Arbor-Advanced DDoS Trends and Protection
Arbor-Advanced DDoS Trends and Protection
ENTERPRISE
SERVICE
PROVIDER
Honey Pots
Memcached DDoS
• Record Breaking
• Combine with IP spoofing ,
results is a 1.7Tbps attack
packet payload=binascii.unhexlify('0001000000010000676574206120612061206120612061206120612061206120…
pkt=Ether()/IP(src="10.1.138.170",dst="172.17.10.103")/UDP(sport=80,dport=11211)/payload
sendp(pkt, iface="eth1", loop=0,verbose=False)
Attack Vectors:
◦ SYN-flooding ◦ The Mirai Botnet is
◦ ACK-flooding capable of launching
◦ UDP flooding complex multi-vector
◦ Valve Source Engine (VSE) attacks.
query-flooding
◦ GRE-flooding
◦ Pseudo-random DNS label-prepending attacks (also known as DNS ‘Water Torture’
attacks)
◦ HTTP GET, POST and HEAD attacks
✘
down (LSU & Ga Tech)
✘
• Every 100ms delay equates to a
1% loss in sales (Amazon)
Source: Arbor Networks 12th Annual Worldwide Infrastructure Security Report, ATLAS data
Legitimate Traffic
Firewall
BotNet
Volumetric Attacks
◦ Large(up to 800 Gbps)
Application Layer Attacks
◦ Saturates links ◦ Low and Slow, Stealth attacks
◦ Crashes application servers
Penalties:
§ Organizations in breach of GDPR can be fined up to (max) 4% of annual global
turnover or €20 Million (whichever is greater).
§ It is important to note that these rules apply to both controllers and processors --
meaning 'clouds' will not be exempt from GDPR enforcement.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 22
To Stop Large Attacks….
Attack Traffic
DDoS Firewall
BotNet Application
Protection
Servers
DDoS
ffic Protection Cl e
BotNet Tr
a an
T
k raff
ttac ic
A
Attack Traffic
Firewall
BotNet
§ Recall:
§ Vast majority of DDoS attacks are small (e.g. less than 2 GB)
§ And last for short duration of time (e.g. less than 1 hr)
§ Yet they still can be multi-vector (e.g. 67%)
§ These attacks are difficult for ISP/MSSP to detect.
Attack Traffic
DDoS Firewall
BotNet
Protection
Application Attack
DDoS Protection
Your (ISP’s) Network
Your Data Centers/
The Internet Internal Networks
Backed by continuous
4
threat intelligence.
A Recommended Industry Best Practice:
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 27
Defending Against Insider Threats
• These Security Best Practices include:
– Updating the software on all devices on a regular basis.
– Implementing full Network segmentation and harden (or isolate)
vulnerable network devices and services.
– Developing a DDoS Attack mitigation process.
– Utilizing flow telemetry to analyze external and internal traffic.
This is necessary for attack detection, classification and trace
back.
– Deploying a multi-layered DDoS protection.
– Scanning for misconfigured and abusable services, this includes
NTP, DNS and SSDP service which can be used for amplification
attacks.
– Implementing Anti-Spoofing mechanisms such as Unicast
Reverse-Path Forwarding, ACLs, DHCP Snooping & IP Source
Guard on all edge devices.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 28
Agenda
Volume
State&Application
Volume
State&Application
Telco Cloud
Volume
State&Application
From https://datatracker.ietf.org/meeting/93/materials/slides-93-dots-3/
Mitigation
Signal channel Mitigation
Update Request
Aliases
BW lists
Filters
Data channel (optional) Policies
Volume
State&Application
DDoS
Scrubbing center
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 39
Automation of FlowSpec
Offload blocking of identified bots
Protocol: UDP
DST IP: victim/32 DDoS
UDP to random ports Action: redirect to IP
Non-spoofed TCP attacks
Patrick Lin
plin@arbor.net
www.netscout.com