Zen and 4 Noble Truths of DDoS Protection


Published on

This presentation describes Four Noble Truths of a Network or Security Engineer's life. A noble eightfold path to DDoS attack mitigation is described that leads to Nirvana.

Published in: Technology, News & Politics
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Zen and 4 Noble Truths of DDoS Protection

  1. 1. Hemant Jain’s Zen & The Noble Eightfold Path of DDoS Protection
  2. 2. Four Noble Truths <ul><li>Network Engineer’s Life means suffering. </li></ul><ul><li>The origin of suffering is attachment. </li></ul><ul><li>The cessation of suffering is attainable. </li></ul><ul><li>The path to the cessation of suffering. </li></ul>
  3. 3. 1 st Noble Truth <ul><li>To live means to suffer, because the Internet is not perfect and neither is the world we live in. </li></ul><ul><li>During our lifetime, we inevitably have to endure network suffering such as DDoS attacks, and eventually downtime of the services; and we have to endure psychological suffering like sadness, fear, frustration, disappointment, and depression. </li></ul><ul><li>Although there are different degrees of suffering and there are also positive experiences in life that we perceive as the opposite of suffering, such as ease, comfort and happiness, life in its totality is imperfect and incomplete, because our world is subject to impermanence. </li></ul>
  4. 4. 2 nd Noble Truth <ul><li>The origin of suffering is attachment to transient things such as viruses and worms and the ignorance thereof. </li></ul><ul><li>People just joining the Internet are not aware of these attachments and they open them and get infected. There are other techniques of infections too. </li></ul><ul><li>The attachments turn a machine into a bot. Many bots together are called botnets. These botnets then are herded by hackers to cause suffering on our world-facing infrastructure. </li></ul>
  5. 5. 3 rd Noble Truth <ul><li>The cessation of suffering can be attained through hardware based DDoS attack Mitigation. </li></ul><ul><li>The third noble truth expresses the idea that suffering can be ended by a proper appliance. </li></ul><ul><li>These appliances extinguish all forms of attacks. This means that suffering can be overcome through visibility and control and simply by removing the cause of suffering. </li></ul><ul><li>Attaining and perfecting mitigation is a process at many granular levels that ultimately results in the state of Nirvana. Nirvana means freedom from all worries, troubles, complexes, fabrications and attacks. </li></ul><ul><li>Nirvana is not comprehensible for those who have not attained it. </li></ul>
  6. 6. 4 th Noble Truth <ul><li>There is a path to the end of suffering - a gradual path of visibility and control, which is described more detailed in the Eightfold Path. </li></ul><ul><li>It is the middle way between the two extremes of excessive expenses (hedonism) and excessive belief that attacks will go away on their own (asceticism). </li></ul><ul><li>This leads to the end of the cycle of rebirth of suffering from DDoS attacks. </li></ul>
  7. 7. Noble Eightfold Path of DDoS Attack Mitigation <ul><li>The Noble Eightfold Path describes the way to the end of suffering from DDoS attacks. </li></ul><ul><li>It is a practical guideline to ethical and mental development with the goal of freeing the network and security engineers from DDoS attacks; and it finally leads to understanding the truth about all such attacks. </li></ul><ul><li>Together with the Four Noble Truths it constitutes the gist of Knowledge. </li></ul><ul><li>Great emphasis is put on the practical aspect, because it is only through practice that one can attain a higher level of existence and finally reach Nirvana from DDoS attacks. </li></ul><ul><li>The eight aspects of the path are not to be understood as a sequence of single steps, instead they are highly interdependent principles that have to be seen in relationship with each other. </li></ul>
  8. 8. Right View <ul><li>Right view is the beginning and the end of the path, it simply means to see and to understand traffic as it really is and to realise the Four Noble Truths. As such, right view is the cognitive aspect of network wisdom. </li></ul><ul><li>It means to see things through, to grasp the impermanent and imperfect nature of network packets and ideas. Right view is not necessarily an intellectual capacity, just as wisdom is not just a matter of intelligence. Instead, right view is attained, sustained, and enhanced through all capacities of a right network visibility appliance. </li></ul><ul><li>It begins with the granular insight that all servers are subject to suffering and it ends with complete understanding of the true nature of all traffic, past behavior, present behavior and future estimations. </li></ul>
  9. 9. Right Intention <ul><li>While right view refers to the cognitive aspect of network wisdom, right intention refers to the volitional aspect, i.e. the kind of energy that controls our actions. Right intention can be described best as commitment to network self-improvement. </li></ul><ul><li>There are three types of right intentions: </li></ul><ul><ul><li>1. the intention of renunciation of attacks, </li></ul></ul><ul><ul><li>2. the intention of good will, meaning resistance to feelings of anger and aversion, and </li></ul></ul><ul><ul><li>3. the intention of harmlessness, meaning not to think or act cruelly, violently, or aggressively, and to develop compassion for attackers. </li></ul></ul><ul><li>In most cases, you cannot catch them or contact law-enforcement. The best intention is to protect you rather than harm them or get angry at them. A good appliance will let you remain calm and do its job on its own. </li></ul>
  10. 10. Right Speech <ul><li>Right speech is the first principle of ethical conduct in the eightfold path. Everyone in the chain of the command must know that your network is under attack. </li></ul><ul><li>You must do everything to abstain from false speech, especially not to tell deliberate lies and not to speak deceitfully. </li></ul><ul><li>With the right appliance in the network, all your bosses will know that you are under attack and the appliance is dropping all the packets on its own and you have configured it correctly. </li></ul><ul><li>If you have customers whom you are protecting as a host, they will get reports that they were under attack and you were able to protect them easily. </li></ul>
  11. 11. Right Action <ul><li>Right action involves setting up right access control lists to bogons, unused protocols and ports. </li></ul><ul><li>Right action involves granular control to limit per source packet rate, per source URL access rate, per source concurrent connections and 100s of such limits so that you are protected from botnet attacks. </li></ul><ul><li>Right action involves right hardware logic to stop spoofed attacks which involve deceit such as SYN flood attacks. </li></ul>
  12. 12. Right Living <ul><li>Right tools are important to live peacefully. </li></ul><ul><li>DDoS attack mitigation appliances that give you right visibility and control help you achieve the peace that you need. </li></ul><ul><li>These tools provide ability to block bogons, granular line rate hardware access control lists, flood mitigation, botnet attack mitigation, anti-spoofing and many other tools important for right livelihood. </li></ul>
  13. 13. Right Effort <ul><li>Right effort can be seen as a prerequisite for the other principles of the path. </li></ul><ul><li>Without effort, which is in itself an act of will, nothing can be achieved, whereas misguided effort distracts the mind from its task, and confusion will be the consequence. </li></ul><ul><li>All good actions require practice. You need to train the mitigation appliance during peacetime to learn the behavior of your network so that it can prevent unwanted attacks during the bad times. </li></ul>
  14. 14. Right Mindfulness <ul><li>Right mindfulness is the controlled and perfected faculty of cognition. It is the ability to see things as they are, with clear visibility. Usually, the cognitive process begins with a hardware based appliance with granular visibility and control. </li></ul><ul><li>This visibility and control understands each and every packet without sampling them at line rate. </li></ul><ul><li>Each packet must be analyzed at layer 3, 4 and 7. Every source must be analyzed, every connection, every destination, every URL, User-Agent, Host, Referer, Cookie and so on. </li></ul><ul><li>Such mindful visibility leads to awareness and therefore control. </li></ul>
  15. 15. Right Concentration <ul><li>Concentration in this context is described as one-pointedness of an appliance, meaning a state where all faculties are unified and directed onto one particular object and that’s DDoS attack mitigation. </li></ul><ul><li>Right concentration for the purpose of the eightfold path means wholesome concentration, i.e. concentration on wholesome thoughts and actions towards one purpose. </li></ul><ul><li>An appliance which has been built with sole purpose is to remove the suffering from DDoS attacks is the right appliance. </li></ul>
  16. 16. For Further Peace of Mind <ul><li>IntruGuard is a Leading DDoS Solution vendor. It is globally renowned for its DDoS Attack Mitigation equipment. </li></ul><ul><li>Contact: IntruGuard </li></ul><ul><li>[email_address] </li></ul><ul><li>+1 408 840 DDoS </li></ul><ul><li>www.intruguard.com </li></ul>