DDo : eparating Friend from Foe

Size: px
Start display at page:

Download "DDo : eparating Friend from Foe"

Transcription

1 DDo : eparating Friend from Foe Y A L X H N T H O R N - I W A N, V P M A R K T I N G N O V 2 3, Full tra c vi i ilit to diagno e tho e na t attack In man organization, network are at the core of the u ine, ena ling not onl internal function uch a HR, uppl chain, and nance ut al o the ervice and tran action on which the u ine depend for revenue. That make network availa ilit critical. An interruption of acce from the out ide world turn o the revenue pigot, impacting pro t and creating a ad u er experience that can damage cu tomer ati faction and re ult in permanent lo of patronage. The wor e the outage, the wor e the damage. That wh peed i o important in detecting, diagno ing, and re ponding to Denial of ervice (Do ) and Di tri uted Denial of ervice (DDo ) attack. One of the chief challenge in re ponding to an attack i to di tingui h friend from foe. Without a wa to drill down into tra c detail and examine ho t-level tra c ehavior, it can e di cult to tell the di erence. That wh it critical to have a network vi i ilit tool like Kentik Detect, which allow ou to quickl lter for ke attack metric. The ooner ou can determine where a tra c pike i coming from and going to, the ooner ou can decide on the appropriate re pon e. And even after an attack ha pa ed, examining full re olution tra c data from that attack can till reveal information that can e applied to etter prepare for future event. A out Do and DDo Ju t to e ure we re on the ame page, a Do attack i an attempt to make computing or network re ource unavaila le for normal u age, uch a interrupting a ho t acce to the Internet or u pending it ervice to the Internet. Do ecome DDo when the ource of the attack i di tri uted, meaning that the attack come from more than one unique IP addre. DDo attack are commonl launched from otnet of compromi ed ho t that can num er up into the thou and. KENTIK TECHNOLOGIES 733 FRONT ST, C1A SAN FRANCISCO, CA

2 It widel known that DDo attack are rapidl increa ing in frequenc and ize. DDo attack are While mega attack that la t for man hour and reach 200 G p or more make the rapidl increa ing in new, the va t majorit of attack la t under an hour and are le than 1 G p in oth frequenc and ize. volume. maller attack often happen without eing noticed, though the ma e har inger of larger attack to come. Mid- ized attack are more readil felt, ut di tingui hing etween a friendl urge in normal tra c and an attack i ke to timel re pon e. Large attack are fairl o viou, and in the e ca e diagno ing the tra c i important to under tand network entr point and ource. In all ca e, a clear a e ment i important to under tand the e t wa to mitigate the attack. The mo t common form of DDo i the volumetric attack, in which the intent i to conge t all of the target network andwidth. Roughl 90% of all DDo attack are volumetric, with application-la er attack making up the remaining 10%. According to Akamai Q tate of the Internet report, over 50% of volumetric attack are IP ood attack involving a high volume of poofed packet uch a TCP YN, UDP, or UDP fragment. A growing percentage of attack are re ection and ampli cation attack u ing mall, poofed NMP, DN, or NTP reque t to man di tri uted erver to om ard a target with the much more andwidth-heav re pon e to tho e reque t. In the la t few quarter, oth Akamai and other Internet ecurit o erver have noted rapid growth of re ection attack a ed on poofed imple ervice Di cover Protocol ( DP) reque t ent to IP-ena led home device with poorl protected Univer al Plug-n-Pla (UPnP) protocol tack. DP re ection now account over 20% of all volumetric DDo attack. DDo anal i ca e Depending on our organization t pe (e.g. I P, ho ting compan, content provider, or end-u er organization), ou ma e concerned onl with attack that directl a ect our re ource. Or ou might want to know a out an attack tra c that pa ed or i pa ing through our network. ither wa, there are two general ca e of DDo anal i : Diagno ing You ve alread detected that omething i ami, for example one of our re ource i experiencing ervice degradation, ou re eeing anomalou erver log entrie, or a circuit i unu uall full. In thi ca e, ou ll need to identif the tra c that cau ing the pro lem, and, if it not legitimate, to characterize the attack clearl enough to ena le peci c mitigating action. pelunking In thi ca e ou re not aware of an current attack ut ou want to explore our network tra c data to learn more a out previou attack (and ma e even nd an attack in progre ). We ll cover thi econd mode of DDo anal i in a eparate forthcoming po t. Metrics for Microservices - 2

3 Kentik Detect ig data data tore give ou man wa to anal ze volumetric tra c In oth of the e anal i ca e, the NetFlow and GP information in Kentik Detect ig data data tore give ou man wa to anal ze volumetric tra c. In the following example we ll look at how thi data can help ou eparate an attack from an innocent pike. Diagno i De tination IP For thi r t example, let a that ou re uddenl eing alerted e.g. erver overload alarm from our network management oftware, or alert noti cation from Kentik Detect that the IP addre (anon mized here to protect the innocent) i getting hammered anomalou tra c, indicating that it i po i l under attack. You ll want to rapidl drill down on ke characteri tic of the u pect tra c to determine if it actuall an attack, and if o to gather information that will help ou to mitigate the attack quickl. A a tarting point, we would go to the Data xplorer in the Kentik Detect portal. clicking All in the device election pane in the ide ar at left, and then the Appl utton, we can ee total network-wide tra c for all of the li ted device( ). ince we know the IP addre that we u pect i under attack, we ll can then u e the Filter pane in the left-hand ide ar to lter the total tra c for that addre : 1. Click Add Group. The Filter pane expand, howing the r t lter group (Group 1). 2. De ne a lter for tra c who e de tination IP i : From the drop-down metric menu, we choo e De t IP/CIDR. We leave the operator etting at = (default). In the value eld, we enter /32. The Filter pane then appear a hown at left. 3. Click the Appl utton at the upper right of the page. A graph i rendered (Fig. 2) and a corre ponding ta le i populated elow the graph (Fig. 3). Once we ve applied thi de tination IP addre lter, the re ulting graph how clearl that there i a igni cant, anomalou pike of tra c for over 20 minute and continuing. Metrics for Microservices - 3

4 Viewing ource IP Now we need to characterize thi tra c. An a normall large num er of ource IP addre e from at pical countrie i indicative of a otnet, o we ll look at tra c ource countr to unique ource IP addre e : 1. In the Group Metric drop-down a ove the graph, choo e ource» Countr. 2. In the Unit drop-down, choo e Unique rc Ip, then click Appl. We can now ee that there i a huge num er of unique ource IP from China, U.., Vietnam and other countrie that are generating nearl a million packet per econd in aggregate. ince thi IP happen to e the U.. and doe n t t picall get tra c from A ia, that clearl u piciou. China i the igge t contri utor to thi u pect tra c, o we ll i olate China and look at packet per econd per ource IP: 1. In the Group Metric drop-down, choo e ource» IP/CIDR. 2. In the Unit drop-down, choo e Packet /, then click Appl. Thi view validate that we re looking at a rather large num er of ource IP addre e that are ending equivalent packet per econd, which i indicative of a otnet. Additional attack characteri tic Now that we re prett ure we re under DDo attack, it would e helpful to know a it more a out the tra c we re eing hit with. o next we ll look at the protocol and de tination port # of the tra c. Fir t, in the Group Metric drop-down, choo e Full» Proto. We can ee that the tra c i primaril UDP: Next we ll et the Group Metric drop-down to De tination» Port to look at the de tination port num er. Metrics for Microservices - 4

5 A e ing mitigation option When we look at the de tination port # of the tra c, we can ee that there i remarka le con i tenc, in that the va t majorit of the UDP packet are going to port 3074, which i the X ox protocol. Now we can e prett certain that thi i a otnet attack. ince thi addre otherwi e doe n t receive tra c from A ia, we can mitigate the majorit of the attack dropping thi tra c from China and ome of the other A ian countrie. Remem er, though, that our look at ource countrie li ted the U.. right after China, with over a hundred thou and packet per econd. o to develop a complete mitigation plan we need to explore that i ue next. ince thi IP get tra c from the U.. under normal condition, impl dropping tra c from the U.. i n t a good idea. ut what we can do i to look at packet ource IP, ut thi time in tead of /32 ho t ource IP, we ll look at /24. We can ee that there i a good num er of /24 that are ending a fair amount of pp. o, one po i le mitigation approach would e to rate-limit the pp from each of the e /24. Another mitigation would e to redirect tra c from the e /24 to an internal or cloud- a ed cru ing center. Conclu ion There a large- cale dark market that trade in DDo, and that market continuou l innovate and evolve to meet new demand. With the nature of DDo attack con tantl changing, network-centric organization need an agile approach approach to DDo detection. o ering complete vi i ilit into network tra c anomalie, including oth alerting and full-re olution drill-down on raw ow record, Kentik Detect ena le operator to re pond rapidl and e ectivel to each DDo threat. Ready for more information? Please us at info@kentik.com or visit us at Reprinted from the Kentik blog at Kentik Technologies. All rights reserved.

De igning for Data a e Fairne

De igning for Data a e Fairne De igning for Data a e Fairne Y I A N P Y, C O - F O U N D R & P R I N C I P A L N G I N R D C 2 1, 2 0 1 5 Appl ing Multi-level Queue in Multi-tenant Data a e Under the hood, Kentik Detect i powered Kentik

More information

Metric for Micro ervice

Metric for Micro ervice Metric for Micro ervice Y I A N P Y, C O - F O U N D R & P R I N C I P A L N G I N R N O V 1 6, 2 0 1 5 Time- erie reporting for performance optimization Once upon a time, life wa imple. Program ran in

More information

Experimental Tools for Serviceability. S es s ion 3280

Experimental Tools for Serviceability. S es s ion 3280 Experimental Tools for Serviceability Tony Printezis L ecturer Univers ity of G las gow Kenneth Russell Member of T ech S taff S un Micros ys tems Overall Presentation Goal G et an ins ight into examining,

More information

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks abulletti@arbor.net Topics Covered The DDOS cyber threat and impacts Cyprus attacks trend in

More information

Wireless Portable Karaoke Speaker NDS-1510

Wireless Portable Karaoke Speaker NDS-1510 Wireless Portable Karaoke Speaker NDS-1510 1. 2. 3. 4. R ead thes e i ns tructions. Guard this m anual. Obey a ll a lerts. Follow a ll i ns tructions. 5. WAR NING: To prevent fire or s hock hazard, do

More information

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,

More information

Graph S eparators Part II

Graph S eparators Part II 15-853: Algorithms in the R eal World Lecture 6, September 30, 2002 Graph S eparators Part II L ect ur er : Prof. Guy Blelloch S cr ibe: Flavio Ler da 1. Separator theorems At the end of last class we

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT SEPTEMBER 2014 COMMISSIONED BY: Contents Contents... 2 Introduction... 3 About the Survey and Respondents... 3 The Current State

More information

Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience

Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience Rich Bolstridge Chief Strategist, Financial Services Akamai Technologies Agenda Who uses Akamai in Financial

More information

Page 1 of 29. PADS Viewer

Page 1 of 29. PADS Viewer Page 1 of 29 PADS Viewer Welcome to PADS Viewer Thank you for choosing PADS, one of the most advanced and complete digital signage software packages that are available today. This PADS Viewer manual describes

More information

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources

More information

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015 2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING

More information

Training manual: An introduction to North Time Pro 2019 ESS at the terminal

Training manual: An introduction to North Time Pro 2019 ESS at the terminal Training manual: An introduction to North Time Pro 2019 ESS at the terminal Document t2-0800 Revision 15.1 Copyright North Time Pro www.ntdltd.com +44 (0) 2892 604000 For more information about North

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 3, ISSUE 3 3RD QUARTER 2016 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2016 4 DDoS

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q1 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................

More information

V- Co m m a n d e r R e le a s e G A R C

V- Co m m a n d e r R e le a s e G A R C 1 V-Commander Release 4.7.1 GA RC System Requirements What's New in this Release For Help and Support Installing V-Commander Resolved Issues Known Issues System Requirements Virtualization Platforms Supported

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 3 3RD QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q3 2017 4 DDoS

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Next. Welcome! This guide will get you started down the path to bulk text messaging excellence. Let s start by going over the basics of the system

Next. Welcome! This guide will get you started down the path to bulk text messaging excellence. Let s start by going over the basics of the system A-PDF Merger DEMO : Purchase from www.a-pdf.com to remove the watermark User Guide Next Welcome! This guide will get you started down the path to bulk text messaging excellence. Let s start by going over

More information

FloCon Netflow Collection and Analysis at a Tier 1 Internet Peering Point. San Diego, CA. Fred Stringer

FloCon Netflow Collection and Analysis at a Tier 1 Internet Peering Point. San Diego, CA. Fred Stringer 10 January 2017 FloCon 2017 San Diego, CA Netflow Collection and Analysis at a Tier 1 Internet Peering Point Fred Stringer AT&T Chief Security Organization Systems Engineer/Network Architect AT&T Intellectual

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS

More information

Algebra I. Linear Equations. Slide 1 / 267 Slide 2 / 267. Slide 3 / 267. Slide 3 (Answer) / 267. Slide 4 / 267. Slide 5 / 267

Algebra I. Linear Equations. Slide 1 / 267 Slide 2 / 267. Slide 3 / 267. Slide 3 (Answer) / 267. Slide 4 / 267. Slide 5 / 267 Slide / 67 Slide / 67 lgebra I Graphing Linear Equations -- www.njctl.org Slide / 67 Table of ontents Slide () / 67 Table of ontents Linear Equations lick on the topic to go to that section Linear Equations

More information

Android User Guide. Worldpay Total Mobile

Android User Guide. Worldpay Total Mobile Worldpay Total Mobile Contents 1. Welcome 2 2. Get activated 3 3. Get started 4 Downloading the WorldPay Total Mobile app Pairing the devices Configuration 4. Get going 7 Taking payments Refunding payments

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

DDoS Detection&Mitigation: Radware Solution

DDoS Detection&Mitigation: Radware Solution DDoS Detection&Mitigation: Radware Solution Igor Urosevic Head of Technical Department SEE CCIE #26391 Ingram Micro Inc. 1 Agenda DDoS attack overview Main point of failures Key challenges today DDoS protection

More information

Article Number: 38 Rating: Unrated Last Updated: Thu, Apr 28, 2016 at 9:49 PM

Article Number: 38 Rating: Unrated Last Updated: Thu, Apr 28, 2016 at 9:49 PM Nagios Log Server - Logs Not Searchable or Not Coming In Article Number: 38 Rating: Unrated Last Updated: Thu, Apr 28, 2016 at 9:49 PM O ve r vie w When running a query in a dashboard, logs are not showing

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Case Study Committed to Connecting the World ITU WORLD TELECOMMUNICATION DEVELOPMENT CONFERENCE 2014

Case Study Committed to Connecting the World ITU WORLD TELECOMMUNICATION DEVELOPMENT CONFERENCE 2014 Case Study Committed to Connecting the World ITU WORLD TELECOMMUNICATION DEVELOPMENT CONFERENCE 2014 DESTINATION OF CHOICE Challenge All eyes were on Dubai World Trade Centre as it hosted the sixth International

More information

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.

More information

Lecture 18 Graph-Based Algorithms. CSE373: Design and Analysis of Algorithms

Lecture 18 Graph-Based Algorithms. CSE373: Design and Analysis of Algorithms Lecture 18 Graph-Baed Algorithm CSE: Deign and Anali of Algorithm Shortet Path Problem Modeling problem a graph problem: Road map i a weighted graph: vertice = citie edge = road egment between citie edge

More information

CSharp. Microsoft. PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk

CSharp. Microsoft. PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk Microsoft 70-549-CSharp PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk Download Full Version : http://killexams.com/pass4sure/exam-detail/70-549-csharp QUESTION: 170 You are an enterprise application

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Global Leader in DDoS Mitigation Threat Report Distributed Denial of Service (DDoS) Threat Report Q2 2017 456 Montgomery Street, Suite 800 San Francisco, CA 94104 USA +1 415 299 8550 Contents 1. Methodology...................

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

18.2 Software update (NOS 60)

18.2 Software update (NOS 60) 18.2 Software update (NOS 60) Release notes Simrad Multifunction Display Software Update 18.2 Software versions and file names Model Ver Filename GO7 --.-- No updates available for this product GO5 XSE

More information

Designing Baldor's System z SAP solution

Designing Baldor's System z SAP solution Designing Baldor's System z SAP solution THE BEST RUN BUSINESSES RUN SAP Mark Shackelford VP - Information Services June 11th, 2012 Baldor's Mission Statement is t o b e t h e b e st (a s d e t e r m in

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 1 1ST QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2018 4 DDoS

More information

Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x

Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x 1 Introduction and Scope 2 Functionality Overview 3 Mass-Mailing-Based

More information

Net ix Open Connect Appliance Operating Level Agreement

Net ix Open Connect Appliance Operating Level Agreement Net ix Open Connect Appliance Operating Level Agreement November 2016 Copyright 2015, 2016 by Net ix, Inc. All rights reserved. No part of this document may be reproduced or transmitted in any form or

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy War Stories from the Cloud: Rise of the Machines Matt Mosher Director Security Sales Strategy The Akamai Intelligent Platform The Platform 175,000+ Servers 2,300+ Locations 750+ Cities 92 Countries 1,227+

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

ESET REMOTE ADMINISTRATOR Event Management Extension Technical Setup and User Guide. Click here to download the latest version of this document

ESET REMOTE ADMINISTRATOR Event Management Extension Technical Setup and User Guide. Click here to download the latest version of this document ESET REMOTE ADMINISTRATOR Event Management Extension Technical Setup and User Guide Click here to download the latest version of this document ESET REMOTE ADMINISTRATOR - Event Management Extension Copyright

More information

Internet2 DDoS Mitigation Update

Internet2 DDoS Mitigation Update Internet2 DDoS Mitigation Update Nick Lewis, Program Manager - Security and Identity, Internet2 Karl Newell, Cyberinfrastructure Security Engineer, Internet2 2016 Internet2 Let s start with questions!

More information

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1 (19) United States US 2002009 1840A1 (12) Patent Application Publication (10) Pub. No.: US 2002/0091840 A1 Pulier et al. (43) Pub. Date: Jul. 11, 2002 (54) REAL-TIME OPTIMIZATION OF STREAMING MEDIA FROM

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 4 4TH QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q4 2017 4 DDoS

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Technical Bulletin TB1554. Class: INFO. JVM Software Update Procedure

Technical Bulletin TB1554. Class: INFO. JVM Software Update Procedure Serie Cla: INFO Reviion: B Sheet 1 of 9 Releae Date: 14.08.2014 With the introduction of the JVM (Johnton Viual Module) on the product range it i now poible to download oftware by mean of a Johnton USB

More information

T his article is downloaded from

T his article is downloaded from Post Html Code In many case in your application, you may want user to post html tags as input through your webpage. For example, you may allow the user to input comment in the html format they want. For

More information

Flow-based Traffic Visibility

Flow-based Traffic Visibility Flow-based Traffic Visibility Operations, Performance, Security Pavel Minařík, Chief Technology Officer What is Flow Data? Modern method for network monitoring flow measurement Cisco standard NetFlow v5/v9,

More information

A10 DDOS PROTECTION CLOUD

A10 DDOS PROTECTION CLOUD DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business

More information

BluePay Magento 2 User Guide

BluePay Magento 2 User Guide BluePay Magento 2 User Guide This documentation contains a step -by-step guide on installing the plugin and also how to utilize all of the plugin s features. This plugin is designed to work wit h the Magento

More information

T his article is downloaded from

T his article is downloaded from Commonly asked interview questions on inheritance I have summed up all the inheritance control flow related concepts generally asked during O O P S technical interview. M ore or les s, if you unders tand

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises RESELLER LOGO RADICALLY BETTER DDoS PROTECTION Radically more effective, radically more affordable solutions for small and medium enterprises IT S TIME TO GET SERIOUS ABOUT CYBER CRIME Despite the headline

More information

CHSH Opens Big! UP 27.5% China Shoe Holdings Inc. (CHSH) $0.74 UP 27.5%

CHSH Opens Big! UP 27.5% China Shoe Holdings Inc. (CHSH) $0.74 UP 27.5% CHSH Opens Big! UP 27.5% China Shoe Holdings Inc. (CHSH) $0.74 UP 27.5% News is spreading and investors are jumping. Following the announcement of 1000 new retail outlets being opened, heavy trading pushed

More information

OSSIR. 8 Novembre 2005

OSSIR. 8 Novembre 2005 OSSIR 8 Novembre 2005 Arbor Networks: Security Industry Leader Arbor s Peakflow products ensure the security and operational integrity of the world s most critical networks Solid Financial Base Sales have

More information

Don t Get Left Behind

Don t Get Left Behind Don t Get Left Behind Improving Your E-Commerce Site Performance and Security for the Mobile Consumer 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com Executive Summary Mobile is at the tipping

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Multi-vector DDOS Attacks

Multi-vector DDOS Attacks Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer August 2015 Key Reasons for Cyber Attacks Money and more money Large number of groups From unskilled to advanced

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker

More information

Digifort Standard. Architecture

Digifort Standard. Architecture Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information

General Purpose Transformers 6

General Purpose Transformers 6 General Purpose Transformers 6 Description Dry-type transformers (en cap su lat ed, ventilated or non-ventilated), 600 Volt Class, isolation type, single and three phase, through 500. Indoor and outdoor

More information

TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND

TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND TEST REPORT TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND Ixia BreakingPoint DDoS Defense Test Methodology Report TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS A DDOS ATTACK... 5 DDOS

More information

The 2016 Nonprofit Deliverability Study

The 2016 Nonprofit  Deliverability Study The 2016 Nonprofit Email Deliverability Study How much does spam hurt online fundraising? 1 Table of Contents 3 About the Author 5 Executive Summary 10 How much does spam cost nonprofits annually? 15 What

More information

E-Commerce Networking

E-Commerce Networking NW2000 1 E- ing Session 2 E-Business Solution Suppliers/ Manufacturers Supply Chain Management Business Partners E- Customers Customer Care Resellers Employees Your Company E- Learning 3 1999 E- Data During

More information

Architectural Design

Architectural Design Architectural Design Establishing the overall structure of a software system Ian Sommerville - Software Engineering 1 Software architecture The design process for identifying the sub-systems making up

More information

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER Overview DDoS Evolution Typical Reactive/Proactive Mitigation Challenges and Obstacles BGP Flowspec Automated Flowspec Mitigation 2 DDoS Evolution

More information

Article Number: 549 Rating: Unrated Last Updated: Tue, May 30, 2017 at 11:02 AM

Article Number: 549 Rating: Unrated Last Updated: Tue, May 30, 2017 at 11:02 AM Configuring Your Server With A Static IP Address Article Number: 549 Rating: Unrated Last Updated: Tue, May 30, 2017 at 11:02 AM O ve r vie w This KB article shows you how to configure your Nagios server

More information

Y oung W on Lim 9 /1 /1 7

Y oung W on Lim 9 /1 /1 7 Overview (1 A) Cop y rig h t (c) 2 0 0 9-2 0 1 7 Y oung W. Lim. Perm ission is g ra nted to cop y, d istribute a nd /or m od ify th is d ocum ent und er th e term s of th e G N UFree D ocum enta tion License,

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 2006O146786A1 (12) Patent Application Publication (10) Pub. No.: US 2006/0146786 A1 Lian et al. (43) Pub. Date: Jul. 6, 2006 (54) IMPLEMENTATION OF THE INTELLIGENT NETWORK IN THE

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

SSH SECURITY. If you ve never used SSH before on a computer, the chances are very high that

SSH SECURITY. If you ve never used SSH before on a computer, the chances are very high that SSH SECURITY If you ve never used SSH before on a computer, the chances are very high that when you tried to play along with the previous section you encountered a strange notification that may have looked

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS DDoS and Application Attack

More information

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief Inline DDoS Protection versus Scrubbing Center Solutions Solution Brief Contents 1 Scrubbing Center vs. Inline DDoS Inspection and Mitigation... 1 2 Scrubbing Center... 2 2.1 Scrubbing Center Architecture...

More information

This guide is broken up into several sections and covers different Linux distributions and non- Linux operating systems.

This guide is broken up into several sections and covers different Linux distributions and non- Linux operating systems. NRPE - How To Uninstall NRPE Article Number: 741 Rating: Unrated Last Updated: Fri, Aug 11, 2017 at 1:02 AM Unins t a lling NRPE This document describes how to unins ta ll NRPE that is installed from source.

More information

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 Worldwide Infrastructure Security Report Highlights Volume XIII C F Chui, Principal Security Technologist COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 2 Overview This presentation

More information

PA5: Last Hints on Symbol Table: Other Info to Keep

PA5: Last Hints on Symbol Table: Other Info to Keep PA5: Last Hints on Symbol Table: Other Info to Keep For each VarSTE: is it a local variable or a member variable? For each class: what will the object size be? For each method: - a VarSTE for "this" parameter

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany

More information

Installation manual for control panel for automations with one 400 V three-phase motor. COM GOL4. Safety test. Stop. Safety stop.

Installation manual for control panel for automations with one 400 V three-phase motor. COM GOL4. Safety test. Stop. Safety stop. Entrematic E1T Installation manual for control panel for automations with one 400 V three-phase motor. EL07L J1 J2 F4 EL07PW1 1 J7 DO NOT USE COM GOL4 Transformer Motor +LK- DO NOT USE RP SO TC EO OFF

More information

Ver Install Guide. Ver. 4.3 Install Guide

Ver Install Guide. Ver. 4.3 Install Guide En Ver. 4.3 Install Guide Ver. 4.3 Install Guide En Table of Contents Introduction: About This Manual...1 Overview...2 Windows...3 Installing Nikon Capture 4 Under Windows...4 Easy Install...7 Custom Install...14

More information

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection Snoc DDoS Protection Fast Secure Cost effective sales@.co.th www..co.th securenoc Introduction Snoc 3.0 Snoc DDoS Protection provides organizations with comprehensive protection against the most challenging

More information

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017 Radware DefensePro DDoS Mitigation Release Notes Software Version 8.13.01 Last Updated: December, 2017 2017 Cisco Radware. All rights reserved. This document is Cisco Public. Page 1 of 9 TABLE OF CONTENTS

More information

Driving Network Visibility

Driving Network Visibility Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender...

More information

Chapter 4: Application Protocols 4.1: Layer : Internet Phonebook : DNS 4.3: The WWW and s

Chapter 4: Application Protocols 4.1: Layer : Internet Phonebook : DNS 4.3: The WWW and  s Chapter 4: Application Protocols 4.1: Layer 5-7 4.2: Internet Phonebook : DNS 4.3: The WWW and E-Mails OSI Reference Model Application Layer Presentation Layer Session Layer Application Protocols Chapter

More information

11.4. You may have heard about the Richter scale rating. The Richter scale was. I Feel the Earth Move Logarithmic Functions KEY TERMS LEARNING GOALS

11.4. You may have heard about the Richter scale rating. The Richter scale was. I Feel the Earth Move Logarithmic Functions KEY TERMS LEARNING GOALS I Feel the Earth Move Logarithmic Functions. LEARNING GOALS KEY TERMS In this lesson, ou will: Graph the inverses of eponential functions with bases of, 1, and e. Recognize the inverse of an eponential

More information

DDoS Managed Security Services Playbook

DDoS Managed Security Services Playbook FIRST LINE OF DEFENSE DDoS Managed Security Services Playbook INTRODUCTION Distributed Denial of Service (DDoS) attacks are major threats to your network, your customers and your reputation. They can also

More information