Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

DDoS Mitigation

2,493 views

Published on

Distributed Denial-of-Service (DDoS) attacks are among the most serious threats to e-commerce and online businesses today. Find out how to mitigate DDoS threats here...

Published in: Technology, News & Politics
  • Be the first to comment

DDoS Mitigation

  1. 1. Managed DDoS Protection Service John Bull [email_address]
  2. 2. <ul><li>What is Denial of Service Protection (DDoS)? </li></ul><ul><li>How does it work? </li></ul>
  3. 3. Overview DDoS (Distributed Denial of Service) attacks are among the most serious threats to e-commerce and online businesses today.
  4. 4. What’s the Risk? (Estimates by Forrester, IDC and the Yankee Group)
  5. 5. <ul><li>- Financial </li></ul><ul><li>Extortion </li></ul><ul><li>ID Theft </li></ul><ul><li>Phishing </li></ul>For Hire Mainstream Experimental 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 TFN Attacks (Ebay, MSFT) DNS Backbone Attacks SQL Slammer Nugache Authorize.Net SCO Attack Dark Energy Darkness DC++ Conficker LOIC *Anonymous* Bank of America Competitive Sabotage Online Gambling Daily Independent CNN MasterCard Whitehouse Payment Processing Shoe Companies Cosmetics E-Commerce Olympics Airlines Twitter Amazon NYSE Akamai Visa Online Gaming CitiBank Pump and Dump Travel DNS Reflection Russian News ID Theft RIAA Primarily Organized Crime Competitors Political Activists State-sponsored State-complicit Disgruntled employees BBC All of the above + Activists Disgruntled Employees Broadband Mobile Paypal SaaS Cloud Big Financial MMORPG Mach Stux Regional Banks Estonia Georgia S.Korea Tunisia Money Mule 2.0 NAB Westpac Secure Computing EFTel, aaNet ‘ TitStorm’ News Ltd. The Evolution of DDoS Attacks & Prolexic
  6. 6. How Does DDoS Work? <ul><li>Attack detection is accomplished via remote router monitoring of Prolexic CPE device </li></ul><ul><li>Generic Route Encapsulation (GRE) protocol is used to create virtual wire between the mitigation infrastructure and the customer’s network </li></ul>Prolexic Mitigation Cloud Customer Border Router Customer Network Prolexic Router GRE Tunnel Customer /24 announced to Prolexic via BGP Announcement
  7. 7. DDoS Attack Mitigation Internet Prolexic Security Operation Center (SOC) 24/7 x 365 Customer Enterprise LON HKG MIA SJC LON HKG MIA SJC Clean Inbound Internet Traffic Clean outbound Internet Traffic GRE Tunnels Prolexic DDoS Mitigation Network Remote Attack Monitoring (24/7) Clean Inbound Traffic Delivered Malicious Attack Traffic Active Attack Mitigation as soon as traffic is routed

×