DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense.

Slides:



Advertisements
Similar presentations
Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
 Unlike other forms of computer attacks, goal isn’t access or theft of information or services  The goal is to stop the service from operating o.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
Kill-Bots: Surviving DDoS Attacks That Mimic Legitimate Browsing Srikanth Kandula Dina Katabi, Matthias Jacob, and Arthur Berger.
SM3121 Software Technology Mark Green School of Creative Media.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Evil DDos Attacks and Strong Defenses Group 6: Yisi Lu, YuanTong Lu, Hao Wu, YuChen Liu, Hua Li.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Final Introduction ---- Web Security, DDoS, others
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
(c) University of Technology, Sydney Firewall Architectures.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
© Mike D. Schiffman. Synopsis  Introduction  Overview  Impetus  Internals  Implementation  Risk Mitigation  Futures.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
DoS/DDoS attack and defense
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Richard Bible Security Solution Architect, F5 Networks DDOS EQUALS PAIN.
Introduction to Information Security
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
Distributed Denial of Service (DDoS) Attacks
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Firewalls Purpose of a Firewall Characteristic of a firewall
Outline Basics of network security Definitions Sample attacks
Firewalls Chapter 8.
Distributed Denial of Service (DDoS) Attacks
Presentation transcript:

DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense

The 3 Main Types of Attack ‣ # 1 Big and Dumb - UDP, ICMP floods ‣ Attackers try to overwhelm your available Bandwidth resources  Y our ISP or Carrier may “Null route you” If your attack is disruptive to their network A good ISP or carrier will filter this out for you Although it still happens it is rarely the cause for outages Unfortunately it may be combined with other types of attack ‣ Consider having all non-essential traffic(ports) denied, as part of normal operations

The 3 Main Types of Attack There are a variety of good DDoS mitigation devices available today for 10-60K Beware of false positives, keep the rate limiting “loose “or just right ‣ #2 SYN Floods ‣ Syn type floods try to overwhelm CPU, Memory, OS limitations or Network gear

The 3 Main Types of Attack ‣ #3 Layer 7 attacks ‣ HTTP get attacks, CPU intensive, slows web server to a crawl * Sometimes hard to even detect, leads to misdiagnoses * Low bandwidth, low PPS Requires large(2K-200K+) Botnet Existing off the shelf mitigation gear is not very effective

‣ Our Observations over the last 12 months ending May 2010 The 3 Main Types of Attack UDP/ICMP flood only attacks account for less than 10% of total number of attacks SYN Flood only type attacks, account for less than 30% of total attacks Layer 7 only type attacks account for approximately 60 % of total attacks 80% of all attacks have 2 or more of the above components 80% of all attacks have a layer 7 component

Will I Be a Victim ? Why us ? ‣ Given the number of attacks VS number of websites Overall risk is still very low, but very unpredictable Renting Botnets are cheap and easy to operate (see control panel sample) 30% of attacks are sector targeted, 5-25 websites of similar nature are attacked at the same time. i.e. Jewelry, Electronics, Car Parts, Fitness Gear, etc The perpetrator is most likely a competitor trying to gain market share 40% are High risk sectors E-gaming, Social/Dating Networks, Online Pharmacies, Investment Info, Payment processors, etc The perpetrator is most likely a disgruntled customer or competitor Extortion is sometimes involved, but rare 30% are “one offs” No Logical reason

Rent-a-Bot Botnet control panel ‣ Can be rented for less Than $100.00/day ‣ Easy to operate Will I Be a Victim ? Why us ?

The Top 3 Misconceptions Fact vs Fiction ‣ #1 My Firewall/DDoS device will handle anything There is no easy to operate off-the-shelf box that will effectively stop all types of attacks in real-time ‣ #2 My engineers are brilliant and will be able to stop anything In reality most technical staff have very little experience in real world DDoS attacks Attack intensities and types change too often ‣ #3 My Hosting/Network provider will help me Most hosting providers are ill equipped to handle all types of attacks on an ad-hock basis Can be too time intensive for many hosting providers They will not risk network disruptions to other customers/ collateral damage

A Realistic Defense A simple layered approach UDP ICMP TCP UDP ICMP TCP TCP port * 80 * TCP port 443 * TCP/SYN * layer 7 attacks TCP port * 80 * TCP port 443 * layer 7 attacks Legitimate TCP requests Have your provider filter Everything except TCP port 80/443 Buy a box that has good SYN protection 1 million PPS + Use a reverse proxy and/or cache array

ONLINE DEMO