view the infographic

advertisement
HOW TO GUIDE:
Preventing DDoS Attacks
What is a distributed denial of service attack (DDoS), and how does it work?
This infographic shows the mechanics of DDoS attacks, and offers some useful
DDoS protection tips.
What is a DDoS Attack?
DDoS stands for Distributed Denial of Service. A DDoS security attack
uses many compromised computers to bombard a target with traffic,
slowing the computer and its network connection to a halt.
Key
Attacker
Handler
Zombie
Target
Why Are DDoS Attacks Difficult to Stop?
Malicious traffic is
hard to spot
They are highly
scalable
Originating computers are
randomly distributed
Many machines can be used
They are hard to
shut down
The attacker is
difficult to find
Attacks come from
thousands of different
computers, making DDoS
protection difficult
They hide behind an army
of compromised machines
How Endemic Are DDoS Attacks?
64%
35%
of US banks suffered a DDoS
security attack in 2012
43%
expect they will stay at
the same level
35%
35%
of victims across multiple US
industries said that attacks
lasted more than 24 hours
65%
said that they cost over
$10k per hour
of banks expect the
attacks to increase
said that DDoS attacks
cost up to $10k per hour
Global Examples of Large-Scale Attacks
2000
‘Mafiaboy’ launches DDoS
attack on Yahoo, CNN, eBay
2010
Paypal attacked by members of
Anonymous hacktivist group for
political reasons
2012
Online programming site
Pastebin hit by members of
Anonymous hacktivist group
2013
Hackers attack exchanges for
virtual currency BitCoin to
manipulate its value
2013
Anti-spam activist group
Spamhaus attacked by
disgruntled spammers
Protect Your Organization
Configure your
network properly
Work with your
upstream provider
drop junk packets, block
requests from unnecessary
ports
to have them block
unnecessary traffic where
the Internet pipe is largest
Implement a
third-party DDoS
protection service
Monitor your network
to detect early traffic spikes
Identify any unique
characteristics of
the DDoS traffic
For more information on
preventing data leakage,
download our eGuide:
Convincing the Board:
Educating Decision
Makers on Information
Governance Software
Block rogue packets
fitting the pattern
Convincing th
e Bo
Convincing
ard:
Educating De
cision Makers
on Informatio
d:
ar
Goe
veBo
rnance Softw
th
n
are
on
Makers
Educating Decision
ance Software
rn
ve
Information Go
to eliminate
One of the prob
lems for CIOs
today is whether
information secu
to concentrat
rity. The two
e on regulato
are bound toge
unfortunately,
ry compliance
ther since secu
compliance will
or
rity will prov
not necessarily
ide compliance
provide security.
; but
Compliance is
needed to mee
ions
t lega
business. Goo
l ornizat
orga
regulato
for
way
lest
d
ry
gove
requ
simp
rnance is wha
irements. Secu
ce software is the
t a company
rity is needed
needs to ensu
Information governan
to protect the
re both.
te with confidence
risk and communica
Finding Funding
CIOs are caug
ht in a classic
dilemma. It is
company’s data
their job to prov
, to ensure that
ide good gove
the company
that it remains
rnance over the
doesn’t suffe
compliant; but
r a security brea
they are relia
ch and to ensu
nt on funds bein
re
g allocated by
All too often,
the Board.
the Board’s appr
oach is that if
compliant; and
the company
additional fund
hasn’t suffered
ing is not nece
breached – and
a
brea
ch, it is de facto
ssary. CIOs know
it is their job
, however, that
both secure and
to ensure the
compliance desp
it is only a matt
good governan
ite that breach.
er of time befo
ce that will mini
re they are
mize the effec
t of that brea
ch and maintain
Past the Perim
eter
The first prob
lem is how to
achieve this good
defenses are
governance.
no longer adeq
Old-fashioned
uate on their
personal devi
network perim
own (because
ces). This mea
eter
of increasing
ns that it is the
use of cloud and
data itself that
has to be prot
ected.
We need to
be clear her
e:
Security and
compliance now
both rely
DOWNLOAD NOW!
on good infor
mation governan
ce.
2
Sources:
http://www.paloaltonetworks.com/community/learning-center/what-is-a-distributed-denial-of-service-attack-ddos.html
http://www.corero.com/resources/files/analyst-reports/CNS_Report_Ponemon_Jan13.pdf
http://www.neustar.biz/enterprise/docs/whitepapers/ddos-protection/neustar-insights-ddos-attack-survey-q1-2012.pdf
http://techcrunch.com/2013/04/10/bitcoin-crash/
http://www.thesmokinggun.com/file/paypal-ddos-attack
http://www.forbes.com/sites/eliseackerman/2012/02/23/internet-war-mystery-ddos-attack-hammers-website-favored-by-anonymous/
http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-worms-and-ddos-takedowns.html
http://www.techrepublic.com/blog/security/ddos-attack-methods-and-how-to-prevent-or-mitigate-them/8523
http://www.itbusinessedge.com/slideshows/five-ways-to-protect-against-ddos-attacks-08.html
www.clearswift.com
www.clearsw
ift.com
Download