Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013 AGENDA DDoS attacks & Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations DoS – How does it Look • Simple Way – Excessive or specially crafted traffic causing network/server/application resources misuse, thus preventing legitimate traffic to reach its destination and limits the service providing, generated by tools, humans or both. Can be based on Volume / Rate / Vulnerability Exploitation • Detailed – Layer 3 Floods – targeting the network equipment, and the actual pipe capacity – Layer 4 Floods – targeting the servers (physical or virtual), their stack resources – Layer 7 Floods – targeting real applications and services 3 Network and Data Security Attacks: from the News 4 Cyber Security Study • • • • A research study by Ponemon & Radware Surveyed 700 IT & IT Security Practitioners Non Radware customers Release date: Q4/2012 5 DDoS Attacks Frequency How many DDoS attacks experienced in the past 12 months? 65% of organizations had an average of 3 DDoS attacks in the past 12 months 6 Average downtime during one DDoS attack 25% 22% 20% 16% 15% 10% 13% 10% 54 Minutes average 11% downtime during one DDoS9%attack 5% 5% 10% 4% 0% Less than 1 minute 11 to 20 minutes 31 to 60 minutes 3 to 5 hours Cannot determine 7 AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations Information Resources • Industry Security Survey – External survey – 179 companies – Most are not using Radware DoS mitigation solution • ERT Cases – Internal survey – Unique visibility into attacks behavior – 95 selected cases • Customer identity remains undisclosed ERT gets to see attacks in real-time on daily basis 9 AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations Organizations Bring a Knife to a Gunfight • ”Someone who brings a knife to a gun fight” – Is someone who does prepare himself for the fight, but does not understand its true nature • Organizations today are like that – They do invest before the attack starts, and conduct excellent forensics after it is over, – however, they have one critical blind-spot – they don't have the capabilities or resources to sustain a long, complicated attack campaign. • Attackers target this blind spot! 11 Attacked in 2012 They had the budget They made the investment And yet they went offline 12 But Attacks Today Have 3 Phases 13 ERT Cases – Attack Duration Trend 21% 23% 14 21% 12% 12 10 2011 2012 8 6 11% 4 12% 2 2012 0 1-2 days 2011 Half a week 1 week Attacks last longer: The number of DoS attacks lasting over a week had doubled in 2012 14 ERT Cases – Attack Vectors Trend ERT Cases – Attack Vectors 29% 29% 16% 30% 25% 20% 15% 16% 10% 4% 5% 7% 0% 5-6 7-8 2011 2012 Complexity 9-10 Attacks are more complex: 2012 DoS/DDoS attacks have become more sophisticated, using more complex attack vectors. Note the number of attacks using a complexity level of 7-10. 15 Attack Vectors Trends Industry Security Survey – Attack Count by Type Attack remained diversified between different attack types. This reflects attackers using multi-vector attacks. 16 Entities That Are The Bottlenecks in DoS Attacks Industry Security Survey Which services or network elements are (or have been) the bottleneck of DoS? 30% 30% 27% 26% 24% 25% 25% 22% 20% 15% 2011 2012 11% 8% 8% 8% 10% 5% 4% 5% 0% Internet pipe (saturation) Firewall IPS/IDS Load Balancer (ADC) The server under attack SQL Server The three entities that are consistently the bottlenecks in DoS/DDoS attacks are the server under attack, the firewall and the Internet pipe. 17 Solutions Used Against DoS Attacks Industry Security Survey Which solutions do you use against DoS attacks? 45% 40% 40% 32% 32% 35% 27% 30% 25% 20% 12% 8% 5% 5% 15% 10% 8% 5% 5% 1% 3% 5% 2% 10% 5% 2012 0% 2011 18 Attackers Motivation Trend 60.0% 50.0% 40.0% 2011 30.0% 2012 20.0% 10.0% 0.0% Motivation is unknown Political/Hacktivism Angry users Competition Ransoms DoS motivation did not change in 2012 compared to last year. 19 Who’s On The Target List? Low Medium ISP High Financial Government eCommerce eGaming Mobile 2012 2011 Prior to 2011 20 AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations AMS Protection Set DoS Protection • Prevent all type of network DDoS attacks Reputation Engine • Financial fraud protection • Anti Trojan & Phishing IPS • Prevent application vulnerability exploits WAF • Mitigating Web application threats and zero-day attacks NBA • Prevent application resource misuse • Prevent zero-minute malware 22 Radware Security Event Management (SEM) • Correlated reports • Trend analysis • Compliance management • RT monitoring • Advanced alerts • Forensics 3rd Party SEM 23 Radware AMS & ERT/SOC 24 Thank You www.radware.com