1067 Ddos-Protection-Networks DS May2018 PDF
1067 Ddos-Protection-Networks DS May2018 PDF
ORACLE DYN
DDOS PROTECTION
FOR NETWORKS
Overview
Threat actors use globally distributed and highly scalable resources to
attack and breach enterprises. As a result, they retain an advantage over
organizations attempting to combat cyber threats with perimeter-only
solutions. Organizations need to embrace dynamically scalable, globally
distributed solutions to detect and thwart attacks before they reach the
network perimeter.
On-demand bandwidth to handle the largest DDoS • Always-On requires L2 redundant connections: Always-On via
attacks. GRE tunnels is notrecommended, since a GRE tunnel can flap
from time to time.
Distributed Denial of Service (DDoS) attacks are commonplace in
today’s cybersecurity landscape. These attacks range from just a few Oracle Dyn RapidBGP™ provides always-on monitoring and
Gbps to several hundred Gbps and beyond. Most organizations have automatic rerouting once an attack is detected. When no attack is
limited transit and available “burst” traffic capacity connecting their detected, the traffic flows normally to the clients’ infrastructure.
data centers. Attackers use this to their advantage, easily flooding
data centers with enough malicious traffic to make their online It is similar to an Always-On SLA (as there is instantaneous attack
services unavailable to customers, partners, and internal staff. detection and automatic re-routing/mitigation), without any of the
latency impacts and the risks of noisy neighbors:
Shared, global threat intelligence. • Time-to-Mitigation (TTM) is less than 60 seconds, which
ensures that the client is underfull mitigation protection before
Oracle Dyn provides the ability to share the latest attack information the attack has fully ramped up.
and mitigation techniques across departments, partners, and an
organization’s supply chain. Oracle Dyn allows for a common set of • Latency impact only happens during an attack (contrary to
policies for all sites and infrastructures that use the ecosystem. Threat an Always-On solution, whenthere is latency impact 100%
Intelligence and IP blacklisting are updated in real-time across the of the time).
entire network.
• Surgical precision: only the /24 under attack is rerouted. The
rest of the traffic is not impacted. RapidBGP is able to reroute
RapidBGP™: 60 second time-to-mitigate only the C-class IP block (/24) that is under attack so that there
is no collateral damage to the rest of the net blocks in use.
Oracle Dyn provides fully automatic, always-on attack monitoring
using NetFlow samples from the customer’s edge routers. For
fully automated BGP rerouting, the time from detect to mitigate is
performed in less than 60 seconds.
Data Sovereignty
Oracle Dyn POPs are located in specifically designated regions. This enables
configuration capabilities, at the customer’s request, to provide for geographic
site constraints served exclusively from regionally defined POPs, hence
complying with local data residency and data sovereignty requirements.
Some examples of types of attacks include: SYN Floods (Spoofed IPs, Key Capabilities: DDoS Protection For Networks
non-standard TCP flags), UDP Floods, IPSec Floods (IKE/ISAMP assoc.
• Comprehensive protection for all types of DDoS attacks.
attempts), IP/ICMP Fragmentation, NTP, DNS, SSDP, Memcached, etc.
Reflection/Amplification Attacks, DNS Floods, etc. • Protects large numbers of customer’ applications, destination
IPs, entire subnets, web and IP-based applications.
Oracle Dyn eliminates the effects of these types of attacks
automatically at the network layer within high capacity DDoS • Dedicated scrubbing centers in North America East,
Scrubbing Centers. These are globally distributed to minimize latency. North America West, and Europe with 1.7 Tbps of
DDoS Scrubbing Centers are located in North America East, North scrubbing capacity.
America West, and Western Europe. • Expert DDoS engineers who perform real-time analysis and
support for multi-vector attacks 24x7x365 in global SOCs.
Graphic Representation of an Attack: • Oracle Dyn Control Center (customer portal) provides
real-time traffic updates.
RapidBGP™ solution:
60 second detect and act
Oracle Dyn has developed a new model for rapid DDoS Mitigation. Oracle
Dyn continuously monitors NetFlow and SNMP from the customer’ border
routers to detect attacks using an automatic analysis of DDoS alerts. In the
event of an attack, there is a deployment of BGP routing commands to take
immediate action. All of this takes place without the time delay caused by
human intervention.
Oracle Dyn only enables this countermeasure when an attack has DNS Flood
multiple components that include both a spoofed SYN flood and
an HTTP request flood. Note that HTTP request floods and other If an attack targets the DNS, Oracle Dyn offers DNS DDoS
layer 7 attack types are detected by Oracle Dyn application runtime protection. The DNS is protected in two ways 1) at the network
and real-time threat intelligence is pushed to the packet filtering layer scrubbing bad requests, as well as 2) a proxy solution that
hardware automatically. customers can use to hide their DNS servers.
The countermeasures listed above are a few of the techniques that Operating at both the network layer, and through the proxy product
the Oracle Dyn SOC uses to mitigate attacks. In addition, other we have implemented a combination of countermeasures:
countermeasures are available through detailed configuration
tuning that controls host blocking policies. DNS Flood Regex – Oracle Dyn enables our SOC to
inspect request strings using a DNS Regular Expression.This
countermeasure will drop malicious inbound DNS message packets
based on standard and custom regular expression matching as
well as other filter settings. REGEX as a countermeasure can also
DNS Flood Protection blacklist hosts that were sending malicious packets that were
dropped. In addition, this countermeasure can be used for inbound
DNS queries and inbound DNS replies.
What is a botnet?
A botnet is a network of computers infected with malicious software
(aka malware). Botnets run on the infected computer without the user’s
knowledge. The infected computer is controlled by an attacker, or bot-
herder, from the command and control center, updating the bot software as
it progresses through the various stages of an attack. The bot communicates
with the command center sending information then morphing via software
updates making them extremely hard to detect. Botnets are used to commit
a variety of cybercrimes such as SPAM, scams, hacks and distributed denial
of service (DDoS) attacks. Computers called command and control (C&C)
servers are responsible for commanding the infected computers, allowing
the bot-herder to put the botnet to use. Bot-herders also often sell or rent
out parts of their botnet to other attackers for their own use. The larger the
botnet, the more cybercrime it can commit. An entire industry, Crime as a
Service, has emerged from botnet usage. Oracle Dyn researchers diligently
collectinformation from the dark web and integrate this information into
detection algorithms.