS attacks are down a little – 67% in 2011 vs 76% in 2010  Outages from DNS attacks are much lower – 13% in 2011 vs 32% in 2010  Conclusion: DNS attack defense is improving

Page 32 - Company Confidential Misuse BPS breakout DDoS attacks in LAT 2011/2010

Page 33 - Company Confidential Misuse PPS breakout DDoS attacks in LAT 2011/2010

Page 34 - Company Confidential Duration breakout DDoS attacks in LAT 2011 >30 <60 min – 43% >1 <3 hrs - 30%

Page 35 - Company Confidential Misuse Duration DDoS attacks in LAT 2011  Top 3 longest DDoS attacks  Brazil 14d 6h 29m  Argentine 2d 0h 25m  Dominican Rep 1d 0h 14m  Average duration DDoS attacks  1h 45 m

Page 36 - Company Confidential Overall breakout comparison LAT 2011vs2010

Thank You CE Latinamérica Carlos A. Ayala