SlideShare a Scribd company logo
1 of 30
Download to read offline
1
Multi-Layer DDoS Mitigation Strategies
Sagi Brody, CTO
@webairsagi
sagi@webair.com
Logan Best
Senior Infrastructure Engineer
logan@webair.com
2
Multi-Layer DDoS Mitigation Strategies
Application
Server(s)
Load Balancers/Proxies
IDS/IPS
Network
3rd Party Scrubbing
3rd Party CDN/Proxies
Firewall
3
Fully Managed Web Stack
Application
Server
Load Balancers
IDS/IPS
Network
Scrubbing
CDN/Proxies
FW & Cache plugins
Memcache, Fail2ban,
HAProxy + keepalived, nginx,
SOCaaS, ProtectWise, AlertLogic, Snort
RTBH, FlowSpec, Outbound filters
Network Taps , Analysis, Automated BGP
Redirects to CDN in App or via HTTP rewrite
MikroTik, PaloAlto, JuniperFirewall
4
Why? - New Attack Landscape
• DDoS Ransom on the rise with Bitcoins - Attackers becoming more
anonymous
• Multiple governments issue warnings about DD4BC
• Stress Testers
• Used to be called “booters’, available on IRC (EFnet anyone?)
• DDoS-as-a-Service
• Christmas 2014, Lizard Squad “stress tested” PSN and Xbox
Live. Sets up lizardstresser.su to monetize.
• Inexpensive - as little as $5/attack
• Technically legal, RageBooter.net claims legal,
provides full phone support.
• DDoS Mitigation Companies targeted
5
Why? - Unlikely DDoS Originators
• IoT
• IoCT? Internet of Compromised Things?
• Professor in Berlin creates smart home. Lightbulb
unintentionally launches DoS against controller, causing
home to lock up.
• Proliferation of cheap android devices and LTE will result in
perfect mobile storm.
• 1 billion devices 0.1% vulnerable:
• 100 kilobits per second == 100 gigabits per
second
• 100 pps == 100 million packets per second
• Today:
• 7.2 Billion cell devices globally
• 6.4 Billion IoT devices globally
6
More sophisticated attackers
• Less total attacks, increase in effectiveness
• Attacks are getting more complicated and last longer
• More effective L7 Botnets being used
7
Our Environment
Founded: 1996
Headquarters: Long Island, NY
Services Offered: Public, Private & Hybrid Cloud, Dedicated Servers, Colocation, CDN, Security, DRaaS,
and more
Customers: Enterprise, Healthcare, SMBs, VoIP providers, eCommerce, Information Technology, and more
The Webair Value: 
➢ Over 18 years providing customers with best-in-class Managed Hosting solutions
➢ High-touch Support
➢ Full ownership of our customer’s infrastructure stack so they can focus on their core business.
➢ Manages most secure and redundant facility east of Manhattan with trans-Atlantic bypass (Tier III, HIPPA/SSAE16)
8
Full Stack Management
“Outsourced Devops”
9
Application Layer
• Simple to take sites down with low request volume
• Stay under volumetric detection’s radar
• Uncached dynamic (db backed) URLs fall over quickly (especially if
framework is known)
• Poorly written SQL queries
• Apps written w/o scale in mind
• Cross-site scripting, SQL injection, buffer overflows, file inclusion,
oh my…
• Search result pages, POST to forms, comments, etc
• Botnets storing session cookies, use real ‘hidden’ browsers on
infected PCs
• Simple HTTP floods lead to
state-exhaustion
• Part of larger multi-vector attacks
10
Application Layer Protection
• Framework or App specific plugins - WP (NinjaFirewall, Wordfence)
• HTTP server modules - mod_evasive, mod_security
• Common caching layers can perform rate limiting based on specific
request attributes (nginx, varnish)
• Cache for security
• In memory - (memcache, redis)
• Opcode caching - (APC, xcache, eAccelerator)
• SQL - (sphinx search, solr, elasticsearch)
• File
• Follow best practices for web scale:
• Disable all unnecessary logging
• Scale-out architecture
• In-memory session management
• (many more!..)
11
Server Layer
Linux Kernel /etc/sysctl.conf customization:
• Prevent against the common 'syn flood attack'
#net.ipv4.tcp_syncookies = 1
• Increase the number of outstanding syn requests allowed
#net.ipv4.tcp_max_syn_backlog = 4096
• Reduce # of potential ACK replies (default 5)
#net.ipv4.tcp_synack_retries = 3
• Reduce # of connections in TIME_WAIT state
#net.ipv4.tcp_fin_timeout = 15
• Enable IP spoofing protection (turn on source route verification)
#net.ipv4.conf.all.rp_filter = 1
#net.ipv4.conf.default.rp_filter = 1
• Decrease the time default value for tcp_keepalive_time connection
#net.ipv4.tcp_keepalive_time = 1800
12
Server Layer
IPTables rules:
• Rate limit and block syn flooding:
#iptables -N syn-flood
#iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN
#iptables -A syn-flood -j LOG --log-prefix "SYN flood: “
#iptables -A syn-flood -j DROP
• Drop excessive RST packets to avoid smurf attacks
#iptables -A INPUT -p tcp -m tcp --tcp-flags RST RST -m limit --limit 2/second --limit-burst 2
-j ACCEPT
#iptables -A INPUT -p icmp -m icmp --icmp-type address-mask-request -j DROP
#iptables -A INPUT -p icmp -m icmp --icmp-type timestamp-request -j DROP
#iptables -A INPUT -p icmp -m icmp -j DROP
• Drop Invalid Packets
#iptables -A INPUT -m state --state INVALID -j DROP
#iptables -A FORWARD -m state --state INVALID -j DROP
#iptables -A OUTPUT -m state --state INVALID -j DROP
13
Server Layer
IPTables rules:
•Reject spoofed packets (bogon networks, RFC1918)
#iptables -A INPUT -s 10.0.0.0/8 -j DROP
#iptables -A INPUT -s 169.254.0.0/16 -j DROP
#iptables -A INPUT -s 172.16.0.0/12 -j DROP
#iptables -A INPUT -d 239.255.255.0/24 -j DROP
#iptables -A INPUT -d 255.255.255.255 -j DROP
…….etc
• Reject ports, protocols, and IPs not in use. Are you really using
UDP port 80?
• Fail2Ban/SSHGuard
• Mindful of NFS overhead (stop logging to NFS!)
14
Load Balancers
• Load balancers can shield app/servers from attacks
• Already operating at L7, ability to perform complex L7 rules and
mitigation, https via offload
• Provides inherent synflood protection, slowloris,
• Traditional appliance solutions too rigid. Next gen ADC (Application
delivery controller) to provide LB, WAF, Cache combined
• DIY, our kit: Ansible, Debian/RHEL, HAProxy, keepalived, csync,
git, automation software for provisioning, configuration, attack
defense
• Integrate with 3rd party software easily (geoip, automated
blacklists)
• Tie into caching: (varnish, nginx)
15
Load Balancers (HAProxy)
• Provides rate limiting on many levels:
• Connections per IP
• Connection rate per IP
• Bandwidth usage too high
• Client not respecting RFCs (IE for SMTP)
• HTTP request rate (L7) - Block based on
• Request string/regex
• User-Agent
• Any other tracked variables
• Vulnerability scanners:
• Invalid or truncated requests
• Denied or tarpitted requests
• Failed authentications
• 4xx error pages
16
HAProxy examples
stick-table type ip size 256k expire 300s peers mypeers store
gpc0,http_req_rate(5s),conn_cur,conn_rate(5s),http_err_rate(5s)
acl abuse src_http_req_rate gt 50
acl flag_abuser sc1_inc_gpc0
acl ipwhitelist src -f /path/to/ipwhitelist.txt
acl ipblacklist src -f /path/to/ipblacklist.txt
tcp-request connection track-sc1 src
tcp-request connection reject if ipblacklist
tcp-request connection accept if ipwhitelist
tcp-request connection reject if { sc1_conn_cur ge 30 }
tcp-request connection reject if { sc1_conn_rate ge 20 }
tcp-request connection reject if { sc1_get_gpc0 gt 0 }
tcp-request content reject if { sc1_get_gpc0 gt 0 }
http-request deny if ipblacklist
http-request allow if ipwhitelist
http-request deny if { sc1_get_gpc0 gt 0 }
http-request deny if { sc1_http_err_rate ge 20 } flag_abuser
http-request deny if abuse flag_abuser
17
IDS/IPS
• “Threat Monitoring & Mitigation”
• Sits behind the FW to catch unprotected malicious traffic
• Works in virtual environments as well
• Can be tap/span, logs, or libpcap based
• Graphs and other cool Visual Dashboards!
• No the “be all, end all” solution
• API/Developer friendly
• SOCaaS
• Monitors 24/7/365, SLA backed
• Hands on investigations
• Detailed intrusion information (kill-chain analysis)
• Custom retention periods for all types of compliance
• packet replay
18
IDS/IPS
19
IDS/IPS
20
Firewalls
• WAF capabilities becoming standard w/ all new FWs
• Is WAF even enough? (Palo Alto says no)
• L7 SSL inspect via passthrough certs
• Many great OSS options still exist
• MikroTik:
• SSH/GUI w/ built in easy packet sniffing
• L7 regex matching
• VPN (IPSec, PPTP, SSTP, L2TP), BGP, OSPF, etc..
• Run a whole ISP on it :)
• HW appliance, w/ support and built in virtualization
• Dynamic address lists based on multitude of rules
• ‘Good’ IPv6 support FTW!
21
Firewalls
22
Network
23
Network
• Block Martian and Bogon routes (automate if possible)
• Unicast Reverse Path Forwarding (w/ full routes)
• Filter unknown outbound packets to prevent spoofing + retaliation
• Proper flow monitoring at the edge - CLI + GUI
• Packet sniffing
• Strategy around reflection attacks:
• Detect internally
• Run scan and patch?
• Block outbound if you can or redirect to internal server(s)
•IPv6 /64 assignments are bad - NDP exhaustion
24
Network
• RTBH (remotely triggered blackhole) on your network (but kills dst)
• Blackhole srcs upstream via community strings
• Automate ^^ via scripts/software
• BGP Flowspec: Use BGP to distribute flow specification filters and
dynamically filter on routers.
• communities based actions (accept, discard, rate-limit, sample,
redirect)
• Match on combination of source/dest prefix, source/dest port,
ICMP type/code, packet size, DSCP, TCP flag, fragment
encoding, etc
• Leverage ASIC filtering in routers
• Available today
25
Network
26
3rd Party on-demand scrubbing
Providers:
• Staminus communications
• Level3 (legacy BlackLotus)
• TATA
• Savvis
• Verisign
• Anyone running Arbor gear??
BGP enabled on the fly mitigation
27
3rd Party on-demand scrubbing
• On Demand: Enable Mitigation only when needed. “Insurance Policy”
• Assume potential attack will always have more BW than you
• Many providers now support L7 mitigation via BGP swing
• Upgrading capacity as needed via contracts, not hardware
• On prem device detects attacks and auto-swings on its own (automation)
• “Big Data” play - view details on attack, portal, reports
• A ‘required’ value add these days
• If BGP cannot be maintained to provider, route withdraws, attack comes
back to you. Some providers can instigate their own announcements on
request
28
3rd Party CDN/Proxies
• “Always on” - All connections proxies via 3rd party (for better, or worse)
• Usually work well out of the box with popular applications
• Simple way to handle many security touch points:
• Caching & CDN
• WAF capabilities and common injection detection
• SSL offload
• Custom Rules
• Easy to use for Beginners
• Enterprise offerings can:
• Cache dynamic applications (EdgeCast/VZW + Fast.ly)
• Work with Varnish VCLs and other common formats
• Mid-tier origin caching
• Option of last resort: CAPTCHA for user verification (eww)
• Not a complete solution, origins are usually found
29
3rd Party CDN/Proxies
30
THANK YOU!
Sagi Brody, CTO
@WebairSagi
sagi@webair.com
Logan Best
Senior Infrastructure/Network Engineer
logan@webair.com
*Research data provided via Staminus Communications

More Related Content

What's hot

High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINXNGINX, Inc.
 
5 things you didn't know nginx could do
5 things you didn't know nginx could do5 things you didn't know nginx could do
5 things you didn't know nginx could dosarahnovotny
 
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013Marcus Barczak
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014bryan_call
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Toni de la Fuente
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesLogan Best
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
Scaling Instagram
Scaling InstagramScaling Instagram
Scaling Instagramiammutex
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX, Inc.
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterKevin Jones
 
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Community
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance CachingNGINX, Inc.
 
Rate Limiting with NGINX and NGINX Plus
Rate Limiting with NGINX and NGINX PlusRate Limiting with NGINX and NGINX Plus
Rate Limiting with NGINX and NGINX PlusNGINX, Inc.
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on NetscalerMark Hillick
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusKevin Jones
 

What's hot (20)

High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
 
Route Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS ApproachRoute Origin Validation - A MANRS Approach
Route Origin Validation - A MANRS Approach
 
5 things you didn't know nginx could do
5 things you didn't know nginx could do5 things you didn't know nginx could do
5 things you didn't know nginx could do
 
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013
Integrating multiple CDN providers at Etsy - Velocity Europe (London) 2013
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
Scaling Instagram
Scaling InstagramScaling Instagram
Scaling Instagram
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load Balancing
 
Automating Network Infrastructure : Ansible
Automating Network Infrastructure : AnsibleAutomating Network Infrastructure : Ansible
Automating Network Infrastructure : Ansible
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS Cluster
 
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance Caching
 
Rate Limiting with NGINX and NGINX Plus
Rate Limiting with NGINX and NGINX PlusRate Limiting with NGINX and NGINX Plus
Rate Limiting with NGINX and NGINX Plus
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on Netscaler
 
Unity Makes Strength
Unity Makes StrengthUnity Makes Strength
Unity Makes Strength
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
 
How to monitor NGINX
How to monitor NGINXHow to monitor NGINX
How to monitor NGINX
 

Viewers also liked

TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a ServiceSagi Brody
 
Reducing iptables configuration complexity using chains
Reducing iptables configuration complexity using chainsReducing iptables configuration complexity using chains
Reducing iptables configuration complexity using chainsDieter Adriaenssens
 
Velocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attackVelocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attackCosimo Streppone
 
ChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy IntroChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy IntroChinaNetCloud
 
HAProxy tech talk
HAProxy tech talkHAProxy tech talk
HAProxy tech talkicebourg
 
Web Server Load Balancer
Web Server Load BalancerWeb Server Load Balancer
Web Server Load BalancerMobME Technical
 
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a Month
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a MonthUSENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a Month
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a MonthNicolas Brousse
 
HAProxy scale out using open source
HAProxy scale out using open sourceHAProxy scale out using open source
HAProxy scale out using open sourceIngo Walz
 
Interwiew about ABC Sealants (PVC Vitrini)
Interwiew about ABC Sealants (PVC Vitrini)Interwiew about ABC Sealants (PVC Vitrini)
Interwiew about ABC Sealants (PVC Vitrini)MURAT KARADAYI
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...eSAT Publishing House
 
Oscillatory motion control of hinged body using controller
Oscillatory motion control of hinged body using controllerOscillatory motion control of hinged body using controller
Oscillatory motion control of hinged body using controllereSAT Publishing House
 
Deber de informatica
Deber de informaticaDeber de informatica
Deber de informaticakelvinmaster4
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaanTenttu
 
Patnent Information services
Patnent Information servicesPatnent Information services
Patnent Information servicesLihua Gao
 
Local Food Launchpad 2016 Concept Development Workshop
Local Food Launchpad 2016 Concept Development WorkshopLocal Food Launchpad 2016 Concept Development Workshop
Local Food Launchpad 2016 Concept Development WorkshopDoing Something Good
 

Viewers also liked (19)

TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
 
Reducing iptables configuration complexity using chains
Reducing iptables configuration complexity using chainsReducing iptables configuration complexity using chains
Reducing iptables configuration complexity using chains
 
Velocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attackVelocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attack
 
ChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy IntroChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy Intro
 
HAProxy
HAProxy HAProxy
HAProxy
 
HAProxy tech talk
HAProxy tech talkHAProxy tech talk
HAProxy tech talk
 
Web Server Load Balancer
Web Server Load BalancerWeb Server Load Balancer
Web Server Load Balancer
 
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a Month
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a MonthUSENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a Month
USENIX LISA15: How TubeMogul Handles over One Trillion HTTP Requests a Month
 
HAProxy scale out using open source
HAProxy scale out using open sourceHAProxy scale out using open source
HAProxy scale out using open source
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Interwiew about ABC Sealants (PVC Vitrini)
Interwiew about ABC Sealants (PVC Vitrini)Interwiew about ABC Sealants (PVC Vitrini)
Interwiew about ABC Sealants (PVC Vitrini)
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...
 
Oscillatory motion control of hinged body using controller
Oscillatory motion control of hinged body using controllerOscillatory motion control of hinged body using controller
Oscillatory motion control of hinged body using controller
 
Deber de informatica
Deber de informaticaDeber de informatica
Deber de informatica
 
Pinetree concept
Pinetree conceptPinetree concept
Pinetree concept
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaan
 
Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...
 
Patnent Information services
Patnent Information servicesPatnent Information services
Patnent Information services
 
Local Food Launchpad 2016 Concept Development Workshop
Local Food Launchpad 2016 Concept Development WorkshopLocal Food Launchpad 2016 Concept Development Workshop
Local Food Launchpad 2016 Concept Development Workshop
 

Similar to Multi-Layer DDoS Mitigation Strategies

PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPROIDEA
 
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPROIDEA
 
Spy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformSpy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformRedge Technologies
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonPavel Odintsov
 
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"Fwdays
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSICT PRISTINE
 
Practice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China MobilePractice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China MobileDataWorks Summit
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Ontico
 
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECMAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECShumon Huque
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?APNIC
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesScott K. Larson
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderSplend
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & TroubleshootingAPNIC
 

Similar to Multi-Layer DDoS Mitigation Strategies (20)

PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
 
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
 
Spy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformSpy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platform
 
LACNOG - Logging in the Post-IPv4 World
LACNOG - Logging in the Post-IPv4 WorldLACNOG - Logging in the Post-IPv4 World
LACNOG - Logging in the Post-IPv4 World
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Practice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China MobilePractice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China Mobile
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECMAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
 
Http2 in practice
Http2 in practiceHttp2 in practice
Http2 in practice
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
 
Building a Router
Building a RouterBuilding a Router
Building a Router
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
 

More from Sagi Brody

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationSagi Brody
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicSagi Brody
 
Automated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber ProtectionAutomated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber ProtectionSagi Brody
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud CurtainSagi Brody
 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineSagi Brody
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation TeamsSagi Brody
 

More from Sagi Brody (7)

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
 
Automated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber ProtectionAutomated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber Protection
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Multi-Layer DDoS Mitigation Strategies

  • 1. 1 Multi-Layer DDoS Mitigation Strategies Sagi Brody, CTO @webairsagi sagi@webair.com Logan Best Senior Infrastructure Engineer logan@webair.com
  • 2. 2 Multi-Layer DDoS Mitigation Strategies Application Server(s) Load Balancers/Proxies IDS/IPS Network 3rd Party Scrubbing 3rd Party CDN/Proxies Firewall
  • 3. 3 Fully Managed Web Stack Application Server Load Balancers IDS/IPS Network Scrubbing CDN/Proxies FW & Cache plugins Memcache, Fail2ban, HAProxy + keepalived, nginx, SOCaaS, ProtectWise, AlertLogic, Snort RTBH, FlowSpec, Outbound filters Network Taps , Analysis, Automated BGP Redirects to CDN in App or via HTTP rewrite MikroTik, PaloAlto, JuniperFirewall
  • 4. 4 Why? - New Attack Landscape • DDoS Ransom on the rise with Bitcoins - Attackers becoming more anonymous • Multiple governments issue warnings about DD4BC • Stress Testers • Used to be called “booters’, available on IRC (EFnet anyone?) • DDoS-as-a-Service • Christmas 2014, Lizard Squad “stress tested” PSN and Xbox Live. Sets up lizardstresser.su to monetize. • Inexpensive - as little as $5/attack • Technically legal, RageBooter.net claims legal, provides full phone support. • DDoS Mitigation Companies targeted
  • 5. 5 Why? - Unlikely DDoS Originators • IoT • IoCT? Internet of Compromised Things? • Professor in Berlin creates smart home. Lightbulb unintentionally launches DoS against controller, causing home to lock up. • Proliferation of cheap android devices and LTE will result in perfect mobile storm. • 1 billion devices 0.1% vulnerable: • 100 kilobits per second == 100 gigabits per second • 100 pps == 100 million packets per second • Today: • 7.2 Billion cell devices globally • 6.4 Billion IoT devices globally
  • 6. 6 More sophisticated attackers • Less total attacks, increase in effectiveness • Attacks are getting more complicated and last longer • More effective L7 Botnets being used
  • 7. 7 Our Environment Founded: 1996 Headquarters: Long Island, NY Services Offered: Public, Private & Hybrid Cloud, Dedicated Servers, Colocation, CDN, Security, DRaaS, and more Customers: Enterprise, Healthcare, SMBs, VoIP providers, eCommerce, Information Technology, and more The Webair Value:  ➢ Over 18 years providing customers with best-in-class Managed Hosting solutions ➢ High-touch Support ➢ Full ownership of our customer’s infrastructure stack so they can focus on their core business. ➢ Manages most secure and redundant facility east of Manhattan with trans-Atlantic bypass (Tier III, HIPPA/SSAE16)
  • 9. 9 Application Layer • Simple to take sites down with low request volume • Stay under volumetric detection’s radar • Uncached dynamic (db backed) URLs fall over quickly (especially if framework is known) • Poorly written SQL queries • Apps written w/o scale in mind • Cross-site scripting, SQL injection, buffer overflows, file inclusion, oh my… • Search result pages, POST to forms, comments, etc • Botnets storing session cookies, use real ‘hidden’ browsers on infected PCs • Simple HTTP floods lead to state-exhaustion • Part of larger multi-vector attacks
  • 10. 10 Application Layer Protection • Framework or App specific plugins - WP (NinjaFirewall, Wordfence) • HTTP server modules - mod_evasive, mod_security • Common caching layers can perform rate limiting based on specific request attributes (nginx, varnish) • Cache for security • In memory - (memcache, redis) • Opcode caching - (APC, xcache, eAccelerator) • SQL - (sphinx search, solr, elasticsearch) • File • Follow best practices for web scale: • Disable all unnecessary logging • Scale-out architecture • In-memory session management • (many more!..)
  • 11. 11 Server Layer Linux Kernel /etc/sysctl.conf customization: • Prevent against the common 'syn flood attack' #net.ipv4.tcp_syncookies = 1 • Increase the number of outstanding syn requests allowed #net.ipv4.tcp_max_syn_backlog = 4096 • Reduce # of potential ACK replies (default 5) #net.ipv4.tcp_synack_retries = 3 • Reduce # of connections in TIME_WAIT state #net.ipv4.tcp_fin_timeout = 15 • Enable IP spoofing protection (turn on source route verification) #net.ipv4.conf.all.rp_filter = 1 #net.ipv4.conf.default.rp_filter = 1 • Decrease the time default value for tcp_keepalive_time connection #net.ipv4.tcp_keepalive_time = 1800
  • 12. 12 Server Layer IPTables rules: • Rate limit and block syn flooding: #iptables -N syn-flood #iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN #iptables -A syn-flood -j LOG --log-prefix "SYN flood: “ #iptables -A syn-flood -j DROP • Drop excessive RST packets to avoid smurf attacks #iptables -A INPUT -p tcp -m tcp --tcp-flags RST RST -m limit --limit 2/second --limit-burst 2 -j ACCEPT #iptables -A INPUT -p icmp -m icmp --icmp-type address-mask-request -j DROP #iptables -A INPUT -p icmp -m icmp --icmp-type timestamp-request -j DROP #iptables -A INPUT -p icmp -m icmp -j DROP • Drop Invalid Packets #iptables -A INPUT -m state --state INVALID -j DROP #iptables -A FORWARD -m state --state INVALID -j DROP #iptables -A OUTPUT -m state --state INVALID -j DROP
  • 13. 13 Server Layer IPTables rules: •Reject spoofed packets (bogon networks, RFC1918) #iptables -A INPUT -s 10.0.0.0/8 -j DROP #iptables -A INPUT -s 169.254.0.0/16 -j DROP #iptables -A INPUT -s 172.16.0.0/12 -j DROP #iptables -A INPUT -d 239.255.255.0/24 -j DROP #iptables -A INPUT -d 255.255.255.255 -j DROP …….etc • Reject ports, protocols, and IPs not in use. Are you really using UDP port 80? • Fail2Ban/SSHGuard • Mindful of NFS overhead (stop logging to NFS!)
  • 14. 14 Load Balancers • Load balancers can shield app/servers from attacks • Already operating at L7, ability to perform complex L7 rules and mitigation, https via offload • Provides inherent synflood protection, slowloris, • Traditional appliance solutions too rigid. Next gen ADC (Application delivery controller) to provide LB, WAF, Cache combined • DIY, our kit: Ansible, Debian/RHEL, HAProxy, keepalived, csync, git, automation software for provisioning, configuration, attack defense • Integrate with 3rd party software easily (geoip, automated blacklists) • Tie into caching: (varnish, nginx)
  • 15. 15 Load Balancers (HAProxy) • Provides rate limiting on many levels: • Connections per IP • Connection rate per IP • Bandwidth usage too high • Client not respecting RFCs (IE for SMTP) • HTTP request rate (L7) - Block based on • Request string/regex • User-Agent • Any other tracked variables • Vulnerability scanners: • Invalid or truncated requests • Denied or tarpitted requests • Failed authentications • 4xx error pages
  • 16. 16 HAProxy examples stick-table type ip size 256k expire 300s peers mypeers store gpc0,http_req_rate(5s),conn_cur,conn_rate(5s),http_err_rate(5s) acl abuse src_http_req_rate gt 50 acl flag_abuser sc1_inc_gpc0 acl ipwhitelist src -f /path/to/ipwhitelist.txt acl ipblacklist src -f /path/to/ipblacklist.txt tcp-request connection track-sc1 src tcp-request connection reject if ipblacklist tcp-request connection accept if ipwhitelist tcp-request connection reject if { sc1_conn_cur ge 30 } tcp-request connection reject if { sc1_conn_rate ge 20 } tcp-request connection reject if { sc1_get_gpc0 gt 0 } tcp-request content reject if { sc1_get_gpc0 gt 0 } http-request deny if ipblacklist http-request allow if ipwhitelist http-request deny if { sc1_get_gpc0 gt 0 } http-request deny if { sc1_http_err_rate ge 20 } flag_abuser http-request deny if abuse flag_abuser
  • 17. 17 IDS/IPS • “Threat Monitoring & Mitigation” • Sits behind the FW to catch unprotected malicious traffic • Works in virtual environments as well • Can be tap/span, logs, or libpcap based • Graphs and other cool Visual Dashboards! • No the “be all, end all” solution • API/Developer friendly • SOCaaS • Monitors 24/7/365, SLA backed • Hands on investigations • Detailed intrusion information (kill-chain analysis) • Custom retention periods for all types of compliance • packet replay
  • 20. 20 Firewalls • WAF capabilities becoming standard w/ all new FWs • Is WAF even enough? (Palo Alto says no) • L7 SSL inspect via passthrough certs • Many great OSS options still exist • MikroTik: • SSH/GUI w/ built in easy packet sniffing • L7 regex matching • VPN (IPSec, PPTP, SSTP, L2TP), BGP, OSPF, etc.. • Run a whole ISP on it :) • HW appliance, w/ support and built in virtualization • Dynamic address lists based on multitude of rules • ‘Good’ IPv6 support FTW!
  • 23. 23 Network • Block Martian and Bogon routes (automate if possible) • Unicast Reverse Path Forwarding (w/ full routes) • Filter unknown outbound packets to prevent spoofing + retaliation • Proper flow monitoring at the edge - CLI + GUI • Packet sniffing • Strategy around reflection attacks: • Detect internally • Run scan and patch? • Block outbound if you can or redirect to internal server(s) •IPv6 /64 assignments are bad - NDP exhaustion
  • 24. 24 Network • RTBH (remotely triggered blackhole) on your network (but kills dst) • Blackhole srcs upstream via community strings • Automate ^^ via scripts/software • BGP Flowspec: Use BGP to distribute flow specification filters and dynamically filter on routers. • communities based actions (accept, discard, rate-limit, sample, redirect) • Match on combination of source/dest prefix, source/dest port, ICMP type/code, packet size, DSCP, TCP flag, fragment encoding, etc • Leverage ASIC filtering in routers • Available today
  • 26. 26 3rd Party on-demand scrubbing Providers: • Staminus communications • Level3 (legacy BlackLotus) • TATA • Savvis • Verisign • Anyone running Arbor gear?? BGP enabled on the fly mitigation
  • 27. 27 3rd Party on-demand scrubbing • On Demand: Enable Mitigation only when needed. “Insurance Policy” • Assume potential attack will always have more BW than you • Many providers now support L7 mitigation via BGP swing • Upgrading capacity as needed via contracts, not hardware • On prem device detects attacks and auto-swings on its own (automation) • “Big Data” play - view details on attack, portal, reports • A ‘required’ value add these days • If BGP cannot be maintained to provider, route withdraws, attack comes back to you. Some providers can instigate their own announcements on request
  • 28. 28 3rd Party CDN/Proxies • “Always on” - All connections proxies via 3rd party (for better, or worse) • Usually work well out of the box with popular applications • Simple way to handle many security touch points: • Caching & CDN • WAF capabilities and common injection detection • SSL offload • Custom Rules • Easy to use for Beginners • Enterprise offerings can: • Cache dynamic applications (EdgeCast/VZW + Fast.ly) • Work with Varnish VCLs and other common formats • Mid-tier origin caching • Option of last resort: CAPTCHA for user verification (eww) • Not a complete solution, origins are usually found
  • 30. 30 THANK YOU! Sagi Brody, CTO @WebairSagi sagi@webair.com Logan Best Senior Infrastructure/Network Engineer logan@webair.com *Research data provided via Staminus Communications

Editor's Notes

  1. Speaker: Sagi
  2. Speaker: Sagi
  3. Speaker: Sagi
  4. Speaker: Sagi
  5. Speaker: Sagi - How exactly do you reboot your home?
  6. Speaker: Sagi
  7. Speaker: Sagi
  8. Speaker: Sagi
  9. Speaker: Sagi
  10. Speaker: Sagi
  11. Speaker: Logan Simple things like per-IP rate limiting, flooding rate limits, and syn cookies should be enabled without a question. The sysctl variables improves the overall network handling efficiency and protects about common SYN/ACK Denial of service attacks. In syslog on server, I saw lots of "nf_conntrack: table full, dropping packet". And netstat showed lots of TIME_WAIT.
  12. Speaker: Logan
  13. Speaker: Logan
  14. Speaker: Logan An application delivery controller (ADC) is a computer network device in a datacenter, often part of an application delivery network (ADN), that helps perform common tasks such as those done by web sites to remove load from the web servers themselves. Many also provide load balancing.
  15. Speaker: Logan
  16. Speaker: Logan Our Basic HAP ddos config ACL’s. Many many more options to harden applications of all types
  17. Speaker: Logan & Sagi
  18. Speaker: Logan
  19. Speaker: Sagi
  20. Speaker: Sagi mention NTP and DNS reflection specifically detail IPv6 Allocation/Assignment flow (Allocate /64 to client, assign /120 etc to vlan)
  21. Speaker: Sagi
  22. Speaker: Sagi
  23. Speaker: Sagi
  24. Speaker: Sagi
  25. Speaker: Logan
  26. Speaker: Sagi