Download presentation
Presentation is loading. Please wait.
Published byValerie Booker Modified over 6 years ago
1
Is Your Online Security Intelligent? Internet Performance Management
Corey Hamilton Product Marketing, Internet Performance Management
2
Everyone Talks About Internet Security
3
Cloud and Hosting Security Content Delivery Networks
Data Centers & Firewalls
4
Nobody Talks About Internet Security
5
Where’s the Security on the Internet?
Cloud and Hosting Providers Content Delivery Networks Customers Employees Partners The Internet: Fertile Grounds for an Attack Data Centers
6
OF INTERCONNECTED NETWORKS
THE INTERNET: IT’S A SYSTEM OF INTERCONNECTED NETWORKS @dyn
7
Where Does Your Data Flow?
● Average Path Across the Internet: Crosses the networks of between different NSPs and ISPs ● Each network typically includes hops ● Requests for data cross anywhere from hops across the Internet
8
Fertile Grounds for Security Threats
● You Don’t Own It ● You Can’t See Most of It ● Even non-malicious issues can affect your business These problems happen Thousands of times every day
9
So, Who’s Responsible for This?
● The Network Service Providers? ● The Internet Service Providers? ● Cloud Providers? ● Content Delivery Networks?
10
“My Hosting Provider/CDN Will Take Care of it”
Service Dashboard is Green “We are currently monitoring an external Internet provider issue that is causing interrupted service connectivity to AWS services for some customers. AWS services are not affected and continue to operate normally.” Netflix, Pinterest, and Slack (all AWS Customers) are knocked offline for 40 minutes
11
X It Wasn’t AWS’ Fault Netflix Customers Netflix Couldn’t See It
Pinterest Couldn’t See It Slack Couldn’t See It But...their customers were calling! Other Cloud Providers AWS Virginia Netflix Customers X The Internet Data Centers
12
Bad News: You Are Responsible for this
● You didn’t cause the problems ● You didn’t ask for it ● But, your customers will blame your company ● Who is/will be responsible for this at your company?
13
If You Can’t See It, You Can’t Defend It
What Kind Of Threats Are Out There?
14
A Couple Examples Man-in-the-Middle attacks ● DDoS Attacks
● Route Hijacking Man-in-the-Middle attacks ● Safe Harbor Compliance
15
The First Step in Defense:
Visibility Imagine somebody coming to rob your house. What if you could be alerted to this while they were still driving across town, rather than when they’re at your door??
16
Internet Visibility into DDoS Attacks
● Originate way outside your firewalls ● Detect the flood of traffic before it hits you ● Monitor for these 24x7 ● Global Networks ensure the bandwidth to withstand attacks
17
Early Mitigation of DDoS Attacks
● Be Alerted to DDoS Attacks occurring across the Internet ● Often seen as Enterprises shift traffic to scrubbing centers ● Redundancy provides options ● Two (or more) scrubbing centers ● Which is more available during an attack ● Shift traffic to scrubbing center that’s best able to keep up
18
Internet Visibility into Route Hijacking
● Identify Routing Anomalies ● Monitor changes to your prefixes and ASNs ● Visibility into Internet paths leading to your assets ● Identify and mitigate Man-in-the-Middle attacks
19
Example 1: Internet Initiative Japan (IIJ)
● Internal employee received fake letter to authorize an IP address block to another party ● Address space was transferred to malicious group ● IP address becomes associated with hacking efforts ● Occurred undetected for over a year ● Internet visibility eventually lead to its discovery
20
Example 2: Atomic Weapons Establishment
● Typically, data is passed from Houston to Great Britain ● Unintentional DNS update reroutes this traffic through Kiev, Ukraine ● Data ultimately arrives at destination in Great Britain ● Continues undetected for 5 days
21
How Do We Mitigate These Issues?
● Reactive Mitigation Begin monitoring your address space (ASNs, Prefixes) Ensure Redundant Paths (multiple providers or endpoints) Alerts when address space changes or performance to these assets is affected Update DNS to send traffic through desired paths
22
How Do We Mitigate These Issues?
● Planning Mitigation Leverage Internet Visibility to identify optimal locations for infrastructure Ensure ISP relationships send your data where you want it to go -- and not go Where you store your data dictates how end users will reach it. Internet paths flow through different networks depending on the destination
23
Current Trends
24
Safe Harbor Compliance
Where does your data travel?
25
Safe Harbor Compliance
A Friendlier Alternative
26
Where does your data travel?
A Performance Nightmare, Increased Risk
27
Where does your data travel?
A Performance Nightmare, Increased Risk -- Part 2
28
If you were a hacker, where would you focus your efforts?
Hackers Changing Their Focus If you were a hacker, where would you focus your efforts?
29
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.