SlideShare a Scribd company logo
1 of 10
Download to read offline
FIRST LINE OF DEFENSE 
Hosting Provider DDoS Protection Playbook 
PLAYBOOK
Hosting Provider Playbook 2 
INTRODUCTION 
Distributed Denial of Service (DDoS) attacks are major threats to hosting providers as well as datacenter operators, and tradi-tional 
game plans for protecting shared infrastructure should be revisited to better protect availability and allow hosting provid-ers 
to potentially create incremental revenue streams. DDoS attacks can have a devastating impact on not only the customer 
under attack, but also on the hosting provider and other customers within the same shared network infrastructure. 
Hosting providers are often the targets for damaging DDoS attacks, since the number of customers they service and the 
aggregate Internet peering bandwidth they utilize greatly increases their attack surface. An attack on a single client of the pro-vider— 
such as a high-traffi c gaming service—can create major collateral damage to other hosted customers. These innocent 
bystanders are placed in the unfortunate situation of suffering from second-hand (damage) because they are hosted on the 
same shared facilities as the intended victim, and the results can be devastating for both the provider and their customers. 
Hosting providers and their customers can experience hours or even days of downtime, and the situation is becoming more 
challenging due to the increased accessibility of tools and limitless attacker motivations. The sophistication and sheer brute 
force of recent attacks suggests an escalation of tactics to new levels of severity. As the size, complexity and regularity of 
DDoS attacks on hosting providers and their customers continues to increase, providers have to fi eld new plays to mitigate 
risks and avoid the crippling downtime that comes with being the victim of DDoS attacks. 
Few hosting providers today offer suffi cient protection from DDoS attacks, so those that can implement robust DDoS attack 
protection will be able to more effi ciently protect their hosted infrastructure and gain a competitive advantage in the market-place. 
They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection 
services. 
THE FIRST LINE OF DEFENSE 
The Corero First Line of Defense® solutions offer hosting providers the ability to offer comprehensive DDoS and cyber threat 
protection to their hosted customers as an extension of their current service offerings, improving the overall value proposition 
and providing an opportunity to offer differentiated, value-added security services. 
The Corero SmartWall® Threat Defense System (TDS) for host-ing 
providers is architected to overcome the challenges associ-ated 
with a wide range of hosting requirements, such as main-taining 
highly available applications, supporting mission-critical 
systems and delivering maximum levels of reliability. Providers 
that work with Corero to deploy always on DDoS attack mitiga-tion 
services can expect the highest levels of performance and 
security. 
The Corero SmartWall TDS is a purpose-built family of network 
security appliances that is confi gurable to meet the needs of 
hosting providers. These appliances deliver comprehensive 
threat defense services in rapidly scalable deployments for 
higher performance, greater connectivity and broader functional-ity 
than previously possible.
Hosting Provider Playbook 3 
THE FIRST LINE OF DEFENSE (cont.) 
This unique, slim-line appliance family delivers 10 Gbps full-duplex performance in a ÂĽ wide, 1 RU form factor. Hosting pro-viders 
can deploy a combination of SmartWall TDS appliances to deliver the performance, connectivity and security required. 
Customers benefi t from progressive inspection, threat detection and policy-based protection with always on visibility at any 
throughput—1 RU delivers 40 Gbps, and 4 RU delivers 160 Gbps. SmartWall TDS appliances simultaneously provide con-tinuous 
visibility and security policy enforcement at layers 3 - 7 for both IPv4 and IPv6 traffi c. SmartWall TDS provides the First 
Line of Defense against DDoS attacks for hosting providers, and is available in several appliance models, including: 
The Corero SmartWall Network Threat Defense appliance provides continuous visibility and security policy enforce-ment 
so that hosting providers can establish a proactive First Line of Defense for inspecting traffi c, detecting threats 
and blocking attacks. It is capable of mitigating a wide range of DDoS attacks while maintaining full service connec-tivity 
and availability to avoid degrading the delivery of legitimate traffi c. The SmartWall Network Threat Defense ap-pliance 
is designed to handle volumetric network based DDoS attacks or fl oods, refl ective amplifi ed spoof attacks, 
like DNS and NTP attacks, as well as application layer attacks that are typically too low to be detected by out of 
band solutions—such as slow loris, slow read etc. 
The Corero SmartWall Network Bypass appliance is also deployed by hosting providers for DDoS protection in 
high-availability deployments. It delivers transparent 10 Gbps full-duplex performance for network bypass, monitor 
or insertion. The SmartWall Network Bypass appliance has two passive fi ber ports for 10 Gbps of zero power optical 
bypass and two active 10 Gbps SFP+ ports for monitoring and active inline processing. Multiple confi gurable pro-tection 
modes are supported, including power-fail, manual bypass, programmatic bypass and automatic heartbeat 
detection. It delivers 100% network connectivity to hosting providers, eliminating downtime of their Internet presence 
due to power or equipment failures, or during maintenance windows. 
The Corero Network Forensics appliance can continuously record traffi c and simultaneously retrieve specifi c histori-cal 
packet captures for subsequent analysis of network packets, fl ows and trends over time. It provides the raw data 
for detailed visibility into detected threats and anomalous usage patterns, enabling robust network forensic analysis 
for regulatory compliance, corporate security incident response and law enforcement reporting. 
Centralized operational management of multiple SmartWall TDS appliances minimizes IT overhead, speeds deployments and 
streamlines provisioning. Corero offers multiple integration options for confi guring, controlling and monitoring the appliances 
including a fl exible browser-based GUI, a full SSH CLI and powerful REST API that supports open integration with existing 
management frameworks. 
Centralized management of the SmartWall TDS is performed via secure connection to the Corero Management Server (CMS). 
The CMS includes a dashboard for monitoring threat activity and viewing key security events. The SmartWall Network Threat 
Defense appliance family provides seamless integration with Security Information and Event Management (SIEM) and Opera-tional 
Intelligence solutions, such as Splunk. 
DEPLOYMENT SCENARIOS 
Enterprises are increasingly calling on hosting providers to assist them in the detection, analysis and mitigation of DDoS at-tacks 
before they have an impact on their operations, and hosting providers can deploy the SmartWall TDS inline to ensure 
always on DDoS attack mitigation services while benefi tting from the highest levels of performance and security. 
Unlike strictly out-of-band scrubbing solutions that detect DDoS threats and subsequently generate alerts that require an 
operator to take action, which can take considerable time, possibly leaving the environment under attack in some cases for 
multiple hours, the SmartWall TDS solution is designed to be deployed inline and respond in real-time. Alternatively, 
SmartWall can be deployed as an out-of-band scrubbing solution for customers that prefer this method of mitigation. 
While inline deployment is the preferred way to achieve instantaneous detection and mitigation of DDoS attacks, the Corero 
NTD is a superior component for high-performance scrubbing centers where false positives cannot be tolerated. Legacy 
scrubbing center solutions have not been designed for inline deployment and therefore exhibit signifi cant packet loss when 
under attack – signifi cantly impacting legitimate traffi c contained within the fl ows directed for scrubbing. Additionally, for large 
bandwidth scrubbing centers, operators can add bandwidth in 10 Gbps increments with the Corero Network Threat Defense 
solution as their scrubbing needs evolve.
The traditional method of using an out-of-band scrubbing center is still a viable option, but it lacks the real-time visibility and 
rapid mitigation of inline DDoS protection deployments. Legacy scrubbing solutions are slow to detect attacks and even 
slower to mitigate because they require human intervention, which typically takes an hour or more. 
For companies that have already committed to the scrubbing center approach, the SmartWall TDS can be deployed into 
this scenario while offering hosting providers the ability to redeploy the SmartWall appliances inline in later implementations, 
thereby future-proofi ng DDoS mitigation investment. 
With a scrubbing center deployment, suspect traffi c fl ows are redirected to SmartWall Network Threat Defense appliances for 
traffi c validation and scrubbing. When the SmartWall Network Threat Defense appliance is deployed offl ine between routers 
in a traditional implementation, questionable traffi c is then redirected at 10 Gbps to the SmartWall Network Threat Defense 
appliances via a network off-ramp, where it is then scrubbed. Attacks are mitigated, and the cleaned traffi c is sent back onto 
a network on-ramp at 10 Gbps. 
Hosting Provider Playbook 4 
DEPLOYMENT SCENARIOS (cont.) 
The SmartWall Network Threat Defense appliance inspects network traffi c, analyzes the packets and responds to the DDoS 
threat with absolute granularity and can mitigate the attack automatically. It employs a do-no-harm architectural philosophy 
that allows all good traffi c to fl ow as intended, and surgically removes the attack traffi c before it moves downstream, while 
never dropping any good traffi c. SmartWall TDS appliances can be deployed in fl exible, scalable confi gurations to help host-ing 
providers combat the increasing menace of DDoS attacks. The following are a few typical deployment scenarios. 
SCRUBBING CENTER 
Scrubbing Traf c in a Routing Scenario 
Scrubbing Traf c at Layer 2
Hosting Provider Playbook 5 
SCRUBBING CENTER (cont.) 
Another, more effi cient alternative scrubbing center deployment is to integrate the SmartWall Network Threat Defence appli-ances 
with Layer 2 switch technology to gain increased reliability and visibility. This will allow the hosting provider to mitigate 
DDoS threats more quickly because hosting providers will be able to detect threats more swiftly and reroute the traffi c using 
VLAN technology. 
Corero recommends that hosting providers deploy one of the following inline DDoS protection solutions if possible. However, 
if a scrubbing center solution has been decided as the best option for the company, it is recommended to select one that 
provides the fl exibility to support inline implementations in the future and implement scrubbing at Layer 2 if the architecture 
supports it. 
FULL, HIGH-AVAILABILITY PROTECTED LINKS 
Every hosting provider is measured on its ability to meet SLAs, and network connectivity is a key consideration for maintain-ing 
an always on Internet availability. This implementation allows hosting providers to provide inline DDoS protection with full, 
high-availability for a single 10 Gbps Ethernet link. SmartWall appliances are deployed between the Internet and the hosting 
provider networks to protect all infrastructure on the link south of the appliances from DDoS attacks. 
All inbound traffi c from the Internet fl ows into the SmartWall Network Bypass appliance at 10 Gbps and fl ows to the Smart- 
Wall Network Threat Defense appliance for DDoS attack mitigation. Then, clean traffi c fl ows back to the SmartWall Bypass 
appliance and passes through the router and switch to hosted servers. The Internet link is fully protected from DDoS attacks 
all the way down to the servers. The routers, switches, fi rewalls, hypervisors and any other security layers located below the 
Corero equipment are protected from DDoS attacks and cyber threats. 
High-Availability 
Unlike scrubbing-only solutions, this scenario also provides 
symmetric protection capabilities for both directions of the 
network traffi c which enables signifi cantly more precise detec-tion 
and mitigation. Additionally, all outbound traffi c can be 
inspected by the SmartWall Network Threat Defense appliance 
for DDoS attack mitigation purposes. 
In the remote event that the SmartWall Network Threat 
Defense appliance fails, the SmartWall Bypass appliance 
would detect the lack of a heartbeat and subsequently close 
the bypass, maintaining the connection from the Internet to 
the router and triggering an alert to the Corero Management 
Server (CMS) to notify operations staff to immediately address 
the issue. This allows hosting providers to ensure availability 
while avoiding the risk of the DDoS threat prevention equip-ment 
ever potentially becoming a blocking element in provid-ing 
Internet connectivity. Even in the event of a power failure, 
the SmartWall Bypass appliance will maintain the network con-nection; 
another safeguard for ensuring high availability. 
This solution has no blocking elements and no single point of 
failure; it allows hosting providers the ability to deliver full, high 
availability protected links that insulate hosting providers and 
their customers from the ravages that DDoS can deliver.
ACTIVE/ACTIVE HIGH-AVAILABILITY LINK PROTECTION 
This deployment scenario allows hosting providers to benefi t from active/active redundant link protection, and is an added 
level of resiliency to protect against a single link failure. The SmartWall Network Threat Defense appliances are deployed 
below the router. One active link is connected to each of the appliances from the router, and traffi c can be distributed across 
the SmartWall appliances using the standard Link Aggregation Control Protocol (LACP) or any other standard load sharing 
mechanism. SmartWall appliances are transparent, so they can be deployed in a manner that does not affect any of the pro-tocols 
Hosting Provider Playbook 6 
utilized in the link sharing function. 
Active/Active High-Availability Link Protection 
This deployment demonstrates that if a hosting provider loses a single link that the remaining active link will continue running 
live until the failed link is recovered. Optical bypass can optionally be deployed in this scenario to increase the availability of this 
solution. The scenario pictured does not offer protection for the router—but the SmartWall appliances could just as easily be 
deployed in an active/active scenario above the router and utilize Equal Cost Multi-Path (ECMP) routing to achieve similar result 
with the added benefi t of protecting the router.
Scaled DDoS Security Array 
100 Gbps Line Rate DDoS 10X SmartWall® Threat Defense System 
A DDoS security array offers hosting providers the ability to implement highly scalable, inline DDoS attack mitigation with N+1 
redundancy and is ideal for large providers and providers with fast-growing Internet bandwidth. 
GAINING VISIBILITY INTO DDOS ATTACKS 
Hosting Provider Playbook 7 
SCALED DDOS SECURITY ARRAY 
This is an example of a large implementation that requires a scaled DDoS security array to protect a 100 Gbps Ethernet 
connection. The hosting provider delivers 100 Gbps DDoS protection by deploying 10 SmartWall Network Threat Defense ap-pliances 
and using the link aggregation capabilities in the switches to distribute the 100 Gbps Ethernet connection to multiple 
10 Gbps links. 
Corero offers hosting providers and data center operators comprehensive visibility into DDoS attacks and cyber threats that 
that can be integrated into existing operational support system (OSS) infrastructure utilizing a fl exible GUI, a powerful CLI and 
a full REST API that allows integration with multiple management options. Hosting providers can rely on a single pane of glass 
for automated provisioning and reporting of events and alarms, and develop web portals to share monitoring and DDoS miti-gation 
information with hosting customers.
A signifi cant challenge facing many organizations is how to extract meaningful real-time information on DDoS attacks and 
cyber threats from volumes of security events. To date, only minimal visibility into these classes of security events has been 
available, and only to organizations with signifi cant investments in analytics tools and expert security staff; and in any case 
hosting providers and their customers are left to react to the threats after the damage has been done. 
SecureWatch® Analytics is a powerful web-based security analytics portal that delivers comprehensive and easy-to-read se-curity 
dashboards based on DDoS tailored security feeds from Corero First Line of Defense products. Large hosting providers 
and their enterprise customers can benefi t from the targeted granular DDoS event data they have been lacking that comple-ments 
their security event monitoring practice. All users benefi t from the turn-key SecureWatch Analytics portal that delivers 
unprecedented DDoS and cyber threat visibility without requiring dedicated security analysts to sift through reams of unintelli-gible 
log data. SecureWatch Analytics is powered by Splunk, and it provides a portal that transforms the sophisticated Corero 
security feeds into dashboards of actionable security intelligence, exposing: 
Security Visibility 
GAINING VISIBILITY INTO DDOS ATTACKS (cont.) 
Empowered by this enhanced visibility, hosting providers can utilize SecureWatch Analytics to visualize and mitigate DDoS 
attacks and cyber threats. Additionally, Splunk customers that have the SmartWall Threat Defense System can access the 
DDoS Analytics for SmartWall® App from Splunk Base, allowing for seamless integration within their existing Splunk reporting 
and analytics environment. 
Hosting providers can also utilize the SmartWall Network Forensics appliance to capture packet fl ow data to disk at 10 Gbps 
line rates to gain forensic visibility into network traffi c, with storage of captured data distributed to iSCSI arrays via dual 10 
Gbps network interfaces. It provides line-rate Internet traffi c capture to support visibility into DDoS attacks and cyber threats. 
Hosting providers can capture the necessary data to feed historical analysis of cyber threat activity, including identifi cation of 
attack vectors, fi ngerprinting attacker identity, breach characterization as well as intelligence gathering for 
preparation against emerging threats. 
Hosting Provider Playbook 8 
• Refl ective amplifi ed DDoS attacks 
• Targeted application layer attacks 
• Under the radar low and slow attacks 
• Victim servers, ports, and services 
• Malicious IP addresses and botnets
CREATING ADDITIONAL REVENUE STREAMS 
Hosting providers have an obligation to their customers to adequately protect them against DDoS attacks. Enterprise custom-ers 
don’t want to move their unprotected services to an unprotected cloud, so hosting providers have the opportunity to differ-entiate 
their services through their DDoS security infrastructure. Before customers consider migrating to hosted services, they 
need to be sure that their provider has adequate First Line of Defense DDoS protection measures in place. 
As more organizations migrate critical applications and services to hosted environments, the premium placed on security is 
becoming increasingly important. Hosting providers that can document and demonstrate the value of their DDoS mitigation 
capabilities can position themselves to offer tiered services with premium pricing based on the level of advanced DDoS mitiga-tion 
Hosting Provider Playbook 9 
capabilities a customer requires. 
With First Line of Defense protection from Corero, providers can offer cleaner transport streams that are better protected from 
volumetric DDoS attacks. Providers are now enabled to offer creative new offerings, such as DDoS and cyber threat protection, 
enhanced security SLAs as well as visibility and reporting through an analytics portal that can be leveraged as a comprehensive 
virtual Security Operations Center (SOC). This allows hosting providers the opportunity to to provide managed DDoS security 
services, such as 24x7 monitoring, alerting and reporting. The SmartWall Network Forensics appliance also offers hosting pro-viders 
the ability to offer packet capture and retrieval as a value added security service to their customers. 
Without advanced DDoS mitigation capabilities, providers risk losing customers and potential damage to their brand that may 
not be recoverable. By turning to a next-generation architecture with advanced DDoS and cyber threat protection—coupled 
with comprehensive visibility through analytics and reporting—hosting providers are now calling the plays for thwarting DDoS 
attacks. Hosting providers deploying this purpose-built First Line of Defense against cyber threats will be able to not only mini-mize 
churn but also create incremental revenue streams and longer-lasting customer relationships. 
IMPLEMENTING 5 STEPS FOR DDOS PROTECTION 
Hosting providers can re-write the defense against DDoS attacks, while enhancing their business models and building more 
profi table and longer-lasting relationships with their hosted customers. The following are a few clear actions that can change 
the playing fi eld for improving DDoS protection: 
Deliver Comprehensive DDoS Protection: Enterprises rely on their providers to ensure availability and ulti-mately 
protection against DDoS attacks and cyber threats. With a First Line of Defense against DDoS attacks 
deployed, providers are protecting their customers from damaging volumetric threats directed at or originating 
from or within the networks. 
Improve Visibility into DDoS Threats: Hosting providers need clear visibility into the threats facing their 
infrastructure. Real-time reporting and alarm and event integration with back-end OSS infrastructure enables 
fast reaction times, scalable implementations and the analytics needed to understand the threat condition and 
proactively improve DDoS security. 
Implement Real-time Defense: Providers need to change the play from deploying devices to monitor threats 
and generate alerts requiring manual/human intervention to deploying appliances that both monitor and mitigate 
DDoS threats automatically. Hosting providers can eliminate the delays incurred between the time a monitoring 
device detects a threat, generates an alert and an operator is able to respond. 
Enable Premium Services: Hosting providers can offer baseline DDoS mitigation services to all customers, but 
for those customers who place a premium on high availability the provider can create value-added options and 
build incremental revenue streams while strengthening their brand. 
Move Inline Quickly: If providers employ out-of-band devices in place to scrub traffi c, deploy inline threat de-tection 
equipment that can inspect, analyze and respond to DDoS threats in real-time as soon as possible. Doing 
so allows you to protect higher-value assets and continue to leverage the legacy out-of-band devices as long as 
the provider can fi nd a productive use for them. Inline threat detection is the only option for real-time mitigation. 
If scrubbing remains the preferred scenario for the organization, evaluate DDoS prevention solutions that support 
both scrubbing and inline DDoS prevention to future-proof the deployment. 
1. 
2. 
3. 
4. 
5.
DO-NO-HARM 
As providers implement each of these 5 steps for DDoS protection, always remember to do-no-harm. One of the failings of 
traditional scrubbing center deployments is that they have not been architected with suffi cient performance capabilities to 
execute their duties at line rate. They have been relegated to scrubbing center deployments where the solution can do the 
least amount of damage in the event of false positives. Providers should invest in a DDoS defense solution that is designed to 
never drop good traffi c. Corero has architected the SmartWall TDS to allow the highest possible performance for DDoS attack 
and cyber threat protection without incurring any false positives. Providers need to have these capabilities in place to differen-tiate 
between good and bad traffi c, and respond accordingly—always allowing the good traffi c to pass un-interrupted. 
Do-No-Harm Architecture 
Good trafc 
Known Bad 
Suspicious Inspect/Drop/Transmit 
per Customer Policy 
Known Good Protect 
Network Threat 
Defense Appliances {Mitigate 
Do-no-harm protection ensures good traf c will always get though 
Inspect/Drop 
per Active Rules 
and Transmit 
The Corero SmartWall Threat Defense System can be deployed inline or as an out-of-band scrubbing solution to offer hosting 
providers and data center operators DDoS attack mitigation and protection against a continuously evolving spectrum of DDoS 
attacks. Hosting providers and data center operators can enhance defense-in-depth security architectures with an additional 
layer of security capable of inspecting traffi c arriving from the Internet at line rate, in real time. Corero is an industry leader with 
over 500 active customers and over 8,000 units shipped. 
ABOUT CORERO NETWORK SECURITY 
Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in 
global network security. Corero products and services provide online enterprises, service providers, hosting providers, and 
Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffi c and enforc-ing 
real-time access and monitoring policies designed to match the needs of the protected business. Corero technology 
enhances any defense-in-depth security architecture with a scalable, fl exible and responsive defense against DDoS attacks 
and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more 
information, visit www.corero.com. 
Hosting Provider Playbook 10 
Network Bypass 
Appliances 
Overload Protect 
Monitor 
Logical Bypass 
{Layer 2 Insert 
Layer 2 Bypass / TAP 
Optical Bypass (ZBP) 
Corporate Headquarters EMEA Headquarters 
1 Cabot Road Regus House, Highbridge, Oxford Road 
Hudson, MA 01749 USA Uxbridge, England 
Phone: +1.978.212.1500 UB8 1HR, UK 
Web: www.corero.com Phone: +44.0.1895.876579 Copyright 2014 Corero Network Security, Inc. All rights reserved. 867-5309-001

More Related Content

What's hot

Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesMazeBolt Technologies
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...Deenuji Loganathan
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta swet4
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDSRick Warren
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Gerardo Pardo-Castellote
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentationAyano Midakso
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)Shreyank Gupta
 
Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS SolutionSrikrupa Srivatsan
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsAngelo Corsaro
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
 
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 

What's hot (20)

Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
FIRECOL: A COLLABORATIVE PROTECTION NETWORK FOR THE DETECTION OF FLOODING DDO...
 
DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS Conference
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDS
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time Systems
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
Distil technical-white-paper
Distil technical-white-paperDistil technical-white-paper
Distil technical-white-paper
 
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
CĂłmo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 

Similar to DDoS Defense for the Hosting Provider - Protection for you and your customers

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Markit
 
Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Stephanie Weagle
 
Incapsula Enterprise is the best mitigation service provider with th.pdf
Incapsula Enterprise is the best mitigation service provider with th.pdfIncapsula Enterprise is the best mitigation service provider with th.pdf
Incapsula Enterprise is the best mitigation service provider with th.pdfaplolomedicalstoremr
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08Sunardi Fatan
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...IJECEIAES
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docxTushar Mathur
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFDominik Suter
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...Sergiy Pitel
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP NetworksGENBANDcorporate
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSCristian Garcia G.
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Akamai Technologies
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threatsPedro Espinosa
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltdos
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyCloudflare
 

Similar to DDoS Defense for the Hosting Provider - Protection for you and your customers (20)

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences
 
Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015
 
Incapsula Enterprise is the best mitigation service provider with th.pdf
Incapsula Enterprise is the best mitigation service provider with th.pdfIncapsula Enterprise is the best mitigation service provider with th.pdf
Incapsula Enterprise is the best mitigation service provider with th.pdf
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

DDoS Defense for the Hosting Provider - Protection for you and your customers

  • 1. FIRST LINE OF DEFENSE Hosting Provider DDoS Protection Playbook PLAYBOOK
  • 2. Hosting Provider Playbook 2 INTRODUCTION Distributed Denial of Service (DDoS) attacks are major threats to hosting providers as well as datacenter operators, and tradi-tional game plans for protecting shared infrastructure should be revisited to better protect availability and allow hosting provid-ers to potentially create incremental revenue streams. DDoS attacks can have a devastating impact on not only the customer under attack, but also on the hosting provider and other customers within the same shared network infrastructure. Hosting providers are often the targets for damaging DDoS attacks, since the number of customers they service and the aggregate Internet peering bandwidth they utilize greatly increases their attack surface. An attack on a single client of the pro-vider— such as a high-traffi c gaming service—can create major collateral damage to other hosted customers. These innocent bystanders are placed in the unfortunate situation of suffering from second-hand (damage) because they are hosted on the same shared facilities as the intended victim, and the results can be devastating for both the provider and their customers. Hosting providers and their customers can experience hours or even days of downtime, and the situation is becoming more challenging due to the increased accessibility of tools and limitless attacker motivations. The sophistication and sheer brute force of recent attacks suggests an escalation of tactics to new levels of severity. As the size, complexity and regularity of DDoS attacks on hosting providers and their customers continues to increase, providers have to fi eld new plays to mitigate risks and avoid the crippling downtime that comes with being the victim of DDoS attacks. Few hosting providers today offer suffi cient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more effi ciently protect their hosted infrastructure and gain a competitive advantage in the market-place. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services. THE FIRST LINE OF DEFENSE The Corero First Line of Defense® solutions offer hosting providers the ability to offer comprehensive DDoS and cyber threat protection to their hosted customers as an extension of their current service offerings, improving the overall value proposition and providing an opportunity to offer differentiated, value-added security services. The Corero SmartWall® Threat Defense System (TDS) for host-ing providers is architected to overcome the challenges associ-ated with a wide range of hosting requirements, such as main-taining highly available applications, supporting mission-critical systems and delivering maximum levels of reliability. Providers that work with Corero to deploy always on DDoS attack mitiga-tion services can expect the highest levels of performance and security. The Corero SmartWall TDS is a purpose-built family of network security appliances that is confi gurable to meet the needs of hosting providers. These appliances deliver comprehensive threat defense services in rapidly scalable deployments for higher performance, greater connectivity and broader functional-ity than previously possible.
  • 3. Hosting Provider Playbook 3 THE FIRST LINE OF DEFENSE (cont.) This unique, slim-line appliance family delivers 10 Gbps full-duplex performance in a ÂĽ wide, 1 RU form factor. Hosting pro-viders can deploy a combination of SmartWall TDS appliances to deliver the performance, connectivity and security required. Customers benefi t from progressive inspection, threat detection and policy-based protection with always on visibility at any throughput—1 RU delivers 40 Gbps, and 4 RU delivers 160 Gbps. SmartWall TDS appliances simultaneously provide con-tinuous visibility and security policy enforcement at layers 3 - 7 for both IPv4 and IPv6 traffi c. SmartWall TDS provides the First Line of Defense against DDoS attacks for hosting providers, and is available in several appliance models, including: The Corero SmartWall Network Threat Defense appliance provides continuous visibility and security policy enforce-ment so that hosting providers can establish a proactive First Line of Defense for inspecting traffi c, detecting threats and blocking attacks. It is capable of mitigating a wide range of DDoS attacks while maintaining full service connec-tivity and availability to avoid degrading the delivery of legitimate traffi c. The SmartWall Network Threat Defense ap-pliance is designed to handle volumetric network based DDoS attacks or fl oods, refl ective amplifi ed spoof attacks, like DNS and NTP attacks, as well as application layer attacks that are typically too low to be detected by out of band solutions—such as slow loris, slow read etc. The Corero SmartWall Network Bypass appliance is also deployed by hosting providers for DDoS protection in high-availability deployments. It delivers transparent 10 Gbps full-duplex performance for network bypass, monitor or insertion. The SmartWall Network Bypass appliance has two passive fi ber ports for 10 Gbps of zero power optical bypass and two active 10 Gbps SFP+ ports for monitoring and active inline processing. Multiple confi gurable pro-tection modes are supported, including power-fail, manual bypass, programmatic bypass and automatic heartbeat detection. It delivers 100% network connectivity to hosting providers, eliminating downtime of their Internet presence due to power or equipment failures, or during maintenance windows. The Corero Network Forensics appliance can continuously record traffi c and simultaneously retrieve specifi c histori-cal packet captures for subsequent analysis of network packets, fl ows and trends over time. It provides the raw data for detailed visibility into detected threats and anomalous usage patterns, enabling robust network forensic analysis for regulatory compliance, corporate security incident response and law enforcement reporting. Centralized operational management of multiple SmartWall TDS appliances minimizes IT overhead, speeds deployments and streamlines provisioning. Corero offers multiple integration options for confi guring, controlling and monitoring the appliances including a fl exible browser-based GUI, a full SSH CLI and powerful REST API that supports open integration with existing management frameworks. Centralized management of the SmartWall TDS is performed via secure connection to the Corero Management Server (CMS). The CMS includes a dashboard for monitoring threat activity and viewing key security events. The SmartWall Network Threat Defense appliance family provides seamless integration with Security Information and Event Management (SIEM) and Opera-tional Intelligence solutions, such as Splunk. DEPLOYMENT SCENARIOS Enterprises are increasingly calling on hosting providers to assist them in the detection, analysis and mitigation of DDoS at-tacks before they have an impact on their operations, and hosting providers can deploy the SmartWall TDS inline to ensure always on DDoS attack mitigation services while benefi tting from the highest levels of performance and security. Unlike strictly out-of-band scrubbing solutions that detect DDoS threats and subsequently generate alerts that require an operator to take action, which can take considerable time, possibly leaving the environment under attack in some cases for multiple hours, the SmartWall TDS solution is designed to be deployed inline and respond in real-time. Alternatively, SmartWall can be deployed as an out-of-band scrubbing solution for customers that prefer this method of mitigation. While inline deployment is the preferred way to achieve instantaneous detection and mitigation of DDoS attacks, the Corero NTD is a superior component for high-performance scrubbing centers where false positives cannot be tolerated. Legacy scrubbing center solutions have not been designed for inline deployment and therefore exhibit signifi cant packet loss when under attack – signifi cantly impacting legitimate traffi c contained within the fl ows directed for scrubbing. Additionally, for large bandwidth scrubbing centers, operators can add bandwidth in 10 Gbps increments with the Corero Network Threat Defense solution as their scrubbing needs evolve.
  • 4. The traditional method of using an out-of-band scrubbing center is still a viable option, but it lacks the real-time visibility and rapid mitigation of inline DDoS protection deployments. Legacy scrubbing solutions are slow to detect attacks and even slower to mitigate because they require human intervention, which typically takes an hour or more. For companies that have already committed to the scrubbing center approach, the SmartWall TDS can be deployed into this scenario while offering hosting providers the ability to redeploy the SmartWall appliances inline in later implementations, thereby future-proofi ng DDoS mitigation investment. With a scrubbing center deployment, suspect traffi c fl ows are redirected to SmartWall Network Threat Defense appliances for traffi c validation and scrubbing. When the SmartWall Network Threat Defense appliance is deployed offl ine between routers in a traditional implementation, questionable traffi c is then redirected at 10 Gbps to the SmartWall Network Threat Defense appliances via a network off-ramp, where it is then scrubbed. Attacks are mitigated, and the cleaned traffi c is sent back onto a network on-ramp at 10 Gbps. Hosting Provider Playbook 4 DEPLOYMENT SCENARIOS (cont.) The SmartWall Network Threat Defense appliance inspects network traffi c, analyzes the packets and responds to the DDoS threat with absolute granularity and can mitigate the attack automatically. It employs a do-no-harm architectural philosophy that allows all good traffi c to fl ow as intended, and surgically removes the attack traffi c before it moves downstream, while never dropping any good traffi c. SmartWall TDS appliances can be deployed in fl exible, scalable confi gurations to help host-ing providers combat the increasing menace of DDoS attacks. The following are a few typical deployment scenarios. SCRUBBING CENTER Scrubbing Traf c in a Routing Scenario Scrubbing Traf c at Layer 2
  • 5. Hosting Provider Playbook 5 SCRUBBING CENTER (cont.) Another, more effi cient alternative scrubbing center deployment is to integrate the SmartWall Network Threat Defence appli-ances with Layer 2 switch technology to gain increased reliability and visibility. This will allow the hosting provider to mitigate DDoS threats more quickly because hosting providers will be able to detect threats more swiftly and reroute the traffi c using VLAN technology. Corero recommends that hosting providers deploy one of the following inline DDoS protection solutions if possible. However, if a scrubbing center solution has been decided as the best option for the company, it is recommended to select one that provides the fl exibility to support inline implementations in the future and implement scrubbing at Layer 2 if the architecture supports it. FULL, HIGH-AVAILABILITY PROTECTED LINKS Every hosting provider is measured on its ability to meet SLAs, and network connectivity is a key consideration for maintain-ing an always on Internet availability. This implementation allows hosting providers to provide inline DDoS protection with full, high-availability for a single 10 Gbps Ethernet link. SmartWall appliances are deployed between the Internet and the hosting provider networks to protect all infrastructure on the link south of the appliances from DDoS attacks. All inbound traffi c from the Internet fl ows into the SmartWall Network Bypass appliance at 10 Gbps and fl ows to the Smart- Wall Network Threat Defense appliance for DDoS attack mitigation. Then, clean traffi c fl ows back to the SmartWall Bypass appliance and passes through the router and switch to hosted servers. The Internet link is fully protected from DDoS attacks all the way down to the servers. The routers, switches, fi rewalls, hypervisors and any other security layers located below the Corero equipment are protected from DDoS attacks and cyber threats. High-Availability Unlike scrubbing-only solutions, this scenario also provides symmetric protection capabilities for both directions of the network traffi c which enables signifi cantly more precise detec-tion and mitigation. Additionally, all outbound traffi c can be inspected by the SmartWall Network Threat Defense appliance for DDoS attack mitigation purposes. In the remote event that the SmartWall Network Threat Defense appliance fails, the SmartWall Bypass appliance would detect the lack of a heartbeat and subsequently close the bypass, maintaining the connection from the Internet to the router and triggering an alert to the Corero Management Server (CMS) to notify operations staff to immediately address the issue. This allows hosting providers to ensure availability while avoiding the risk of the DDoS threat prevention equip-ment ever potentially becoming a blocking element in provid-ing Internet connectivity. Even in the event of a power failure, the SmartWall Bypass appliance will maintain the network con-nection; another safeguard for ensuring high availability. This solution has no blocking elements and no single point of failure; it allows hosting providers the ability to deliver full, high availability protected links that insulate hosting providers and their customers from the ravages that DDoS can deliver.
  • 6. ACTIVE/ACTIVE HIGH-AVAILABILITY LINK PROTECTION This deployment scenario allows hosting providers to benefi t from active/active redundant link protection, and is an added level of resiliency to protect against a single link failure. The SmartWall Network Threat Defense appliances are deployed below the router. One active link is connected to each of the appliances from the router, and traffi c can be distributed across the SmartWall appliances using the standard Link Aggregation Control Protocol (LACP) or any other standard load sharing mechanism. SmartWall appliances are transparent, so they can be deployed in a manner that does not affect any of the pro-tocols Hosting Provider Playbook 6 utilized in the link sharing function. Active/Active High-Availability Link Protection This deployment demonstrates that if a hosting provider loses a single link that the remaining active link will continue running live until the failed link is recovered. Optical bypass can optionally be deployed in this scenario to increase the availability of this solution. The scenario pictured does not offer protection for the router—but the SmartWall appliances could just as easily be deployed in an active/active scenario above the router and utilize Equal Cost Multi-Path (ECMP) routing to achieve similar result with the added benefi t of protecting the router.
  • 7. Scaled DDoS Security Array 100 Gbps Line Rate DDoS 10X SmartWall® Threat Defense System A DDoS security array offers hosting providers the ability to implement highly scalable, inline DDoS attack mitigation with N+1 redundancy and is ideal for large providers and providers with fast-growing Internet bandwidth. GAINING VISIBILITY INTO DDOS ATTACKS Hosting Provider Playbook 7 SCALED DDOS SECURITY ARRAY This is an example of a large implementation that requires a scaled DDoS security array to protect a 100 Gbps Ethernet connection. The hosting provider delivers 100 Gbps DDoS protection by deploying 10 SmartWall Network Threat Defense ap-pliances and using the link aggregation capabilities in the switches to distribute the 100 Gbps Ethernet connection to multiple 10 Gbps links. Corero offers hosting providers and data center operators comprehensive visibility into DDoS attacks and cyber threats that that can be integrated into existing operational support system (OSS) infrastructure utilizing a fl exible GUI, a powerful CLI and a full REST API that allows integration with multiple management options. Hosting providers can rely on a single pane of glass for automated provisioning and reporting of events and alarms, and develop web portals to share monitoring and DDoS miti-gation information with hosting customers.
  • 8. A signifi cant challenge facing many organizations is how to extract meaningful real-time information on DDoS attacks and cyber threats from volumes of security events. To date, only minimal visibility into these classes of security events has been available, and only to organizations with signifi cant investments in analytics tools and expert security staff; and in any case hosting providers and their customers are left to react to the threats after the damage has been done. SecureWatch® Analytics is a powerful web-based security analytics portal that delivers comprehensive and easy-to-read se-curity dashboards based on DDoS tailored security feeds from Corero First Line of Defense products. Large hosting providers and their enterprise customers can benefi t from the targeted granular DDoS event data they have been lacking that comple-ments their security event monitoring practice. All users benefi t from the turn-key SecureWatch Analytics portal that delivers unprecedented DDoS and cyber threat visibility without requiring dedicated security analysts to sift through reams of unintelli-gible log data. SecureWatch Analytics is powered by Splunk, and it provides a portal that transforms the sophisticated Corero security feeds into dashboards of actionable security intelligence, exposing: Security Visibility GAINING VISIBILITY INTO DDOS ATTACKS (cont.) Empowered by this enhanced visibility, hosting providers can utilize SecureWatch Analytics to visualize and mitigate DDoS attacks and cyber threats. Additionally, Splunk customers that have the SmartWall Threat Defense System can access the DDoS Analytics for SmartWall® App from Splunk Base, allowing for seamless integration within their existing Splunk reporting and analytics environment. Hosting providers can also utilize the SmartWall Network Forensics appliance to capture packet fl ow data to disk at 10 Gbps line rates to gain forensic visibility into network traffi c, with storage of captured data distributed to iSCSI arrays via dual 10 Gbps network interfaces. It provides line-rate Internet traffi c capture to support visibility into DDoS attacks and cyber threats. Hosting providers can capture the necessary data to feed historical analysis of cyber threat activity, including identifi cation of attack vectors, fi ngerprinting attacker identity, breach characterization as well as intelligence gathering for preparation against emerging threats. Hosting Provider Playbook 8 • Refl ective amplifi ed DDoS attacks • Targeted application layer attacks • Under the radar low and slow attacks • Victim servers, ports, and services • Malicious IP addresses and botnets
  • 9. CREATING ADDITIONAL REVENUE STREAMS Hosting providers have an obligation to their customers to adequately protect them against DDoS attacks. Enterprise custom-ers don’t want to move their unprotected services to an unprotected cloud, so hosting providers have the opportunity to differ-entiate their services through their DDoS security infrastructure. Before customers consider migrating to hosted services, they need to be sure that their provider has adequate First Line of Defense DDoS protection measures in place. As more organizations migrate critical applications and services to hosted environments, the premium placed on security is becoming increasingly important. Hosting providers that can document and demonstrate the value of their DDoS mitigation capabilities can position themselves to offer tiered services with premium pricing based on the level of advanced DDoS mitiga-tion Hosting Provider Playbook 9 capabilities a customer requires. With First Line of Defense protection from Corero, providers can offer cleaner transport streams that are better protected from volumetric DDoS attacks. Providers are now enabled to offer creative new offerings, such as DDoS and cyber threat protection, enhanced security SLAs as well as visibility and reporting through an analytics portal that can be leveraged as a comprehensive virtual Security Operations Center (SOC). This allows hosting providers the opportunity to to provide managed DDoS security services, such as 24x7 monitoring, alerting and reporting. The SmartWall Network Forensics appliance also offers hosting pro-viders the ability to offer packet capture and retrieval as a value added security service to their customers. Without advanced DDoS mitigation capabilities, providers risk losing customers and potential damage to their brand that may not be recoverable. By turning to a next-generation architecture with advanced DDoS and cyber threat protection—coupled with comprehensive visibility through analytics and reporting—hosting providers are now calling the plays for thwarting DDoS attacks. Hosting providers deploying this purpose-built First Line of Defense against cyber threats will be able to not only mini-mize churn but also create incremental revenue streams and longer-lasting customer relationships. IMPLEMENTING 5 STEPS FOR DDOS PROTECTION Hosting providers can re-write the defense against DDoS attacks, while enhancing their business models and building more profi table and longer-lasting relationships with their hosted customers. The following are a few clear actions that can change the playing fi eld for improving DDoS protection: Deliver Comprehensive DDoS Protection: Enterprises rely on their providers to ensure availability and ulti-mately protection against DDoS attacks and cyber threats. With a First Line of Defense against DDoS attacks deployed, providers are protecting their customers from damaging volumetric threats directed at or originating from or within the networks. Improve Visibility into DDoS Threats: Hosting providers need clear visibility into the threats facing their infrastructure. Real-time reporting and alarm and event integration with back-end OSS infrastructure enables fast reaction times, scalable implementations and the analytics needed to understand the threat condition and proactively improve DDoS security. Implement Real-time Defense: Providers need to change the play from deploying devices to monitor threats and generate alerts requiring manual/human intervention to deploying appliances that both monitor and mitigate DDoS threats automatically. Hosting providers can eliminate the delays incurred between the time a monitoring device detects a threat, generates an alert and an operator is able to respond. Enable Premium Services: Hosting providers can offer baseline DDoS mitigation services to all customers, but for those customers who place a premium on high availability the provider can create value-added options and build incremental revenue streams while strengthening their brand. Move Inline Quickly: If providers employ out-of-band devices in place to scrub traffi c, deploy inline threat de-tection equipment that can inspect, analyze and respond to DDoS threats in real-time as soon as possible. Doing so allows you to protect higher-value assets and continue to leverage the legacy out-of-band devices as long as the provider can fi nd a productive use for them. Inline threat detection is the only option for real-time mitigation. If scrubbing remains the preferred scenario for the organization, evaluate DDoS prevention solutions that support both scrubbing and inline DDoS prevention to future-proof the deployment. 1. 2. 3. 4. 5.
  • 10. DO-NO-HARM As providers implement each of these 5 steps for DDoS protection, always remember to do-no-harm. One of the failings of traditional scrubbing center deployments is that they have not been architected with suffi cient performance capabilities to execute their duties at line rate. They have been relegated to scrubbing center deployments where the solution can do the least amount of damage in the event of false positives. Providers should invest in a DDoS defense solution that is designed to never drop good traffi c. Corero has architected the SmartWall TDS to allow the highest possible performance for DDoS attack and cyber threat protection without incurring any false positives. Providers need to have these capabilities in place to differen-tiate between good and bad traffi c, and respond accordingly—always allowing the good traffi c to pass un-interrupted. Do-No-Harm Architecture Good trafc Known Bad Suspicious Inspect/Drop/Transmit per Customer Policy Known Good Protect Network Threat Defense Appliances {Mitigate Do-no-harm protection ensures good traf c will always get though Inspect/Drop per Active Rules and Transmit The Corero SmartWall Threat Defense System can be deployed inline or as an out-of-band scrubbing solution to offer hosting providers and data center operators DDoS attack mitigation and protection against a continuously evolving spectrum of DDoS attacks. Hosting providers and data center operators can enhance defense-in-depth security architectures with an additional layer of security capable of inspecting traffi c arriving from the Internet at line rate, in real time. Corero is an industry leader with over 500 active customers and over 8,000 units shipped. ABOUT CORERO NETWORK SECURITY Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online enterprises, service providers, hosting providers, and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffi c and enforc-ing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, fl exible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com. Hosting Provider Playbook 10 Network Bypass Appliances Overload Protect Monitor Logical Bypass {Layer 2 Insert Layer 2 Bypass / TAP Optical Bypass (ZBP) Corporate Headquarters EMEA Headquarters 1 Cabot Road Regus House, Highbridge, Oxford Road Hudson, MA 01749 USA Uxbridge, England Phone: +1.978.212.1500 UB8 1HR, UK Web: www.corero.com Phone: +44.0.1895.876579 Copyright 2014 Corero Network Security, Inc. All rights reserved. 867-5309-001