The Presence and Future of Web Attacks

Similar documents
DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

akamai s [state of the internet] / security

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

haltdos - Web Application Firewall

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

The Interactive Guide to Protecting Your Election Website

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Evidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks

Additional Security Services on AWS

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

epldt Web Builder Security March 2017

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Intelligent and Secure Network

Securing Your Microsoft Azure Virtual Networks

Prolexic Attack Report Q4 2011

AKAMAI CLOUD SECURITY SOLUTIONS

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Maximum Security, Zero Compromise in Availability and Performance

Re-engineering the DNS One Resolver at a Time. Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Securing Your Amazon Web Services Virtual Networks

Multi-vector DDOS Attacks

Cyber War Chronicles Stories from the Virtual Trenches

DDoS Detection&Mitigation: Radware Solution

Enterprise D/DoS Mitigation Solution offering

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Herding Cats. Carl Brothers, F5 Field Systems Engineer

F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

DDOS-GUARD Q DDoS Attack Report

Integrated Web Application Firewall & Distributed Denial of Service (DDoS) Mitigation Solution

Q WEB APPLICATION ATTACK STATISTICS

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CyberP3i Hands-on Lab Series

HP 2012 Cyber Security Risk Report Overview

Q Web Attack Analysis Report

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

AppSpider Enterprise. Getting Started Guide

Vulnerability Signature Update

Web Application Security. Philippe Bogaerts

雲服務比你想像更安全? 陳建宏 Akamai 大中華區資安業務總監

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Protect your apps and your customers against application layer attacks

Global DDoS Measurements. Jose Nazario, Ph.D. NSF CyberTrust Workshop

SOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT

IBM Cloud Internet Services: Optimizing security to protect your web applications

GOING WHERE NO WAFS HAVE GONE BEFORE

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs

CNIT 129S: Securing Web Applications. Ch 10: Attacking Back-End Components

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

A Security Orchestration System for CDN Edge Servers

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Comprehensive datacenter protection

2015 DDoS Attack Trends and 2016 Outlook

Global DDoS Threat Landscape

CompTIA CAS-002. CompTIA Advanced Security Practitioner (CASP) Download Full Version :

A different approach to Application Security

( ) 2016 NSFOCUS

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Title: Planning AWS Platform Security Assessment?

Defend Your Web Applications Against the OWASP Top 10 Security Risks. Speaker Name, Job Title

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Webshells. Webshell Examples. How does a webshell attack work? Nir Zigler,

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies

9 STEPS FOR FIGHTING AGAINST DDOS ATTACKS IN REAL-TIME.

IBM Security Network Protection Solutions

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

The OWASP Foundation

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

Web Penetration Testing

CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

Distributed Denial of Service War Stories from the Cloud Front. Michael Smith Security Evangelist

RSA Web Threat Detection

Load Balancing Web Servers with OWASP Top 10 WAF in Azure

Pushed to the Limit! Network and Application Security Threat Landscape Lior Zamir Technical Account Manager

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Transcription:

Agenda The Presence and Future of Web Attacks Marco Fullin, CISSP Warning: This talk will be technical, chaotic and hurt

Akamai Today Grow revenue opportunities with fast, personalized web experiences A distributed and cloud manage platform complexity that manages from peak the demand, underlying mobile devices complexities and data of collection. the Internet 210 000+ servers, 3000+ locations, 1400+ networks, 120+ Countries Delivers over 2 trillion Internet transactions daily Akamai delivers up to 30% of the world s web traffic

DDoS Attacks - Stats & Trends Q1 2016 23% Total DDoS attacks 107% Repeat attacks per target 23% Infrastructure layer attacks 8% Average attack duration 280% Total attacks >100 Gbps Largest attack: 289 Gbps In Q1 2016, Stresser/Booter-based botnets remained the source of the vast majority of DDoS attacks observed by Akamai. These tools rely heavily upon reflection techniques to fuel their traffic.

DDoS Attacks from Q1 2014 to Q1 2016 Each dot represents a DDoS attack, and each interval covers a 10-fold increase in attack size.

Top 10 Source Countries for DDoS Attacks in Q1 2016 China was the top source of nonspoofed by extending DDoS the Avoid data theft and downtime attacks in the first security perimeter outside the data-center and quarter, followed by protect from increasing frequency, the US. scale and sophistication of web attacks.

Types of DDoS Attacks & Relative Distribution in Q1 2016 UDP Fragment, DNS, NTP and CHARGEN attack vectors made up almost 70% of the attacks.

Multi-Vector DDoS Attacks Are the Norm Multi-vector attacks accounted for 59% Avoid data theft and downtime by of extending DDoS activity the in security perimeter outside the data-center Q1 2016, and up from protect from increasing frequency, 56% scale in and Q4 2015 sophistication of web attacks.

Web Application Attack Analysis

9 Common Web Attack Vectors SQLi / SQL injection: User content is passed to an SQL statement without proper validation LFI / Local file inclusion: Gains unauthorized read access to local files on the web server RFI / Remote file inclusion: Abuse of the dynamic file include mechanism available in many programming languages to load remote malicious code into the victim web application PHPi / PHP injection: Injects PHP code that gets executed by the PHP interpreter CMDi / Command injection: Executes arbitrary shell commands on the target system JAVAi / Java injection: Abuses the Object Graph Navigation Language (OGNL), a Java expression language. Popular due to recent flaws in the Java-based Struts Framework, which uses OGNL extensively MFU / Malicious file upload (or unrestricted file upload): Uploads unauthorized files to the target application that may be used later to gain full control over the system XSS / Cross-site scripting: Injects client-side code into web pages viewed by others whose browsers execute the code within the security context (or zone) of the hosting web site. Reads, modifies and/or transmits data accessible by the browser Shellshock / Disclosed in September 2014: A vulnerability in the Bash shell (the default shell for Linux and mac OS X) that allows for arbitrary command execution by a remote attacker

Web Application Attack Vectors Over HTTP, Q1 2016 SQLi, LFI and XSS were the most prevalent attack vectors. They were used in more than 90% of the attacks over HTTP.

Attacks Over HTTPS, Q1 2016 30% of the web application attacks observed in Q1 2016 were over encrypted (HTTPS) connections, an increase from only 11% the previous quarter.

Web Application Attacks by Industry, Q1 2016 As in previous quarters, the retail industry was most frequently targeted with web application attacks in Q1 2016.

Top 10 Source Countries for Web Application Attacks, Q1 2016

DDoS Attacks Looking Forward More records set for the number of DDoS attacks Driven in large part by the continued use of stresser/booter botnets Attack vectors and methods will continue to vary Majority of attacks will likely rely on reflection Inclusion of new vectors such as TFTP reflection The number of targets attacked will likely grow incrementally Large increases in attacks per target

DDoS Mitigation

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Booter / Stresser / DDoS Attack Tools

Akamai Cloud Security Solutions Globally distributed cloud platform Distribution - Resiliency - Visibility Integrated web security DDoS - WAF - IP Reputation Infrastructure protection DDoS - Datacenter - Flexible Deployment DNS protection DDoS - DNSSEC - High Performance

Reference: http://www.stateoftheinternet.com