HOW TO GUIDE: Preventing DDoS Attacks What is a distributed denial of service attack (DDoS), and how does it work? This infographic shows the mechanics of DDoS attacks, and offers some useful DDoS protection tips. What is a DDoS Attack? DDoS stands for Distributed Denial of Service. A DDoS security attack uses many compromised computers to bombard a target with traffic, slowing the computer and its network connection to a halt. Key Attacker Handler Zombie Target Why Are DDoS Attacks Difficult to Stop? Malicious traffic is hard to spot They are highly scalable Originating computers are randomly distributed Many machines can be used They are hard to shut down The attacker is difficult to find Attacks come from thousands of different computers, making DDoS protection difficult They hide behind an army of compromised machines How Endemic Are DDoS Attacks? 64% 35% of US banks suffered a DDoS security attack in 2012 43% expect they will stay at the same level 35% 35% of victims across multiple US industries said that attacks lasted more than 24 hours 65% said that they cost over $10k per hour of banks expect the attacks to increase said that DDoS attacks cost up to $10k per hour Global Examples of Large-Scale Attacks 2000 ‘Mafiaboy’ launches DDoS attack on Yahoo, CNN, eBay 2010 Paypal attacked by members of Anonymous hacktivist group for political reasons 2012 Online programming site Pastebin hit by members of Anonymous hacktivist group 2013 Hackers attack exchanges for virtual currency BitCoin to manipulate its value 2013 Anti-spam activist group Spamhaus attacked by disgruntled spammers Protect Your Organization Configure your network properly Work with your upstream provider drop junk packets, block requests from unnecessary ports to have them block unnecessary traffic where the Internet pipe is largest Implement a third-party DDoS protection service Monitor your network to detect early traffic spikes Identify any unique characteristics of the DDoS traffic For more information on preventing data leakage, download our eGuide: Convincing the Board: Educating Decision Makers on Information Governance Software Block rogue packets fitting the pattern Convincing th e Bo Convincing ard: Educating De cision Makers on Informatio d: ar Goe veBo rnance Softw th n are on Makers Educating Decision ance Software rn ve Information Go to eliminate One of the prob lems for CIOs today is whether information secu to concentrat rity. The two e on regulato are bound toge unfortunately, ry compliance ther since secu compliance will or rity will prov not necessarily ide compliance provide security. ; but Compliance is needed to mee ions t lega business. Goo l ornizat orga regulato for way lest d ry gove requ simp rnance is wha irements. Secu ce software is the t a company rity is needed needs to ensu Information governan to protect the re both. te with confidence risk and communica Finding Funding CIOs are caug ht in a classic dilemma. It is company’s data their job to prov , to ensure that ide good gove the company that it remains rnance over the doesn’t suffe compliant; but r a security brea they are relia ch and to ensu nt on funds bein re g allocated by All too often, the Board. the Board’s appr oach is that if compliant; and the company additional fund hasn’t suffered ing is not nece breached – and a brea ch, it is de facto ssary. CIOs know it is their job , however, that both secure and to ensure the compliance desp it is only a matt good governan ite that breach. er of time befo ce that will mini re they are mize the effec t of that brea ch and maintain Past the Perim eter The first prob lem is how to achieve this good defenses are governance. no longer adeq Old-fashioned uate on their personal devi network perim own (because ces). This mea eter of increasing ns that it is the use of cloud and data itself that has to be prot ected. We need to be clear her e: Security and compliance now both rely DOWNLOAD NOW! on good infor mation governan ce. 2 Sources: http://www.paloaltonetworks.com/community/learning-center/what-is-a-distributed-denial-of-service-attack-ddos.html http://www.corero.com/resources/files/analyst-reports/CNS_Report_Ponemon_Jan13.pdf http://www.neustar.biz/enterprise/docs/whitepapers/ddos-protection/neustar-insights-ddos-attack-survey-q1-2012.pdf http://techcrunch.com/2013/04/10/bitcoin-crash/ http://www.thesmokinggun.com/file/paypal-ddos-attack http://www.forbes.com/sites/eliseackerman/2012/02/23/internet-war-mystery-ddos-attack-hammers-website-favored-by-anonymous/ http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-worms-and-ddos-takedowns.html http://www.techrepublic.com/blog/security/ddos-attack-methods-and-how-to-prevent-or-mitigate-them/8523 http://www.itbusinessedge.com/slideshows/five-ways-to-protect-against-ddos-attacks-08.html www.clearswift.com www.clearsw ift.com