Information Security Adaption: Survival In An Evolving Threat Landscape. Carl Herberger VP, Security Solutions, Radware

Similar documents
DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

the Breakdown of Perimeter Defenses

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Herding Cats. Carl Brothers, F5 Field Systems Engineer

DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper

Cisco Firepower with Radware DDoS Mitigation

Comprehensive datacenter protection

Network Security. Thierry Sans

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action

Corrigendum 3. Tender Number: 10/ dated

Check Point DDoS Protector Introduction

Cyber War Chronicles Stories from the Virtual Trenches

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Curso: Ethical Hacking and Countermeasures

SECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Silverline DDoS Protection. Filip Verlaeckt

Business Strategy Theatre

Cyber Attacks and Application - Motivation, Methods and Mitigation. Alfredo Vistola Solution Architect Security, EMEA

Endpoint Protection : Last line of defense?

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Imma Chargin Mah Lazer

Ethical Hacking and Prevention

Understanding Cisco Cybersecurity Fundamentals

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Multi-vector DDOS Attacks

IxLoad-Attack TM : Network Security Testing

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Intelligent and Secure Network

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

F5 Synthesis Information Session. April, 2014

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

Implementing Cisco Cybersecurity Operations

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

The Next Cyber War Geo-Political Events And Cyber Attacks. Werner Thalmeier Director Security Solutions EMEA & CALA

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Arbor White Paper. DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

DDoS Mitigation & Case Study Ministry of Finance

haltdos - Web Application Firewall

Course 831 Certified Ethical Hacker v9

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

DDoS Introduction. We see things others can t. Pablo Grande.

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

2011 Global Application

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

DDoS Detection&Mitigation: Radware Solution

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Security+ SY0-501 Study Guide Table of Contents

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

MOBILE SECURITY OVERVIEW. Tim LeMaster

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Security Assessment Checklist

20-CS Cyber Defense Overview Fall, Network Basics

Enterprise D/DoS Mitigation Solution offering

A Survey of Defense Mechanisms Against DDoS Flooding A

이충구부장 - Apps & Security 총괄 / IXIA Korea 지능형지속공격을위한진화된테스트방법. -Next Generation Security Validation

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

Integrated Web Application Firewall & Distributed Denial of Service (DDoS) Mitigation Solution

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Pushed to the Limit! Network and Application Security Threat Landscape Lior Zamir Technical Account Manager

CSC 4900 Computer Networks: Security Protocols (2)

CNT4406/5412 Network Security Introduction

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

The Telephony Denial of Service (TDoS) Threat

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

CHAPTER 8 SECURING INFORMATION SYSTEMS

Cybersecurity Survey Results

The Barracuda Web Application Firewall Versus Anonymous. Best Practices for Planning and Defending Against Attacks by Anonymous.

AKAMAI CLOUD SECURITY SOLUTIONS

The Six Most Dangerous New Attack Techniques And What s Coming Next? Ed Skoudis CounterHackChallenge

This release of the product includes these new features that have been added since NGFW 5.5.

Managing an Active Incident Response Case. Paul Underwood, COO

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Transcription:

Information Security Adaption: Survival In An Evolving Threat Landscape Carl Herberger VP, Security Solutions, Radware

The Evolving Threat Landscape Anatomy of an Attack Securing Tomorrow s Perimeter

The Evolving Threat Landscape

More Attacks. More Often.

Latency Yesterday for US Commercial Banks

Attack Motivation Vandalism and Publicity Financially Motivated Blending Motives Hacktivism Dec 2010 Operation Payback Mar 2011 Netbot DDoS LulzSec Sony, CIA, FBI Attack Risk CodeRed 2001 Nimda (Installed Trojan) 2001 Blaster 2003 Agobot (DoS Botnet) Slammer Republican (Attacking SQL sites) 2003 website DoS 2004 Storm (Botnet) 2007 Srizbi (Botnet) Rustock 2007 (Botnet) 2007 Estonia s Web Sites DoS 2007 Kracken (Botnet) 2009 2010 IMDDOS (Botnet) July 2009 Cyber Attacks US & Korea Google / Twitter Attacks2009 Georgia Web sites DoS 2008 2001 2005 2010 Mar 2011 Codero DDoS / Twitter Mar 2011 Operation Payback II Mar 2011 DDoS Wordpress.com Peru, Chile Time

Hacktivism - Becomes More Campaign-APT Oriented Complex: More than seven different attack vectors at once Blending: both network and application attacks Targeteering: Select the most appropriate target, attack tools, Resourcing: Advertise, invite, coerce anyone capable Testing: Perform short proof-firing prior to the attack Timeline: Establish the most painful time period for his victim Slide 7

Hacktivism - Becomes More Campaign-APT Oriented Sophistication measure Duration: 20 Days More than 7 Attack vectors Inner cycle involvement Attack target: Vatican Duration: 3 Days 4 Attack vectors Attack target: Visa, MasterCard Duration: 3 Days 5 Attack vectors Only inner cycle involvement Attack target: HKEX Duration: 6 Days 5 Attack vectors Inner cycle involvement Attack target: Israeli sites Slide 8

The Anonymous Arms Race Network Application Flood Low & Slow Vulnerability Based UDP Floods Dynamic HTTP RUDY Intrusion Attempts SYN Floods HTTPS Floods Slowloris SQL Injection Fragmented Floods Pyloris #refref FIN + ACK xerex

Digital Supply Chain Defense Integration In-the-Cloud Defenses Cloud Common Targets: DNS, ISP, CDN & CA/CRL Perimeter Defenses Network & Application (Outer) DefensePro Perimeter Common Targets: Firewalls, IPS, Routers, Load Balancers Advanced (Inner) Application Defenses AppWall Application Targets: Sessions, Connections, SSL Protected Online Services

2012 Security Report

Anatomy of an Attack The Evolving Threat Landscape Securing Tomorrow s Perimeter

Example Stock Exchange Attack Attack Vector Time Stamp Attack Peak Fragmented UDP Flood 1:00 AM 95 Mbps 10K PPS LOIC UDP 4:00 AM and 8:00 PM - 11:00 PM 50 Mbps 5K PPS TCP SYN Flood 1:40 PM 13.6 Mbps 24K PPS R.U.D.Y 4:00 PM 2.1 Mbps 0.7K PPS LOIC TCP 11:00 PM - 3:30 AM 500 Kbps 0.2K PPS Mobile LOIC 6:00 PM- 8:30 PM 86 Kbps 13 PPS #RefRef 9:45 PM Few packets

The Security Trinity Security Confidentiality, a mainstream adaptation of the need to know principle of the military ethic, restricts the access of information to those systems, processes and recipients from which the content was intended to be exposed. Confidentiality Integrity Security Integrity in its broadest meaning refers to the trustworthiness of information over its entire life cycle. Security Availability is a characteristic that distinguishes information objects that have signaling and self-sustaining Availability processes from those that do not, either because such functions have ceased (outage, an attack), or else because they lack such functions.

The Security Trinity Confidentiality Integrity Availability

Enterprise Encryption Database Security Compliance Oriented Activity Social Engineering Protection 2011 Sony 100M HB Gary - FBI 2011-2012 AES Hack Apple 12M Data Leakage Protection 2005 Ameriprise 2009 Heartland 100M Rock You! 32M 2010 +/- RSA 2-Factor Token Hack 2008 Countrywide 17M GE Financial 800K WEP Attacks TLS Attacks EAP Attacks L2LP Attacks 2007 TJ Maxx 45M The Gap 800K ARP Attacks PPTP Attacks SIP Attacks 2006 Boeing 386K Dept. of VA 29M AES Attacks VPN Attacks Application Exploits Network Exploits MITB Attacks 3DES Attacks Encryption & Authentication Weaknesses Financial 24M Lost IPv6 Encapsulated in IPv4 Hash Attacks SSL Attacks O/S Exploits Defenses Examples Attacks Vulnerabilities Confidentiality

The Security Trinity Confidentiality Integrity Availability

The Security Trinity Confidentiality Integrity Availability

2002 SSH2 Hack Hardware Security Modules (HSM) 2006 SSL / TLS Plaintext Attack 2008 US CERT: MD5 Hash Insecure Federated Identity Management Fraud & Scams Man-inthe-Middle O/S Exploits Anonymizers Malware Transmission Encryption Weaknesses Application Exploits ARP Attacks Unauthorized Authentication Network Exploits 2009 Encrypted Kernel Exploit Discovered Steganography Spoofing Keyloggers 2010 PCI: Kiss your WEP Goodbye! Rootkits Skimming Dec 2010 NIST: 1K Certs Not Recommended 2011 Browser Exploit Against SSL / TLS (BEAST) Released Nov 2011 - THC SSL Attack Released Multi-Factored Authentication Public Key Infrastructure Network Access Control Fraud Detection / Hash Checksums Integrity Vulnerabilities Attacks Examples Defenses

The Security Trinity Confidentiality Integrity Availability

The Security Trinity Confidentiality Integrity Availability

ICMP Floods TCP Fragment Floods LOIC IGMP Floods ACK Floods Xerxes Feb 2010 Operation Titstorm: Australian Government Outages Hardware-Based Volumetric Protections RFC Violation Attacks HTTP GET Page Floods #Refref Application Exploits SSL Attacks Memory Allocation Attacks Socket Stress Nov 2010 Operation Payback Visa, MasterCard + other outages Web-Application Firewall Business Logic Brute Force Attacks Behavioral Technologies O/S Exploits SQL Attacks Plyoris Apr 2011 Operation Sony Play Station.com Outage, Leaked CC# Availability Vulnerabilities Concurrent Connection Attacks TCP SYN Floods Attacks Tools Examples Defenses RFC Exploits TCP Out-of- State Floods R-U-Dead- Yet (RUDY) June 2011 Operation Iran Iran Government Outages, Leaked Emails, Hacked IT Architecture Exploits Network Exploits SIP Attacks Architecture Improvements DNS Query Floods TCP SYN+ACK Floods Slowloris Session Attacks TCP RESET Floods TCP FIN Floods HTTP POST Floods TCP Stack Resource Attacks Leonitis Jun 2011 Operation AntiSec AZ Department of Public Safety Down Challenge / Response Technology HOIC HULK Jun 2012 AT&T DNS Outage & L3 ISP Outage Attacks Black / White / Access Control Lists

Size Does Not Matter. Honest. The impact of application flood attacks are much more severe than network flood attacks 76% of attacks are below 1Gbps!

Availability-based Threats Tree Availabilitybased Threats Network Floods (Volumetric) Application Floods Low-and-Slow Single-packet DoS ICMP Flood Web Flood DNS SMTP UPD Flood HTTPS SYN Flood Radware Confidential Jan 2012 Slide 24

R.U.D.Y (R-U-Dead-Yet) R.U.D.Y. (R-U-Dead-Yet?) R.U.D.Y. (R-U-Dead-Yet?) is a slow-rate HTTP POST (Layer 7) denial-of-service tool created by Raviv Raz and named after the Children of Bodom album Are You Dead Yet? It achieves denial-of-service by using long form field submissions. By injecting one byte of information into an application POST field at a time and then waiting, R.U.D.Y. causes application threads to await the end of never-ending posts in order to perform processing (this behavior is necessary in order to allow web servers to support users with slower connections). Since R.U.D.Y. causes the target webserver to hang while waiting for the rest of an HTTP POST request, by initiating simultaneous connections to the server the attacker is ultimately able to exhaust the server s connection table and create a denial-of-service condition. Slide 25 Radware Confidential Jan 2012

Main Bottlenecks During DoS Attacks - ERT Survey Slide 26 Radware Confidential Jan 2012

The Impact Confidentiality Integrity Availability Target / Operation Habbo Hal Turner Project Chanology Epilepsy Foundation AllHipHop Defacement No Cussing Club 2009 Iranian Election Protests Operation Didgeridie Operation Titstorm Oregon Tea Party Raid Operation Payback Avenge Assange Ope Bra 2007 2008 2009 2010

Defense Blind Spot Map Protection Purpose Firewall IPS WAF Router ACLs Next Gen FW Anti-DoS Appliance (CPE) DLP Cloud Anti-DoS Data-At-Rest Protections (Confidentiality) Data-At-Endpoint (Confidentiality) Data-In-Transit (Confidentiality) Network Infrastructure Protection (Integrity) Application Infrastructure Protection (Integrity) Volumetric Attacks (Availability) Non-Volumetric Resource Attacks (Availability)

Gartner Sep 2012: Anti-DoS BlindSpot

Gartner Sep 2012: Anti-DoS BlindSpot

Securing Tomorrow s Perimeter

What We Should Work Toward 100% Architecture Protection. Varied Deployment Models. Understand the behavior beyond protocol and content It s an eco-system.collaboration is key Emergency response & triage: Practice cyber war rooms Integrate offense into your security strategies. Slide 32

Perimeter Defense Planning

Perimeter Defense Planning Any gap in coverage represents a vulnerability. That will be exploited.

Perimeter Defense Planning

Key Notes: - Counter Attack s Comeuppance is Upon Us - Key IR Assumptions are wrong e.g. Law enforcement - Attack Mitigation Talent is Low. Knowledge must increase. - Corporate Policies are IR not ERT focused The Best Defense Is A

Anatomy of an Attack The Evolving Threat Landscape Securing Tomorrow s Perimeter

Adapting Perimeter Defenses Plan for 100% architecture protection Review your attack mitigation toolkit Assess infrastructure vulnerabilities to DDoS attacks Plan ahead Can t stop attacks without a game plan Emergency response & triage - Practice cyber war rooms Integrate offense into your security strategies Watch what s happening on the network Do you have signals? Assume attacks will be multi-vector in nature Partner with companies that know how to defend against persistent attacks

Thank You Carl Herberger VP, Security Solutions Radware carl.herberger@radware.com