It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

TCP for today’s Web. Connections today Web-page > 300KB but objects are small 7.5KB -2.4KB [25] lots of small objects in a page. Implication: TCP Handshake.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
1 | © 2013 Infoblox Inc. All Rights Reserved. 1 | © 2014 Infoblox Inc. All Rights Reserved. Domain Name System (DNS) Network Security Asset or Achilles.
2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Frederic Fleurat SIT mazagan 2014 Frederic Fleurat
DDoS Attacks: The Latest Threat to Availability. © Sombers Associates, Inc The Anatomy of a DDoS Attack.
Akamai Confidential©2011 Akamai. In the Cloud Security Highlighting the Need for Defense-in-Depth R. H. Powell IV Director, Government Solutions CISSP.
Barracuda Web Application Firewall
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Web server security Dr Jim Briggs WEBP security1.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
Norman SecureSurf Protect your users when surfing the Internet.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
© 2010 Akamai Headlines You May Have Seen. © 2010 Akamai Headlines You DID NOT See POWERING A BETTER INTERNET President Delays Trip Due to Cyber Attacks.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Web Application Firewall (WAF) RSA ® Conference 2013.
22 Social Media Marketing Trends for 2010 Dreamgrow Digital
1 | © 2013 Infoblox Inc. All Rights Reserved. 1 | © 2014 Infoblox Inc. All Rights Reserved. Domain Name System (DNS) Network Security Asset or Achilles.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
An Internet-Wide View of Internet-Wide Scanning.  Scanning  IPv4  Horizontal scanning – individual ports  Network telescope - darknet What is internet.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
DoS/DDoS attack and defense
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
DoS Threat Landscape Sean Newman Director Product Management Q © 2016 Corero
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Richard Bible Security Solution Architect, F5 Networks DDOS EQUALS PAIN.
| #CLOUDSEC Hoster under Attack ProtonMail - Switzerland Carl Herberger, Vice President, Security Solutions Radware
Securing Information Systems
BUILD SECURE PRODUCTS AND SERVICES
DDoS Attacks on Financial Institutions Presentation
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
Outline Basics of network security Definitions Sample attacks
Modelli di Controllo e Mitigazione per Attacchi DDoS
Presentation transcript:

It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security

Radware Global Network and Application Security Report

Slide 3 Radware’s ERT 2013 Cases Unique visibility into attacks behavior Attacks monitored in real-time on a daily basis More than 300 cases analyzed –Customers identity remains undisclosed

The Threat Landscape DDoS is the most common attack method! Attacks last longer Government and Financial Services are the most attacked vectors Multi-vector trend continues Slide 4

DDoS Attacks Results Public attention 3.5% Results of one-second delay in Web page loading: decrease in conversion rate 2.1% decrease in shopping cart size 9.4% decrease in page views 8.3% increase in bounce rate Source: Strangeloop Networks, Case Study: The impact of HTML delay on mobile business metrics, November 2011 Slide 5

App Misuse DDoS Attack Vectors Large volume network flood attacks Network Scan Syn Floods SSL Floods “Low & Slow” DoS attacks (e.g.Sockstress) HTTP Floods Brute Force Slide 6 Internet Pipe Firewall IPS/IDS ADC Attacked Server SQL Server Connection Floods

2013 Attack Tools Trends

Attack Vectors Used Slide 8

Reflective Amplification Attacks on the Rise Slide 9 Easier to create Based on UDP protocol –Targeted protocols: DNS, NTP, SNMP –UDP connectionless nature enables to spoof the IP Address Key feature in creating reflective attack Obfuscates attacker real identity (IP address) Amplification affect: 8 – 650 times larger than originated message

DNS Based Attacks Most frequently used attack vector Amplification affect –Regular DNS replies - a normal reply is 3-4 times larger than the request –Researched replies – can reach up to 10 times the original request –Crafted replies – attacker compromises a DNS server and ensures requests are answered with the maximum DNS reply message (4096 bytes) - amplification factor of up to 100 times Slide 10

Nine day volumetric attack First to break the ceiling of 100 Gbps –Attack reached bandwidth of 300 Gbps Target: Anti-spam organization providing Internet service Attacker: CyberBunker and Sven Olaf Kamphuis Internet Service Provider Notable Amplification Attack: Spamhaus Slide 11

Harder to Detect: Web Stealth Attacks Slide 12 More than HTTP floods Dynamic IP addresses –High distributed attack –Attacks using Anonymizers / Proxy –Attacks passing CDNs Attacks that are being obfuscated by SSL Attacks with the ability to pass C/R Attacks that use low-traffic volume but saturate servers’ resources

Attacks on Login Page are Destructive Cause a DB search Based on SSL No load-balancing yet Attacks on Login Page are Destructive Cause a DB search Based on SSL No load-balancing yet Web Stealth Attacks Slide 13

Implications of Login Page Attacks Slide 14

Login Page Attacks Over 40% of organizations have experienced Login Page Attack in 2013 Slide 15

Behind the Scenes of Notable Attacks: Operation Ababil

“Innocence of Muslims” Movie July 12, 2012 “Innocence of Muslims” trailer released on YouTube September 11, 2012 World-wide protest against the movie resulting in the deaths of 50 people September 18, 2012 Operation Ababil begins Slide 17

Operation Ababil Background July 12, 2012 “Innocence of Muslims” trailer released on YouTube September 11, 2012 World-wide protest against the movie resulting in the deaths of 50 people Slide 18

Operation Ababil The cyber attack is an act to stop the movie First targets Bank of America NYSE First targets Bank of America NYSE Group name is “Izz ad-din Al Qassam cyber fighters” Slide 19

Operation Ababil Timeline Slide 20

Operation Ababil Target Organizations Financial Service Providers Slide 21

Operation Ababil Attack Vectors Slide 22

Overcoming HTTP Challenges Slide 23

Attackers Shorten Time to Bypass Mitigation Tools “Peace” Period Pre-attack Phase Post-attack Phase Pre-attack Phase Post-attack Phase Slide 24

Fighting Cyber Attacks: Best Practices

Building the Strategy Slide 26 DON’T assume that you’re not a target BUILD your protection strategy and tactics LEARN from the mistakes of others DON’T assume that you’re not a target BUILD your protection strategy and tactics LEARN from the mistakes of others

Adding Tactics Slide 27 Don’t believe the DDoS protection propaganda – Test instead Understand the limitations of cloud-based scrubbing solutions Not all networking and security appliance solutions were created equal Don’t believe the DDoS protection propaganda – Test instead Understand the limitations of cloud-based scrubbing solutions Not all networking and security appliance solutions were created equal

You Can’t Defend Against Attacks You Can’t Detect Encrypted Low & Slow Encrypted DoS Vulnerability CDN/Proxy/Anonymizer attacks Dynamic IP Directed Attacks – Exploits Scraping and Data Theft Ajax and API attacks Slide 28

You Can’t Defend Against Attacks You Can’t Detect Network DDoS SYN Floods HTTP Floods Slide 29

Thank You