An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

Similar documents
Analisi degli attacchi DDOS e delle contromisure

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Arbor White Paper Keeping the Lights On

Arbor WISR XII The Stakes Have Changed. Julio Arruda V1.0

Cyber War Chronicles Stories from the Virtual Trenches

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

DDoS MITIGATION BEST PRACTICES

Arbor White Paper. DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

WORLDWIDE INFRASTRUCTURE SECURITY REPORT

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

DDoS Introduction. We see things others can t. Pablo Grande.

Downtime by DDoS: Taking an Integrated Multi-Layered Approach. Arbor Solution Brief

The State of Cloud Monitoring

Multi-vector DDOS Attacks

Why DDoS Makes for Risky Business and What You Can Do About It

Introduction to DDoS Attacks

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

WHITE PAPER Hybrid Approach to DDoS Mitigation

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

Comprehensive datacenter protection

The Presence and Future of Web Attacks

Arbor Solution Brief Arbor Cloud for Enterprises

August 14th, 2018 PRESENTED BY:

DDoS Detection&Mitigation: Radware Solution

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

A Survey of Defense Mechanisms Against DDoS Flooding A

NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

DDoS Mitigation & Case Study Ministry of Finance

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Check Point DDoS Protector Simple and Easy Mitigation

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Enterprise D/DoS Mitigation Solution offering

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Imperva Incapsula Product Overview

Global Threat Landscape

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Global DDoS Measurements. Jose Nazario, Ph.D. NSF CyberTrust Workshop

White Paper NEXT GENERATION DDoS SERVICES

CABLE MSO AND TELCO USE CASE HANDBOOK

DDoS: Evolving Threats, Solutions FEATURING: Carlos Morales of Arbor Networks Offers New Strategies INTERVIEW TRANSCRIPT

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

Preparing your network for the next wave of innovation

Are You Fully Prepared to Withstand DNS Attacks?

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Trends in IoT DDoSbotnets

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Toward an Automated Future

Check Point DDoS Protector Introduction

MULTIPLAYER GAMING SOLUTION BRIEF

Distributed Denial of Service (DDoS)

Internet2 DDoS Mitigation Update

SmartWall Threat Defense System - NTD1100

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Large FSI DDoS Protection Reference Architecture

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

The DNS of Things. A. 2001:19b8:10 1:2::f5f5:1d Q. WHERE IS Peter Silva Sr. Technical Marketing

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

NINE MYTHS ABOUT. DDo S PROTECTION

Safeguard Your Internet Presence with Sophisticated DDoS Mitigation.

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

Distributed Denial of Service (DDoS)

Corero & GTT DDoS Trends Report Q2 Q3 2017

Cisco Firepower with Radware DDoS Mitigation

Prolexic Attack Report Q4 2011

Global DDoS Threat Landscape

Enhanced Threat Detection, Investigation, and Response

The Cost of Denial-of-Services Attacks

Cloudflare Advanced DDoS Protection

People risk. Capital risk. Technology risk

Imma Chargin Mah Lazer

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

Keys to a more secure data environment

Building a Threat Intelligence Program

F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

Transcription:

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks abulletti@arbor.net

Topics Covered The DDOS cyber threat and impacts Cyprus attacks trend in 2016 How to address DDoS Challenges 2

Things you should know about DDoS attacks It s never been easier to launch a DDoS attack. DDoS attacks increasing in size, frequency and complexity. DDoS attacks are used as smoke screens diversion during advanced threat campaigns. Of the Top 3 causes of unplanned outages, DDoS attacks are the most costly to an organization. $5:$100sK DDoS for Hire Did You Know? 500Gbps For $5/hr anyone can launch a DDoS attack an cause $100sK in damage DDoS attack size increasing 1 74% involved DDOS as a diversion 2 78% 42% experienced multi-vectored attacks 1 Increase in demand for DDoS Protection services 1 3

DDoS background What is a DDoS Distributed Denial Of Service attack? An attempt to consume finite resources, exploit weaknesses in software design or implementations, or exploit lack of infrastructure. An attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. DDoS attacks effect availability! No Availability, no applications/services/data/internet! NO revenue! Attacks are almost always distributed for more significant effect. 4

DDoS Growth continues Largest attack reported in 2015 was 500 Gbps with other respondents reporting attacks of 450 Gbps, 425 Gbps, and 337 Gbps. Another five respondents reported 200+ Gbps attacks. Nearly one quarter of respondents report peak attacks over 100Gbps. Over half of data center respondents saw attacks that completely saturated their Internet connectivity. 5

DDoS as an Evolving Threat ISP 1 Attackers use a combination of techniques Layer 4-7, Smart DDoS Impact DATA CENTER ISP 2 ISP Exhaustion of Service SATURATION Firewall IPS Load Balancer ISP n EXHAUSTION Target Applications & Services Volumetric, Brute Force DDoS Impact 6

DDoS Attacks Exposure Financial Services Gaming Online Retail Education Government Cloud Services Any organization can be the target of a DDoS attack Most affected industries: Public, Retail, and Financial Services ** Picture: Number of DDoS attacks by victim industry and organization size (small is < 1,000 employees) ** **Source Verizon 2015 DBIR 7

DDoS Attacks Motivations Enterprise respondents Service Provider respondents 8

DDoS Attacks Impacts Short Term Impact Service Degradation Network Outage Mid Term Impact APT Target Campaign Long Term Impact Loss of Reputation Decrease Revenue 9

DDoS and the move to Cloud Global cloud IP traffic will almost quadruple (3.7-fold) over the next 5 years. Overall, cloud IP traffic will grow at a CAGR of 30 percent from 2015 to 2020 ** ** Source Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 10

DDoS Attacks to SP and the Enterprise 11

DDoS Attacks in Cyprus 2016 Sample Arbor Data Attack BPS Breakout Attacks PPS Breakout 23% 9% 23% 1G to 2G 2G to 5G 5G to 10G > 10G 31% 6% 63% less than 500k 500k to 1M > 1M 45% 12

DDoS Attacks in Cyprus 2016 Sample Arbor Data 1% Attack Duraton in Hours 6% 2% 1% 3% 3% Type of attack less than 0.5 16% IP Fragmentation, UDP, chargen Amplification 93% 0.5 to 1 1 to 3 IP Fragmentation, UDP, DNS Amplification IP Fragmentation, UDP, DNS Amplification, chargen Amplification UDP, NTP Amplification UDP, SSDP Amplification 70 60 50 40 30 20 10 0 Attack Duraton in Hours less than 0.5 0.5 to 1 1 to 3 75% UDP 13

Stopping DDoS Attacks Layered DDoS Attack Protection 1 Stop volumetric attacks In-Cloud Scrubbing Center 3 Intelligent communication between both environments Volumetric Attack Application Attack The Internet Your (ISP s) Network Your Data Centers/Internal Networks 4 Backed by continuous threat intelligence Backed by Continuous Threat Intelligence 2 Stop application layer DDoS attacks & other advanced threats; detect abnormal outbound activity A Recommended Industry Best Practice: 14

Arbor s DDoS Protection Solution Comprehensive DDoS Protection Products & Services Target/Compromised Hosts Armed with Global Visibility & Actionable Threat Intelligence 15

The Internet Atlas and ASERT 15 years of deployment in a majority of world s ISPs offer unique visibility into global threats Over 300 ISPs participating in ATLAS; providing Global Visibility and Threat Intelligence ASERT is a team of industry experts who conduct threat research, help customer mitigate DDoS attacks and create ATLAS Intelligence Feeds IF ATLAS & ASERT continuously arm all Arbor products and services with global threat intelligence ATLAS Intelligence Feed allowing customers to stay abreast of DDoS and advanced threats 16

Conclusion DDoS Attacks may bring down any Service Direct impact as loss of revenues, lower customers experience Arbor Networks Solution guarantees Protection by: Continuous traffic analysis and visibility: ATLAS, Digital Attack Map AIF, ASERT network trend and application analysis Automated Workflow for Mitigating all attacks on premises and cloud Detection and Mitigation of full scope DDoS Attacks with High Accuracy Shortest time to protect 17

Thank You abulletti@arbor.net +39 3388661617