Cisco DDoS Solution Clean Pipes Architecture

Size: px
Start display at page:

Download "Cisco DDoS Solution Clean Pipes Architecture"

Transcription

1 Cisco DDoS Solution Clean Pipes Architecture Dynamic filters to block attack sources Anti-spoofing to block spoofed packets Legitimate traffic Rate limits Dynamic & Static Filters Active Statistical Verification Analysis Layer 7 Analysis Behavioral Anomaly Engine Rate Limiting Michal Remper systems engineer mremper@cisco.com 2008 Cisco Systems, Inc. All rights reserved. 1

2 2008 Cisco Systems, Inc. All rights reserved. 2

3 2008 Cisco Systems, Inc. All rights reserved. 3

4 mbehring Denial of Service Attacks DoS and DDoS DoS are meant to deny access to authorized users and consume enterprise resources: bandwidth, CPU, memory blocks The hacker can utilize compromised PCs / Servers that become Zombies or Bots to launch the attack (DDoS) Web Server Web Server 2008 Cisco Systems, Inc. All rights reserved. 4

5 Distributed Denial of Service (DDoS) Multiple Threats and Targets Attack ombies: Use valid protocols Spoof source IP Massively distributed Variety of attacks POP Peering point ISP Backbone Provider infrastructure: DNS, routers, and links Access line Attacked server Entire data center: Servers, security devices, routers E-commerce, Web, DNS, Cisco Systems, Inc. All rights reserved. 5

6 Why traditional mechanisms are not enough! Firewalls FW based on static policy enforcement -Most DDoS attacks today use approved traffic that bypass the firewall Lack of anomaly detection Lack of anti-spoofing capabilities to separate good from bad traffic IDS Optimized for signature based application layer detection most sophisticated DDoS attacks are characterized by anomalous behavior in layers 3 and 4 Cannot easily detect DDoS attacks using valid packets require extensive manual tuning 2008 Cisco Systems, Inc. All rights reserved. 6

7 TYP Flood Attack Vector With the TCP Flood the attacker is hoping to: Fill and overflow the TCP sever s queue (memory) so that the oldest _RVCD entries are flushed. Fill the TCP queue faster than the typical +ACK RTT so that valid customer entries are crowded out Cisco Systems, Inc. All rights reserved. 7

8 TCP -Flood Pushing out the Old Entries Attacker Server s TCP Table Filling faster than it can FIFO out. drop TCP Server New s push out oldest entries 2008 Cisco Systems, Inc. All rights reserved. 8

9 TCP -Flood gets pushed Attacker Valid User Valid user gets to the ACK, but the server does not set up / ACK ACK Data Silence TCP Server 2008 Cisco Systems, Inc. All rights reserved. 9?? drop No waiting when the ACK gets back.

10 Principles for Complete DDoS Protection A complete solution: Detects and mitigates the effects of an attack Distinguishes good traffic from bad Protects all points of vulnerability Provides reliable and cost effective scalability 2008 Cisco Systems, Inc. All rights reserved. 10

11 Riverhead: Basic Concepts 1. Detection 2. Diversion of victims traffic 3. Sieve out malicious traffic 4. Legitimate traffic continues on its route R Victim traffic Victim clean traffic Malicious packets Database 2008 Cisco Systems, Inc. All rights reserved. 11

12 Cisco DDoS Solution Cisco Guard XT Cisco Detector XT Protected Zone 1: Web Protected Zone 2: Name Servers Protected Zone 3: E-Commerce Application 2008 Cisco Systems, Inc. All rights reserved. 12

13 Cisco DDoS Solution Cisco Guard XT Cisco Detector XT 1. Detect Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 2008 Cisco Systems, Inc. All rights reserved. 13

14 Cisco DDoS Solution Cisco Guard XT 2. Activate: Auto/Manual Cisco Detector XT 1. Detect Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 2008 Cisco Systems, Inc. All rights reserved. 14

15 Cisco DDoS Solution BGP Announcement 3. Divert Only Target s Traffic Cisco Guard XT 2. Activate: Auto/Manual Cisco Detector XT 1. Detect Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 2008 Cisco Systems, Inc. All rights reserved. 15

16 Cisco DDoS Solution BGP Announcement Traffic Destined to the Target 4. Identify and Filter the Malicious 3. Divert Only Target s Traffic Cisco Guard XT 2. Activate: Auto/Manual Cisco Detector XT 1. Detect Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 2008 Cisco Systems, Inc. All rights reserved. 16

17 Cisco DDoS Solution BGP Announcement Traffic Destined to the Target Legitimate Traffic to Target 4. Identify and Filter the Malicious 3. Divert Only Target s Traffic Cisco Guard XT 2. Activate: Auto/Manual Cisco Detector XT 1. Detect Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 5. Forward the Legitimate 2008 Cisco Systems, Inc. All rights reserved. 17

18 Cisco DDoS Solution 6. Non- Targeted Traffic Flows Freely BGP Announcement Traffic Destined to the Target Legitimate Traffic to Target 4. Identify and Filter the Malicious 2. Activate: Auto/Manual Cisco Detector XT 1. Detect 3. Divert Only Target s Traffic Cisco Guard XT Protected Zone 1: Web Protected Zone 2: Name Servers Target Protected Zone 3: E-Commerce Application 5. Forward the Legitimate 2008 Cisco Systems, Inc. All rights reserved. 18

19 Detection Process 1 Attack launched Dirty traffic Peering Edge Guard Activation via SSH, SSL, BGP from Detector Cisco Guard 3 Detector activates Guard, synchronize zone config Provider Edge Customer Edge SPAN traffic 2 Detector Detection Option 1 Detector detects anomaly based on SPAN traffic 2008 Cisco Systems, Inc. All rights reserved. 19

20 Mitigation Process 4 5 All traffic gets diverted to Guard 6 Guard scrubs dirty traffic Cisco Guard Peering Edge Guard sends out BGP announcement traffic diversion Cisco Guard Provider Edge Dirty traffic Cleaned traffic Guard Activation via SSH, SSL, BGP from Detector 7 Clean traffic is injected back into the data path SPAN traffic Customer Edge 8 Detector Detection Option 1 Guard continuously monitors traffic 2008 Cisco Systems, Inc. All rights reserved. 20

21 Cisco DDoS Solution Appliances and Service Modules DDoS Appliances: Cisco Guard XT 5650 DDoS Service Modules: Cisco Anomaly Guard Module Cisco Traffic Anomaly Detector XT 5600 Cisco Traffic Anomaly Detector Module 1 Gbps Performance IBM X345/x346 Server Platform 2 GE Fiber Interfaces 10/100/GE Copper Mgmt 2U rack mount single/dual power supply Dual RAID hard drive 2 GB DDRAM 1 Broadcom SiByte Network Processor 1 Gbps OR 3/2 Gbps Performance (AGM Cluster 10Gbps+ Performance!!!) Single slot service module No external interfaces uses line card or supervisor interfaces Cat6k IOS support: 12.2(18)SXD IOS support: 12.2(18)SXE & 12.2(33)SRA/SRB 3 Broadcom SiByte Network Processors Multiple AGMs per chassis 2008 Cisco Systems, Inc. All rights reserved. 21

22 High Performance and Capacity 1 MPPS+ most attacks, good and bad traffic, typical features 150 K DYNAMIC FILTERS for zombie attacks CLUSTERING TO 8 GUARDS (24Gbps Cluster Performance) for single protected host Capacity 30 CONCURRENTLY PROTECTED ZONES (90 for the Detector) and 500 total1.5 million concurrent connections 1.5 million concurrent connections Latency or jitter: < 1 MSEC 3Gig Guard Module / 2Gig Detector Module 2008 Cisco Systems, Inc. All rights reserved. 22

23 Deploying Cisco DDoS Defense Solution in Service Provider Networks AS AS Cisco Guard XT ISP Backbone Cisco Guard XT Peering Point Clean Traffic Returned Through Guard Cisco Detector Cisco Detector Web Server Cisco Guard XT Enterprise AS Traffic for Targeted Device Diverted Through Guard DNS Servers Attacked Server 2008 Cisco Systems, Inc. All rights reserved. 23

24 Deploying Cisco DDoS Defense Solution in Enterprise Networks ISP 1 Cisco IOS Router ISP 2 Cisco Guard XT Cisco Anomaly Detector XT Cisco PIX Security Appliance Internal Network Cisco Catalyst Switch GE Cisco Guard XT Cisco Anomaly Detector XT Web DNS, Attacked Server 2008 Cisco Systems, Inc. All rights reserved. 24

25 Defend Mitigate Detect Inject Divert Detection Proactively looking for traffic anomalies 2008 Cisco Systems, Inc. All rights reserved. 25

26 Detection What is Detection? Building a baseline (a previously collected profile or a reference point) is essential to look for the existence of attacks Anomaly/Misuse an event or condition of the network characterized by a statistical abnormality from the baseline On detection of an anomaly or a misuse, the next step is to notify device(s) capable of analyzing the traffic/look for the presence of an attack Cisco Guard, via an out-of-band network 2008 Cisco Systems, Inc. All rights reserved. 26

27 Ways to Detect and Classify DoS Attacks Customer Call SNMP: Line/CPU overload NetFlow: Counting Flows ACLs with Logging Backscatter Cisco Detector and Guard Narus Insight Security Suite slow & manual targeted/scalable Clean Pipes focus 2008 Cisco Systems, Inc. All rights reserved. 27

28 Threat Types that can be detected Legitimate use & Misuse of control traffic (e.g. ICMP, TCP FINs etc) Data Plane Traffic (e.g. ftp, http traffic) within reasonable limits of baseline and it s Anomalies Bandwidth Consumption Attacks Spoofed & Non-spoofed Flood Attacks TCP Flag (, -ACK, ACK, FIN) ICMP, UDP Examples: Flood, Smurf, LAND, UDP Flood Zombie/Botnet Attacks Each zombie or bot source opens multiple TCP connections Each zombie or bot source opens multiple TCP sessions & issues repetitive HTTP requests DNS Attacks DNS Request Flood Resource Starvation Attacks Packet Size Attacks Fragmented Packets Large Packets Examples: Teardrop, Ping-of-Death Low Rate Zombie/Botnet Attacks Similar to Bandwidth consumption attacks except that each attack source sends multiple requests at low rate DNS Attacks DNS Recursive Lookup 2008 Cisco Systems, Inc. All rights reserved. 28

29 Traffic Anomaly Detector 2008 Cisco Systems, Inc. All rights reserved. 29

30 Cisco Detector What is it? The Traffic Anomaly Detector is a Cisco Systems detection and protection activation component The Detector is designed to work alongside the Cisco Guard however, it can operate independently as a DDoS detection and alarm component Monitors every packet by using the port mirroring or by using an optical splitter Continuously monitors traffic and closely remains tuned to zone traffic characteristics for evolving traffic patterns 2008 Cisco Systems, Inc. All rights reserved. 30

31 Cisco Detector How does it work? An algorithm based learning system that learns zone traffic, adopts itself to its particular characteristics and supports the Detector s detection mechanisms with references and instructions in the form of Thresholds and Policies A system that either records the traffic abnormalities in the Detector syslog or remotely activates Cisco Guard(s) to initiate protection over the zone(s) Integrating these components enables the Detection to assume its detection role while unobtrusively staying in the background 2008 Cisco Systems, Inc. All rights reserved. 31

32 What is a Zone? A Zone is a network element (server, server s or a network) that are continuously monitored for DDoS attacks Various Zones can be monitored simultaneously as long as the their network address ranges do not overlap Once an attack has been identified, the Detector can activate a remote Guard automatically or send a notification which allows for manual activation User configurable on a zone by zone basis 2008 Cisco Systems, Inc. All rights reserved. 32

33 Cisco Detector Learning System Two Phase Process: Construct Policies Tune Threshold Construct Policies: Discovers services the zone uses. The policy templates provide the rules that are used to construct the policies Tune Threshold: Tunes to the zone traffic to establish policy thresholds whose violation would cause the policies to launch an action It is recommended to be in learning mode for at least 24 hours 2008 Cisco Systems, Inc. All rights reserved. 33

34 Detect Mode After the learning phase is complete the zone is put into detect mode and begins applying its policies The detection policies begin to detect abnormal or malicious traffic in the form of a threshold violation A violation will trigger the policy to construct a set of dynamic filters The dynamic filter either records the event in syslog or remotely activates a Cisco Guard for DDoS mitigation After the Traffic Analysis the Detector drops the mirrored or split zone traffic 2008 Cisco Systems, Inc. All rights reserved. 34

35 Detector Filter and Module System Server Farm Zone Under detection Syslog Server 2008 Cisco Systems, Inc. All rights reserved. 35

36 Partners Detection Solutions: Arbor Solution Component Peakflow DoS Controller: Aggregates and correlates attack data Central User Interface 2 RU Rack Height Gathers and analyzes traffic data Configured for Netflow (OC48+) 2 RU Rack Height Peakflow DoS Controller DC power and NEBS available 2008 Cisco Systems, Inc. All rights reserved. 36

37 Collection Layer Partners Detection Solutions: NarusInsight OverviewSecure Suite (NSS) High Speed Analyzers (HSA) Passive probes (DELL or IBM BC) Collect Layer 3 to Layer 7 data directly off network links No impact to network performance Supported interface speeds include IBM BladeCenter 10/100BT, GigE, 10GigE, OC3, OC12, OC48, OC192 Supported variety of Layer-7 applications: Dell PowerEdge VoIP (SIP, H323, MGCP, RTP, RTCP), Skype, P2P (Gnutella, BitTorrent, Kazaa, edonkey, etc.), HTTP, SMTP, FTP, DNS, Messaging (IM, MMS), etc. Virtual Analyzers (VA) Software agents Collect Layer-4 flow records (Netflow/CFlowd), Routing information (BGP) and Network/Security Events (IDS, IPS, NAT, Firewalls via SNMP Traps, Syslogs and Netflow V9) directly from network elements Eliminates additional cost for implementing probes Key Differentiators: Collection and Normalization of data from various sources: Data is normalized for further processing (Narus Vectors) Dynamic zoom-in / zoom-out collection in real-time: From Netflow into full packet capture as requested 2008 Cisco Systems, Inc. All rights reserved. 37

38 Control Layer Cisco Guard Mitigation NSS offers an option for mitigation via Cisco Guard Potentially malicious traffic will be diverted to the guard for scrubbing, using BGP NSS has an awareness of router topology, zones and guards Zones can be added, removed and edited via NSS Guard is limited to 500 zones with 30 actively protected Actions will be suggested for a detected threat Actions/zones can be coalesced to stay within limits Associations between the alert and the actions can be monitored Actions can also be applied manually Actions are applied using SSH + Expect 2008 Cisco Systems, Inc. All rights reserved. 38

39 Cleaning/Scrubbing - Mitigation 2008 Cisco Systems, Inc. All rights reserved. 39

40 Cisco Guard Overview Mitigate DDoS attacks sourced from the Internet against destinations such as web servers, DNS servers, servers, firewalls, and other network infrastructure. Anomaly based mitigation Learn normal traffic behaviors, begin protection when unexpected patterns are detected Advantage: can mitigate previously unknown attacks Goal: filter out malicious traffic, pass all the legitimate traffic Protect on per a destination zone basis Zone = IP address, a group of IPs, or a subnet basis Not an inline device. On-demand scrubbing Divert only traffic destined to a zone under attack for scrubbing. Traffic for other destinations remain on the same forwarding path Two product variants: Guard appliance and Guard module for 7600/CAT6K 2008 Cisco Systems, Inc. All rights reserved. 40

41 Guard Multi-Verification Process (MVP) Architecture Apply anti-spoofing to block malicious flows Dynamically insert specific filters to block attack flows & sources Detect anomalous behavior & identify precise attack flows and sources Apply rate limits Legitimate + Legitimate attack traffic to target Dynamic & Static Filters Active Verification Statistical Analysis Layer 7 Analysis Rate Limiting 2008 Cisco Systems, Inc. All rights reserved. 41

42 Intelligent Countermeasures Benefits: Accuracy Maximized performance Maximum transparency Automated response STRONG PROTECTION Strong antispoofing (proxy) if needed Dynamic filtering of zombie sources BASIC PROTECTION Basic antispoofing applied Analysis for continuing anomalies ANALYSIS Diversion for more granular inline analysis Flex filters, dynamic filters, and bypass in operation All flows forwarded but analyzed for anomalies DETECTION Passive copy of traffic monitoring Anomaly Sources Identified Anomaly Verified Attack Detected LEARNING Periodic observation of patterns to automatically update baseline profiles 2008 Cisco Systems, Inc. All rights reserved. 42

43 Guard: Anti-Spoofing Overview 2008 Cisco Systems, Inc. All rights reserved

44 What is Anti-Spoofing? Spoofing sending IP traffic using a bogus Source IP address Anti-Spoofing a mechanism that identifies and distinguishes between real and spoofed IP sources Spoofed attacks are easy to generate Spoofed traffic can hide the source of the attack 2008 Cisco Systems, Inc. All rights reserved. 44

45 Anti-Spoofing in the Guard Anti-Spoofing operates in the Basic and Strong protection levels Anti-Spoofing categorizes source IP addresses as Authenticated Non-Authenticated Spoofed traffic is dropped and is not forwarded to the victim Spoofed traffic is not counted for threshold calculation 2008 Cisco Systems, Inc. All rights reserved. 45

46 Types of Anti-Spoofing traffic Anti-spoofing functions for the following protocols TCP traffic DNS (UDP/TCP) traffic But, there is also Anti-Spoofing by association A source IP will become authenticated when sending traffic using other protocols if it was authenticated in parallel or beforehand by the active Anti-Spoofing mechanisms 2008 Cisco Systems, Inc. All rights reserved. 46

47 User-Filters Overview Just Basic Algorithms :o) 2008 Cisco Systems, Inc. All rights reserved

48 Basic/Redirect for HTTP Services Client (Source) Guard IP (SrcIP= ;seq=x) ACK Is Source IP Authenticated? NO Generate unique cookie for IP (seq=cookie;ack=x+1) ACK If cookie is valid, authenticate IP (seq=x+1;ack=cookie+1) GET ( REDIRECT Tells client to refresh the session and the HTTP request Is Source IP Authenticated? YES Zone (Destination) FIN (SrcIP= ;seq=y) GET ( (seq=y) ACK (seq=z;ack=y+1) ACK (seq=y+1;ack=z+1) ACK (seq=y+1;ack=z+1) GET ( DATA 2008 Cisco Systems, Inc. All rights reserved. 48

49 Spoofed Attack example IP Client (Source) Guard Is Source IP Authenticated? NO (SrcIP= ;seq=x;Port=80) Is Source IP Authenticated? NO Is Source IP Authenticated? NO Is Source IP Authenticated? NO Is Source IP Authenticated? NO (SrcIP= ;seq=y;Port=80) (SrcIP= ;seq=z;Port=80) (SrcIP= ;seq=a;Port=80) (SrcIP= ;seq=b;Port=80) ACK Generate unique cookie for IP (seq=cookie;ack=x+1) Generate unique cookie for IP Generate unique cookie for IP Generate unique cookie for IP Generate unique cookie for IP Zone (Destination) ACK (seq=cookie;ack=y+1) ACK (seq=cookie;ack=z+1) ACK (seq=cookie;ack=a+1) ACK (seq=cookie;ack=b+1) 2008 Cisco Systems, Inc. All rights reserved. 49

50 Deployment Models 2008 Cisco Systems, Inc. All rights reserved. 50

51 Managed Network DDoS Protection Key Benefits and Capabilities New SP revenue model Protection against the saturation of the last mile bandwidth Added insurance for corporations to preserve business continuance CPE based Cisco Detector provides customer driven activation of the Guard NetFlow + Peakflow SP provide SP driven activation of the Guard Subscription or on-demand based protection with Guard Corporations Customer attack reports exported from the Guard to SP portals such as Peakflow MS 2008 Cisco Systems, Inc. All rights reserved. 51

52 Managed Hosting DDoS Protection Key Benefits and Capabilities New revenue model for hosting providers Protect critical managed web and application servers Detection closest to the assets under attack Cisco Detector provides anomaly detection with deep packet inspection Mitigation closest to the attack entry point Guards deployed close to ingress points Subscription or ondemand based protection with Guard 2008 Cisco Systems, Inc. All rights reserved. 52

53 Managed Peering Point DDoS Protection AS 123 AS 234 Key Benefits and Capabilities Cleaning Center Peering Edge Arbor Peakflow SP New SP revenue model Downstream ISP receives a DDoS-free wholesale connection SP Core Maximizes bandwidth for legitimate traffic Out of Band Management Arbor Peakflow SP Service Provider Netflow + Arbor Peakflow SP provide the network visibility and correlation Wholesale Service Dirty Traffic Cleaned Traffic NetFlow Export Guard Activation SSH Peering Edge AS 234 Downstream ISP Easy entry point for carriers that already has Infrastructure DDoS protection in place Reduces DDoS on the internet 2008 Cisco Systems, Inc. All rights reserved. 53

54 Infrastructure DDoS Protection Trans-oceanic Peering Key Benefits and Capabilities Protect the Infrastructure from DDoS attacks Used in conjunction with NFP to mitigate attacks data, control, mgmt and services planes SP Data Center Cleaning Center Out of Band Mgmt AS 123 Arbor Peakflow SP Peering Edge Arbor Peakflow SP SP Core SP Data Center AS 234 Dirty Traffic Cleaned Traffic NetFlow Export Guard Activation SSH Reduce directed attacks on vital places in the network (Peering Points, Core Routers, Provider Edges) Protect critical servers in the SP data centers like DNS, HTTP, SMTP servers Reduce collateral damage upon the network Reduce OPEX (bandwidth preservation of expensive trans-oceanic links) 2008 Cisco Systems, Inc. All rights reserved. 54

55 A 2008 Cisco Systems, Inc. All rights reserved. 55

Distributed Denial of Service

Distributed Denial of Service Distributed Denial of Service Vimercate 17 Maggio 2005 anegroni@cisco.com DDoS 1 Agenda PREFACE EXAMPLE: TCP EXAMPLE: DDoS CISCO S DDoS SOLUTION COMPONENTS MODES OF PROTECTION DETAILS 2 Distributed Denial

More information

Cisco Traffic Anomaly Detector Module

Cisco Traffic Anomaly Detector Module Cisco Traffic Anomaly Detector Module The Cisco Traffic Anomaly Detector Module is an integrated services module for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers that helps large organizations

More information

CISCO DDoS MITIGATION ENTERPRISE SOLUTIONS

CISCO DDoS MITIGATION ENTERPRISE SOLUTIONS CISCO DDoS MITIGATION ENTERPRISE SOLUTIONS February 15, 2005 Cisco DDoS Mitigration 1 Integrated Security Foundation for Self-Defending Networks PRIVACY PROTECTION CONTROL Secure Connectivity System Secure

More information

Clean Pipe Solution 2.0

Clean Pipe Solution 2.0 Clean Pipes 2.0 1 Clean Pipe Solution 2.0 Executive Summary...3 Best Current Practices...5 Network Infrastructure BCPs...5 Host Based BCPs...5 Dedicated DDoS BCPs...6 Cisco Clean Pipes Solution Overview...6

More information

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Data Sheet. DPtech Anti-DDoS Series. Overview. Series Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to

More information

Check Point DDoS Protector Introduction

Check Point DDoS Protector Introduction Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods

More information

CISCO DDoS MITIGATION SERVICE PROVIDER SOLUTIONS

CISCO DDoS MITIGATION SERVICE PROVIDER SOLUTIONS CISCO DDoS MITIGATION SERVICE PROVIDER SOLUTIONS February 15, 2005 1 Executive Summary Detects AND MITIGATES the broadest range of distributed denial of service (DDoS) attacks With the granularity and

More information

Comprehensive datacenter protection

Comprehensive datacenter protection Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack

More information

DDoS Protection in Backbone Networks

DDoS Protection in Backbone Networks DDoS Protection in Backbone Networks The Czech Way Pavel Minarik, Chief Technology Officer Holland Strikes Back, 3 rd Oct 2017 Backbone DDoS protection Backbone protection is specific High number of up-links,

More information

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE SOLUTION BRIEF EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE Building effective, affordable and scalable DDoS defense, then monetizing investments with value added scrubbing

More information

Thunder TPS. Overview. A10 Networks, Inc.

Thunder TPS. Overview. A10 Networks, Inc. Thunder TPS Overview DDoS in the News Q1 2013 Q3/4 2014 Q1 2015 Q1 2015 Spamhaus A dispute with CyberBunker resulted in 300 Gbpsattack Sony PSN Lizard Squad takes out gaming networks during Xmas break

More information

A10 DDOS PROTECTION CLOUD

A10 DDOS PROTECTION CLOUD DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business

More information

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief Inline DDoS Protection versus Scrubbing Center Solutions Solution Brief Contents 1 Scrubbing Center vs. Inline DDoS Inspection and Mitigation... 1 2 Scrubbing Center... 2 2.1 Scrubbing Center Architecture...

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

OSSIR. 8 Novembre 2005

OSSIR. 8 Novembre 2005 OSSIR 8 Novembre 2005 Arbor Networks: Security Industry Leader Arbor s Peakflow products ensure the security and operational integrity of the world s most critical networks Solid Financial Base Sales have

More information

ASA/PIX Security Appliance

ASA/PIX Security Appliance I N D E X A AAA, implementing, 27 28 access to ASA/PIX Security Appliance monitoring, 150 151 securing, 147 150 to websites, blocking, 153 155 access control, 30 access policies, creating for web and mail

More information

Chapter 7. Denial of Service Attacks

Chapter 7. Denial of Service Attacks Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

Fregata. DDoS Mitigation Solution. Technical Specifications & Datasheet 1G-5G

Fregata. DDoS Mitigation Solution. Technical Specifications & Datasheet 1G-5G Fregata DDoS Mitigation Solution Technical Specifications & Datasheet 1G-5G Amidst fierce competition, your business cannot afford to slow down With HaltDos, you don t have to sacrifice productivity and

More information

DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch)

DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch) DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch) Pavel Minarik, Chief Technology Officer SwiNOG meeting, 9 th Nov 2017 Backbone DDoS protection Backbone protection

More information

Flow-based Traffic Visibility

Flow-based Traffic Visibility Flow-based Traffic Visibility Operations, Performance, Security Pavel Minařík, Chief Technology Officer What is Flow Data? Modern method for network monitoring flow measurement Cisco standard NetFlow v5/v9,

More information

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper Securing Online Businesses Against SSL-based DDoS Attacks Whitepaper Table of Contents Introduction......3 Encrypted DoS Attacks...3 Out-of-path Deployment ( Private Scrubbing Centers)...4 In-line Deployment...6

More information

Network Security Monitoring with Flow Data

Network Security Monitoring with Flow Data Network Security Monitoring with Flow Data IT Monitoring in Enterprises NPMD (Network Performance Monitoring & Diagnostics) SNMP basics Flow data for advanced analysis and troubleshooting Packet capture

More information

Cisco Security Monitoring, Analysis and Response System 4.2

Cisco Security Monitoring, Analysis and Response System 4.2 Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System

More information

DDoS Detection&Mitigation: Radware Solution

DDoS Detection&Mitigation: Radware Solution DDoS Detection&Mitigation: Radware Solution Igor Urosevic Head of Technical Department SEE CCIE #26391 Ingram Micro Inc. 1 Agenda DDoS attack overview Main point of failures Key challenges today DDoS protection

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

F5 DDoS Hybrid Defender : Setup. Version

F5 DDoS Hybrid Defender : Setup. Version F5 DDoS Hybrid Defender : Setup Version 13.1.0.3 Table of Contents Table of Contents Introducing DDoS Hybrid Defender... 5 Introduction to DDoS Hybrid Defender...5 DDoS deployments... 5 Example DDoS Hybrid

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

THUNDER TPS Next-generation DDoS Protection

THUNDER TPS Next-generation DDoS Protection DATASHEET Next-generation DDoS Protection Supported Platforms TPS physical appliance Overview The TPS product line is a family of high-performance appliances that detect and mitigate multi-vector DDoS

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module Enhanced

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology

Behavior-Based IDS: StealthWatch Overview and Deployment Methodology Behavior-Based IDS: Overview and Deployment Methodology Lancope 3155 Royal Drive, Building 100 Alpharetta, Georgia 30022 Phone: 770.225.6500 Fax: 770.225.6501 www.lancope.com techinfo@lancope.com Overview

More information

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and

More information

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection Snoc DDoS Protection Fast Secure Cost effective sales@.co.th www..co.th securenoc Introduction Snoc 3.0 Snoc DDoS Protection provides organizations with comprehensive protection against the most challenging

More information

Denial of Service Protection Standardize Defense or Loose the War

Denial of Service Protection Standardize Defense or Loose the War Denial of Service Protection Standardize Defense or Loose the War ETSI : the threats, risk and opportunities 16th and 17th - Sophia-Antipolis, France By: Emir@cw.net Arslanagic Head of Security Engineering

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

Check Point DDoS Protector Simple and Easy Mitigation

Check Point DDoS Protector Simple and Easy Mitigation Check Point DDoS Protector Simple and Easy Mitigation Jani Ekman janie@checkpoint.com Sales Engineer DDoS Protector 1 (D)DoS Attacks 2 3 4 DDoS Protector Behavioral DoS Protection Summary 2 What is an

More information

Cisco IOS Inline Intrusion Prevention System (IPS)

Cisco IOS Inline Intrusion Prevention System (IPS) Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Driving Network Visibility

Driving Network Visibility Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender...

More information

Cisco Intrusion Prevention Solutions

Cisco Intrusion Prevention Solutions Cisco Intrusion Prevention Solutions Proactive Integrated, Collaborative, and Adaptive Network Protection Cisco Intrusion Prevention System (IPS) solutions accurately identify, classify, and stop malicious

More information

NIP6000 Next-Generation Intrusion Prevention System

NIP6000 Next-Generation Intrusion Prevention System NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such

More information

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See Louis Scialabba Carrier Solutions Marketing Nov 2015 November 16, 2015 Topics What s New in Cybersecurity

More information

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

Why IPS Devices and Firewalls Fail to Stop DDoS Threats Arbor White Paper Why IPS Devices and Firewalls Fail to Stop DDoS Threats How to Protect Your Data Center s Availability About Arbor Networks Arbor Networks, Inc. is a leading provider of network security

More information

Are You Fully Prepared to Withstand DNS Attacks?

Are You Fully Prepared to Withstand DNS Attacks? WHITE PAPER Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure Are You Fully Prepared to Withstand DNS Attacks? Fortifying Mission-Critical DNS Infrastructure

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

DDoS Managed Security Services Playbook

DDoS Managed Security Services Playbook FIRST LINE OF DEFENSE DDoS Managed Security Services Playbook INTRODUCTION Distributed Denial of Service (DDoS) attacks are major threats to your network, your customers and your reputation. They can also

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Systrome Next Gen Firewalls

Systrome Next Gen Firewalls N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security

More information

Connection Logging. Introduction to Connection Logging

Connection Logging. Introduction to Connection Logging The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections

More information

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection Document ID: 98705 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks Security+ Guide to Network Security Fundamentals, Fourth Edition Network Attacks Denial of service Attacks Introduction: What is DoS? DoS attack is an attempt (malicious or selfish) by an attacker to cause

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Connection Logging. About Connection Logging

Connection Logging. About Connection Logging The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: About, page 1 Strategies, page 2 Logging Decryptable Connections with SSL

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

FortiDDoS Deployment Guide for Cloud Signaling with Verisign OpenHybrid

FortiDDoS Deployment Guide for Cloud Signaling with Verisign OpenHybrid FortiDDoS Deployment Guide for Cloud Signaling with Verisign OpenHybrid FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com

More information

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Overview DDoS Evolution Typical Reactive/Proactive Mitigation Challenges and Obstacles BGP Flowspec Automated Flowspec Mitigation 2 DDoS Evolution

More information

Introduction to Traffic Processing

Introduction to Traffic Processing This chapter describes how the Cisco SCA BB installed on a Cisco Service Control Engine (Cisco SCE) platform processes traffic. The chapter also describes the main elements (service configuration entities)

More information

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (7 th Week) 7. Denial-of-Service Attacks 7.Outline Denial of Service Attacks Flooding Attacks Distributed Denial of Service Attacks Application Based

More information

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015 2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING

More information

Configuring Access Rules

Configuring Access Rules Configuring Access Rules Rules > Access Rules About Access Rules Displaying Access Rules Specifying Maximum Zone-to-Zone Access Rules Changing Priority of a Rule Adding Access Rules Editing an Access Rule

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks WHITE PAPER 2017 DDoS of Things SURVIVAL GUIDE Proven DDoS Defense in the New Era of 1 Tbps Attacks Table of Contents Cyclical Threat Trends...3 Where Threat Actors Target Your Business...4 Network Layer

More information

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud SSL Orchestrator DDoS Hybrid Defender All-in-one solution designed to deliver increased visibility into encrypted traffic Comprehensive DDoS protection, tightly-integrated on-premises and cloud Converts

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Traffic Processing Overview

Traffic Processing Overview CHAPTER 3 Traffic Processing Overview Revised: August 08, 2013, Introduction This chapter describes how the Cisco SCA BB installed on a Service Control Engine (SCE) platform processes traffic. The chapter

More information

Imperva Incapsula Product Overview

Imperva Incapsula Product Overview Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security

More information

Silverline DDoS Protection. Filip Verlaeckt

Silverline DDoS Protection. Filip Verlaeckt Silverline DDoS Protection Filip Verlaeckt f.verlaeckt@f5.com The evolution of attackers September 1996 First high profile DDoS attack. NY ISP Panix.com that was nearly put out of business. January 2008

More information

Cisco ASR 9000 vddos Protection Solution

Cisco ASR 9000 vddos Protection Solution White Paper Cisco ASR 9000 vddos Protection Solution Last Updated: 5/8/2015 What You Will Learn Cisco and Arbor Networks have collaborated to bring industry-leading distributed denial-of-service mitigation

More information

BIG-IP Analytics: Implementations. Version 13.1

BIG-IP Analytics: Implementations. Version 13.1 BIG-IP Analytics: Implementations Version 13.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles... 5 Overview:

More information

Arbor Solution Brief Arbor Cloud for Enterprises

Arbor Solution Brief Arbor Cloud for Enterprises Arbor Solution Brief Arbor Cloud for Enterprises Integrated DDoS Protection from the Enterprise to the Cloud About Arbor Networks Arbor Networks Inc., the cyber security division of NETSCOUT, helps secure

More information

DDoS Mitigation & Case Study Ministry of Finance

DDoS Mitigation & Case Study Ministry of Finance DDoS Mitigation Service @Belnet & Case Study Ministry of Finance Julien Dandoy, FODFin Technical Architect Grégory Degueldre, Belnet Network Architect Agenda DDoS : Definition and types DDoS Mitigation

More information

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities Flashback.. Internet design goals Security Part One: Attacks and Countermeasures 15-441 With slides from: Debabrata Dash,Nick Feamster, Vyas Sekar 15-411: F08 security 1 1. Interconnection 2. Failure resilience

More information

Troubleshooting with Network Analysis Module

Troubleshooting with Network Analysis Module Troubleshooting with Network Analysis Module Introduction The Cisco Network Analysis Module (NAM) provides visibility into how the network is performing and how users experience the applications and services

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

68% 63% 50% 25% 24% 20% 17% Credit Theft. DDoS. Web Fraud. Cross-site Scripting. SQL Injection. Clickjack. Cross-site Request Forgery.

68% 63% 50% 25% 24% 20% 17% Credit Theft. DDoS. Web Fraud. Cross-site Scripting. SQL Injection. Clickjack. Cross-site Request Forgery. PRESENTED BY: Credit Theft 68% DDoS 63% Web Fraud 50% Cross-site Scripting SQL Injection Clickjack Cross-site Request Forgery 25% 24% 20% 17% Other 2% F5 Ponemon Survey -Me East-West Traffic Flows App

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

Cloudflare Advanced DDoS Protection

Cloudflare Advanced DDoS Protection Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

The Bro Cluster The Bro Cluster

The Bro Cluster The Bro Cluster The Bro Cluster The Bro Cluster Intrusion Detection at 10 Gig and A High-Performance beyond using the NIDS Bro Architecture IDS for the Lawrence Berkeley National Lab Robin International Computer Science

More information

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK Junos Security Rob Cameron, Brad Woodberg, Patricio Giecco, Tim Eberhard, andjames Quinn TECHNISCHE INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK HANNOVER O'REILLY Beijing Cambridge Farnham Kiiln Sebastopol

More information

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Beyond Blind Defense: Gaining Insights from Proactive App Sec Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials Firewalls, IDS and IPS MIS5214 Midterm Study Support Materials Agenda Firewalls Intrusion Detection Systems Intrusion Prevention Systems Firewalls are used to Implement Network Security Policy Firewalls

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Yes: Creating a secure channel for communication (Part I) Protecting

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform 9.2 (Quick Tour) McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and software that accurately detects and prevents

More information

Symantec Network Security 7100 Series

Symantec Network Security 7100 Series Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information