ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Denial of Service By: Samarth Shah and Navin Soni.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Akamai Confidential Web targeted DDoS attack: trends, tools and tactics Christiaan Ehlers, Senior Service Consultant – Akamai Technologies.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
Randomized Failover Intrusion- Tolerant Systems (RFITS) Ranga Ramanujan, Maher Kaddoura, John Wu, Clint Sanders, Doug Harper, David Baca Architecture Technology.
Firewalls and Intrusion Detection Systems
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
OWASP Mobile Top 10 Why They Matter and What We Can Do
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Chapter 13 – Network Security
Web Application Firewall (WAF) RSA ® Conference 2013.
Software Security Testing Vinay Srinivasan cell:
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
Presented by: Dr. Munam Ali Shah
--Harish Reddy Vemula Distributed Denial of Service.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
DDOS. Methods – Syn flood – Icmp flood – udp Common amplification vectors – NTP 557 – CharGen 359 – DNS 179 – QOTD 140 – Quake 64 – SSDP 31 – Portmap28.
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
DDoS Attacks on Financial Institutions Presentation
Cost-Effective Strategies for Countering Security Threats:  IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Securing Your Web Application in Azure with a WAF
Instructor Materials Chapter 7 Network Security
Instructor Materials Chapter 9: Testing and Troubleshooting
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
AKAMAI INTELLIGENT PLATFORM™
CORE Security Technologies
F5 Networks Solutions Silverline Silverline
Modelli di Controllo e Mitigazione per Attacchi DDoS
6. Application Software Security
Presentation transcript:

ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS

Agenda  DDoS Trends  DDoS Attacks  DDoS Mitigation  Useful tools  Q&A

DDoS Trends

Motivation Behind DDoS/DoS Attacks – Political/Hacktivism – Ransoms – Retaliation – Competition – Unknown

DDoS Trends Large volume network flood attacks High & Low rate application DoS attacks “Low & Slow” DoS attacks Brute force attack Web application attacks (e.g. XSS, Injections, CSRF) SYN flood Port scan Network scan Intrusion Intrusion, Malware SHUT DOWN

DDoS Trends Volumetric network level Application level, Encrypted Low & Slow Directed Application DoS Intrusions Web attacks (injections, XSS,…)

DDoS Trends These random request techniques force CDNs to “raise the curtain” – All the attack traffic is disembarked directly to the customer premise – More complex to mitigate attacks masked by CDN Internet CDN Customer site

DDoS Trends (future?) What about IPv6? You may not use in your organization, yet most newer desktops (Windows 7 anyone?) –Tunnel IPv6 over IPv4 (Utilities moving to IPv6 to address meters)….and on top of that they are wireless as well. It’s seem feasible for someone to build a botnet using mobile phones. Add 4G to the mix and you have plenty of bandwidth to ‘play’ with. QR codes anyone? WiFi is now carrying critical applications. There are host of WiFi level DDoS attacks (both AP and controller) OpenFlow?

DDoS Mitigation

The Attack Cycle

DDoS Attacks Volume Metric attacks (pipe fillers) – SYN Floods – UDP Floods – DNS Floods – Amplification attacks (mostly DNS, but could also be VoIP) Application layer attacks (low and slow) – SlowLoris – Hash Attack – PyLoris (HTTP, SMTP, IMAP…) – RUDY (R-U-DEAD-YET) – SSL (server has to work 10 times harder than the SSL client)

DDoS Mitigation Internet Ingress Traffic with Attack Network Traffic – In/Out-bound Ingress Clean Traffic Scrubbing centers Protected customer Anti-DDoS 24x7 SOC MSP “CPE” Mitigator Premise Based Scrubbing 1.Better visibility and response time 2.Coverage Low & Slow Application level DoS attacks Encrypted attacks Asymmetrical traffic issues “Local” Mitigation 3. Signaling capabilities Detection Base lines RT signatures Scrubbing center Bandwidth attacks High capacity scrubber Multi-home (Carrier agnostic) Anti-DoS SOC Signaling (Diversion decision) “Always-On” Solution

DDoS Mitigation Who can solve the problem – Firewalls – IPS – WAF – ADC – Web Proxies A single technology does not solve the problem Architecture, Architecture Elements and Architecture need to be sized and verified

DDoS Mitigation Architecture – Cloud Scrubber- volumetric attacks – CPE Scrubber- app attacks, low and slow – Border Routers – Tier 1 FW- presentation – ADC- SSL termination – WAF- application attacks, SQL Injection – IPS- host based attacks – Tier 2 FW- application Border Router SSL Terminator CPE Scrubber SSL Terminator CPE Scrubber Border FW ADC WAF IPS Cloud Scrubber

Helmuth von Moltke Explains Modern DDoS "No plan of operations extends with certainty beyond the first encounter with the enemy's main strength” or "no plan survives initial contact with the enemy”

Usefool tools Logstalgia (visualization tool…reads NCSA formatted server logs) PyLoris (multi purpose application layer attack tool…requires Python) SlowLoris (HTTP only) LOIC (sourceforge.net…Low Orbit because it send attacks at L3/4) HOIC (similar to SlowLoris, but has booster back to ‘adapt’ to countermeasures)

17 How can individual machines cause a big enough distraction with todays typical volume of network traffic? My lowend Core i3 laptop can put out a 12K PPS DDoS Multiply that by even a few thousand machines…

Thank You