Economical Denial of Sustainability in the Cloud (EDOS)

DefCamp
May. 31, 2019
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
1 of 19

More Related Content

What's hot

Introduction to AWS Greengrass on IoTIntroduction to AWS Greengrass on IoT
Introduction to AWS Greengrass on IoTAmazon Web Services
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architectureAbdul Qadir
Scaling Security in the Cloud With Open SourceScaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceCloudVillage
Nimbo/Alert Logic - Azure in the CloudNimbo/Alert Logic - Azure in the Cloud
Nimbo/Alert Logic - Azure in the CloudAlert Logic
Building Serverless Event-Driven Apps with Azure Event Grid (2017-09-21)Building Serverless Event-Driven Apps with Azure Event Grid (2017-09-21)
Building Serverless Event-Driven Apps with Azure Event Grid (2017-09-21)Paco de la Cruz
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridExploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridCloudVillage

What's hot(20)

Similar to Economical Denial of Sustainability in the Cloud (EDOS)

Arbor Presentation Arbor Presentation
Arbor Presentation J Hartig
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSSuzanne Aldrich
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsIJERD Editor

More from DefCamp

Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp

Recently uploaded

How is AI changing journalism? Strategic considerations for publishers and ne...How is AI changing journalism? Strategic considerations for publishers and ne...
How is AI changing journalism? Strategic considerations for publishers and ne...Damian Radcliffe
"Data Mesh in Kubernetes", Andrii Syniuk"Data Mesh in Kubernetes", Andrii Syniuk
"Data Mesh in Kubernetes", Andrii SyniukFwdays
GIT AND GITHUB (1).pptxGIT AND GITHUB (1).pptx
GIT AND GITHUB (1).pptxGDSCCVRGUPoweredbyGo
GDSC Cloud Lead Presentation.pptxGDSC Cloud Lead Presentation.pptx
GDSC Cloud Lead Presentation.pptxAbhinavNautiyal8
"Architecture assessment from classics to details",  Dmytro Ovcharenko"Architecture assessment from classics to details",  Dmytro Ovcharenko
"Architecture assessment from classics to details", Dmytro OvcharenkoFwdays
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the goSamsung Business USA

Recently uploaded(20)

Economical Denial of Sustainability in the Cloud (EDOS)

Editor's Notes

  1. Ok, probably you all have heard about DDoS, But what kind of animal is EDoS then? What can become unavailable? In a very simplistic image, they can target …
  2. Today, ANYONE can launch a crippling attack for virtually no money. Do you know why? Because of botnets. DDoS-for-hire botnets - subscription-based model
  3. Analytics company – analyze DDoS data around the world
  4. Let me give you a few more examples so that you can better understand THE SEVERITY of the problem Do you guys like your Xbox? Do you remember the Christmas of 2014 when the online service was down? Guess why. How many of you are dependent on GitHub? This year, luckily, Github was down only for 10 minutes. But what if it was down for a couple of days?
  5. Interesting fact? Do you want to see how a live DDoS looks like? Well, here’s a preview. You can go to digitalattackmap.com and see ACTUAL attacks happening right now!!
  6. Now let’s better understand how a DDoS is created.
  7. Analytics The latest strategy for attacks is to create a diversion by having low-impact attacks just to test the waters and in the background Network mapping - data breaches - infection with malware
  8. If you think that protecting against DDoS was complicated on prems, well, the cherry on top in Cloud ONE QUESTION FOR YOU: If an un-mitigated attack costs 1 hour
  9. Health Checks and Monitoring AWS Shield Standard  default, free DNS at the Edge  Amazon Route 53  DNS service with Traffic Flow, Latency Based Routing, Geo DNS, and Health Checks and Monitoring Amazon CloudFront (CDN with caching  takes load from EC2 instances + better internet speed and bandwidth to users at Amazon Edge Locations). distributes traffic across multiple edge locations and filters requests to ensure that only valid HTTP(S) requests will be forwarded to backend hosts. CloudFront also supports geoblocking, which you can use to prevent requests from particular geographic locations from being served. AWS WAF  A "regular" firewall typically only looks at layers 3 and 4 of the OSI model. For instance, to allow TCP port 80, allow UDP port 53 from only specific IP addresses, or deny TCP port 25. For HTTP requests, once the "allow TCP port 80" hurdle is cleared, the firewall is uninterested in what's passed via that connection. A Web Application Firewall works almost exclusively at layer 7, dealing with security in terms of the content of HTTP requests. Mainly, they're looking to prevent requests that are outside what should be expected for your web application, using rules applied to incoming HTTP requests to prevent attacks like cross-site scripting, SQL injection, directory traversal, or brute-force authentication attempts. Essentially, their whole purpose is shielding the web server from the kinds of manipulated and malicious requests that attackers might use to compromise your web application. Firewall - A device or application that analyzes packet headers and enforces policy based on protocol type, source address, destination address, source port, and/or destination port. Packets that do not match policy are rejected. Intrusion Detection System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event. Intrusion Prevention System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected the packet is rejected. Most cloud providers have DDoS resilience infrastructure architecture recommandations for different types of applications. For example: Web applications Non-web load-balanceable apps Non-web non-load balanceable apps
  10. DDoS Telemetry   analyze the digital fingerprint, and gather intelligence Regions  Being close to exchanges where international carriers and large peers