SlideShare a Scribd company logo
1 of 24
Security without sacrificing performance
Konrad Kaczanowski & Rafał Jaskulski
©2013 AKAMAI | FASTER FORWARDTM
Agenda
1.State of the Internet
2.Why use protection?
3.Choose wisely – you get what you pay for
©2013 AKAMAI | FASTER FORWARDTM
The numbers of Akamai
• Average traffic levels of over 6 Tbps
• Peak traffic levels to date of ~10Tbps
• Handling ~20 million hits/second, on average
700+
Cities
2,000+
Locations
80
Countries
The Akamai Intelligent Platform
1,100+
Networks
130,000+
Servers
©2013 AKAMAI | FASTER FORWARDTM
90% of Internet
users are within one
network hop of an
Akamai server
Close to the edge of the internet
©2013 AKAMAI | FASTER FORWARDTM
State of the internet
• 5% average connection speed
increase
• 4.6% average peak speed
increase
• 2.4% increase in unique IP v4 addresses
©2013 AKAMAI | FASTER FORWARDTM
Where do attacks come from?
 Attacks coming from wide range of countries (117 unique countries in Q4 2012)
 Rise in attacks originating from China – now account for 41% of worldwide attack traffic
 Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
©2013 AKAMAI | FASTER FORWARDTM
Attack trends
 Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25
Gbps
 Average attack duration increased by 7.14 percent from 32.2 hours to
34.5 hours
 Regional distribution:
 56% Asia
 25% Europe
 18% North & South America
 1% Africa
©2013 AKAMAI | FASTER FORWARDTM
What's your favorite port?
©2013 AKAMAI | FASTER FORWARDTM
Fancy an attack?
©2013 AKAMAI | FASTER FORWARDTM
Value of a hacked machine
Courtesy of http://krebsonsecurity.com/
©2013 AKAMAI | FASTER FORWARDTM
Real life example
• Top 500 online retailer generating just under 100,000 USD per hour in
revenue
• Internationally coordinated DDoS attack
• Shifting attack sources
• Changing attack signatures
• Peak attack traffic at ~112 Gbps (over 10000 more than usually)
• Akamai absorbed the attack traffic
• Savings of ~10 million USD over a period of several days
©2013 AKAMAI | FASTER FORWARDTM
• Inhouse solutions
• Dedicated security services
1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack
direct incoming traffic to go through a ‘scrubbing centre’.
2. Proactive – always-on model, 24h protection, adjust only for new attack
vectors
What are my security choices?
©2013 AKAMAI | FASTER FORWARDTM
In house security
Network
Firewall
Web
Application
Firewall
Application
or Database
Server
Customer
Database
Web
Server
(Origin)
Traditional Data Center Security
Limited scalability
Self-managed or MSSP
Off the shelf solution
©2013 AKAMAI | FASTER FORWARDTM
Scrubbers
©2013 AKAMAI | FASTER FORWARDTM
Akamai
• Distributed Intelligent Platform
• Security and Acceleration capabilities
• Several attack types dropped by default
• „Always on” protection
• Full control over features and configuration
• Real-time monitoring
• Acceleration, caching and more
©2013 AKAMAI | FASTER FORWARDTM
Akamai Intelligent Platform basic protection levels
• TCP SYN flood attacks
• UDP flood
• ICMP flood
• Some HTTP response splitting attacks (when the split is in the URL
path)
• Malformed request
• Port scanning
• Some basic DDoS protection (due to caching)
©2013 AKAMAI | FASTER FORWARDTM
Akamai Security Portfolio
Enhanced DNS:
Attack against the DNS infrastructure
Attack against the TLD (customer.com)
BIND vulnerability exploits
Basic DNS poisoning attacks (TSIG)
Advanced DNS poisoning attacks
(DNSSEC)
SiteShield:
Any layer 4-7 attacks directly against the origin
Still a risk to over at the layer 3
GTM:
Data center failure (load balancing, failover)
Web Application Firewall:
IP/CIDR/Geo whitelisting/blacklisting
XSS, SQLi
Protocol violations, Encoding abuse
Layer 7 floods
Shopper Prioritization:
Flash crowd (real or DDoS)
©2013 AKAMAI | FASTER FORWARDTM
(Cloud)
Datacenters
End User
1
10
100
10000
Origin
Traffic
1000
Akamai
Traffic
1
10
100
10000
1000 COVERED
Web Application security with Akamai
©2013 AKAMAI | FASTER FORWARDTM
Comparison
In-house Scrubbers Akamai
Pricing model Whatever you are
willing to pay
Moderate Monthly Fee +
Processed Traffic
Monthly Fee + Traffic (Insurance
option)
Protection Depending on what
is installed
On request Always on
Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team
notifications on ongoing and
planned attacks
Integration None (Internal) For each attack: BGP route
modification, GRE tunnel
configuration
Once:
DNS entry modification
Ports - All 80 & 443
Performance Possible decrease Decrease when activated Increase due to accelerated
©2013 AKAMAI | FASTER FORWARDTM
Before DDoS hits you
DDoS cheat sheet
• Decision makers list
• Define escalation paths
• Who to call and when (emergency contact information)
©2013 AKAMAI | FASTER FORWARDTM
Check out our app
©2013 AKAMAI | FASTER FORWARDTM
Questions?
©2013 AKAMAI | FASTER FORWARDTM
Under attack? Call us!
www.ddos-hotline.com
©2013 AKAMAI | FASTER FORWARDTM
Thank you!
Visit our booth at

More Related Content

Viewers also liked (6)

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
 
BOMMA Certificado
BOMMA CertificadoBOMMA Certificado
BOMMA Certificado
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolas
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este pais
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

#IT fest 2013 - Security without sacrificing performance

  • 1. Security without sacrificing performance Konrad Kaczanowski & Rafał Jaskulski
  • 2. ©2013 AKAMAI | FASTER FORWARDTM Agenda 1.State of the Internet 2.Why use protection? 3.Choose wisely – you get what you pay for
  • 3. ©2013 AKAMAI | FASTER FORWARDTM The numbers of Akamai • Average traffic levels of over 6 Tbps • Peak traffic levels to date of ~10Tbps • Handling ~20 million hits/second, on average 700+ Cities 2,000+ Locations 80 Countries The Akamai Intelligent Platform 1,100+ Networks 130,000+ Servers
  • 4. ©2013 AKAMAI | FASTER FORWARDTM 90% of Internet users are within one network hop of an Akamai server Close to the edge of the internet
  • 5. ©2013 AKAMAI | FASTER FORWARDTM State of the internet • 5% average connection speed increase • 4.6% average peak speed increase • 2.4% increase in unique IP v4 addresses
  • 6. ©2013 AKAMAI | FASTER FORWARDTM Where do attacks come from?  Attacks coming from wide range of countries (117 unique countries in Q4 2012)  Rise in attacks originating from China – now account for 41% of worldwide attack traffic  Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
  • 7. ©2013 AKAMAI | FASTER FORWARDTM Attack trends  Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25 Gbps  Average attack duration increased by 7.14 percent from 32.2 hours to 34.5 hours  Regional distribution:  56% Asia  25% Europe  18% North & South America  1% Africa
  • 8. ©2013 AKAMAI | FASTER FORWARDTM What's your favorite port?
  • 9. ©2013 AKAMAI | FASTER FORWARDTM Fancy an attack?
  • 10. ©2013 AKAMAI | FASTER FORWARDTM Value of a hacked machine Courtesy of http://krebsonsecurity.com/
  • 11. ©2013 AKAMAI | FASTER FORWARDTM Real life example • Top 500 online retailer generating just under 100,000 USD per hour in revenue • Internationally coordinated DDoS attack • Shifting attack sources • Changing attack signatures • Peak attack traffic at ~112 Gbps (over 10000 more than usually) • Akamai absorbed the attack traffic • Savings of ~10 million USD over a period of several days
  • 12. ©2013 AKAMAI | FASTER FORWARDTM • Inhouse solutions • Dedicated security services 1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack direct incoming traffic to go through a ‘scrubbing centre’. 2. Proactive – always-on model, 24h protection, adjust only for new attack vectors What are my security choices?
  • 13. ©2013 AKAMAI | FASTER FORWARDTM In house security Network Firewall Web Application Firewall Application or Database Server Customer Database Web Server (Origin) Traditional Data Center Security Limited scalability Self-managed or MSSP Off the shelf solution
  • 14. ©2013 AKAMAI | FASTER FORWARDTM Scrubbers
  • 15. ©2013 AKAMAI | FASTER FORWARDTM Akamai • Distributed Intelligent Platform • Security and Acceleration capabilities • Several attack types dropped by default • „Always on” protection • Full control over features and configuration • Real-time monitoring • Acceleration, caching and more
  • 16. ©2013 AKAMAI | FASTER FORWARDTM Akamai Intelligent Platform basic protection levels • TCP SYN flood attacks • UDP flood • ICMP flood • Some HTTP response splitting attacks (when the split is in the URL path) • Malformed request • Port scanning • Some basic DDoS protection (due to caching)
  • 17. ©2013 AKAMAI | FASTER FORWARDTM Akamai Security Portfolio Enhanced DNS: Attack against the DNS infrastructure Attack against the TLD (customer.com) BIND vulnerability exploits Basic DNS poisoning attacks (TSIG) Advanced DNS poisoning attacks (DNSSEC) SiteShield: Any layer 4-7 attacks directly against the origin Still a risk to over at the layer 3 GTM: Data center failure (load balancing, failover) Web Application Firewall: IP/CIDR/Geo whitelisting/blacklisting XSS, SQLi Protocol violations, Encoding abuse Layer 7 floods Shopper Prioritization: Flash crowd (real or DDoS)
  • 18. ©2013 AKAMAI | FASTER FORWARDTM (Cloud) Datacenters End User 1 10 100 10000 Origin Traffic 1000 Akamai Traffic 1 10 100 10000 1000 COVERED Web Application security with Akamai
  • 19. ©2013 AKAMAI | FASTER FORWARDTM Comparison In-house Scrubbers Akamai Pricing model Whatever you are willing to pay Moderate Monthly Fee + Processed Traffic Monthly Fee + Traffic (Insurance option) Protection Depending on what is installed On request Always on Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team notifications on ongoing and planned attacks Integration None (Internal) For each attack: BGP route modification, GRE tunnel configuration Once: DNS entry modification Ports - All 80 & 443 Performance Possible decrease Decrease when activated Increase due to accelerated
  • 20. ©2013 AKAMAI | FASTER FORWARDTM Before DDoS hits you DDoS cheat sheet • Decision makers list • Define escalation paths • Who to call and when (emergency contact information)
  • 21. ©2013 AKAMAI | FASTER FORWARDTM Check out our app
  • 22. ©2013 AKAMAI | FASTER FORWARDTM Questions?
  • 23. ©2013 AKAMAI | FASTER FORWARDTM Under attack? Call us! www.ddos-hotline.com
  • 24. ©2013 AKAMAI | FASTER FORWARDTM Thank you! Visit our booth at