SlideShare a Scribd company logo
1 of 27
Download to read offline
How To Take Your DDoS Protection To The
Next Level
Presenters
Tim Fong
Product Marketing Manager
John Esterline
Solutions Engineer
Agenda
● The new DDoS landscape
● A little known way attackers can bypass traditional DDoS protections
● Why TCP services may make you vulnerable to a DDoS attack
● Pros and cons of multiple solutions: BGP, MPLS, and building your own
● How to augment Cloudflare’s unmetered DDoS solution with
Spectrum, Rate Limiting, and Argo Tunnel
Poll #1
Have you experienced a DDoS attack in the past year?
● No, but I want DDoS protection
● No, and I already have enough DDoS protection to my site
● Yes, and I want to take my DDoS protection to the next level
● Yes, but I don’t think it will happen to my site again
The New DDoS Landscape
Volumetric DNS Flood
Bots
DNS Server
DNS Server Server
Amplification (Layer 3 & 4)
HTTP Flood (Layer 7)
1
2
Bots
3
Bots
Degrades availability and performance of applications, websites, and APIs
HTTP
Application
Application/Login
Types of DDoS Attack Traffic
In-Depth
In-Depth
DNS Attacks Continue To Be Infrequent
7
Unmetered
Mitigation
Introduced
1.7
Tbps
DDoS 2018 and Beyond
More
Frequent
Difficult to
Mitigate
DNS
Layer 7
SSL CPU
Exhaustion
(Layer 6)
HTTP
Layer 7
Layer 3/4
500
Gbps
100
Gbps
200
Gbps
40
Gbps
Smaller, target L7 attacks are proving to be more difficult for the industry than L3/4
Less
Frequent
9
Globally distributed (128,833 IPs)
Say Cheese: a
snapshot of the
massive DDoS attacks
coming from IoT
cameras:
128,000+ unique IP’s
220k rps
360 Gbps
IoT DDoS / Attack Case Study
CHALLENGES
• DDoS mitigation systems are tuned to handle volumetric L3/4 attacks; in this instance attackers switched
to L7 attacks in an attempt to knock web applications offline
• Unlike volumetric L3/4 attacks, HTTP-based attacks eat up resources by making actual HTTP requests to
the attacked server.
• These attacks came from Internet-of-Things (IoT) category of devices
CLOUDFLARE SOLUTION
• Seeing the move towards L7 DDoS attacks we put in place a new system that recognizes and blocks these
attacks as they happen. The L7 mitigator recognizes attacks against a single host and distributes a
fingerprint that protects all Cloudflare customers.
Attacks
Blog Post:
https://blog.cloudflare.com/say-cheese-a-snaps
hot-of-the-massive-ddos-attacks-coming-from-i
ot-cameras/
The attack lasted 15 minutes with over 1 million HTTP
RPS (Requests Per Second)
The First Attack
This attack had 128,833 unique IP addresses. It
generated only 220k RPS, but topped out at a high 360
Gbps bandwidth
The Second Attack
11
Poll #2
Do you run services (SSH, FTP, SharePoint, SMTP, etc.) other than HTTP/S traffic on your origin?
● Yes
● No
Traditional DDoS Mitigation Solutions
Industry Legacy Scrubbing Center
Pre-Attack Attack Begins Mitigation
Implemented
14
12:05 12:15 12:2012:00
Attack Detected
Alternative DDoS Mitigation Solutions
Cloudflare’s Always-On DDoS Mitigation
Automatic Mitigation
16
12:0512:00 12:05
Real-Time DetectionContinuous Performance Benefit
Other DDoS Attack Vectors
Volumetric attacks on TCP-based services
Attackers send direct volumetric attack traffic to
TCP-based services like email or remote access,
impacting performance and availability.
DDoS Attack
Customer Challenges
Non-HTTP/S
TCP Attack Traffic
SSH
Snooping Attempt on clear-text TCP
Attackers snoop non-web, unencrypted
traffic to gain access to sensitive data, such
as user credentials.
Data Theft
SMTP
SFTP
SSH
SMTP
SFTP
Snooping of
Unencrypted Data
in-Transit
Cloudflare Spectrum
Proxy non-HTTP/S TCP traffic through Cloudflare
Mitigate DDoS for TCP Protocols and Ports
Cloudflare Spectrum proxies all non-HTTPS TCP traffic through
the same 120+ cloudflare data centers, ensuring protection
against DDoS attacks targeting layers 3 and 4 across open ports.
Encrypt Non-HTTP/S TCP Traffic
Cloudflare Spectrum encrypts non-HTTP/S TCP traffic with
Universal SSL to protect against snooping of data in transit.
Block Traffic by IP or IP Range
Spectrum integrates with Cloudflare’s IP Firewall so that traffic
from specific IP or IP ranges can be dropped at the edge
C
loudflare
Spectrum
2
1
Client
Encrypted
TCP Traffic
SSH
SMTP
SFTP
SSH
SMTP
SFTP
3
Client
SSH
SMTP
SFTP
IP
10.0.0.1
10.0.0.1
https://developers.cloudflare.com/spectrum/
Spectrum Demo
Direct Attack against Origin IP
Attackers directly attack the origin IP address.
DDoS Data Theft
Intrusion Attempt Directly on Origin
Applications exposed to the public Internet through the IP
address can be brute-forced to access sensitive data.
206.221.179.46
206.221.179.46
Brute Force
Attack stopped by
Cloudflare proxy
Direct Attack against Origin IP
Attack bypasses proxy to
hit IP address directly
Attack stopped by
Cloudflare proxy
Attack bypasses proxy to
hit IP address directly
Cloudflare Argo Tunnel
Stop Direct Attacks Against the Web Server’s Origin with a Secure Agent
Protect web servers from DDoS attacks directly against their
origin’s public IP address
When connected directly to Cloudflare, web servers can no longer be
directly attacked through open ports on public IP addresses with DDoS
or data theft attempts, keeping applications and APIs online and
performant.
Safely and easily expose development environments to the
Internet
Developers can expose the localhost on their laptop directly to the
public Internet for testing code and speeding up development, while
also being protected from attacks.
Accelerate Origin Traffic
Argo Tunnels not only protects web servers from direct attacks, but also
accelerates origin requests through a persistent HTTP/2 connection.
With Argo Smart routing, origin requests bypass congested networks
and are routed on the shortest network distance to ensure fast delivery.
Argo
Tunnel
2
1
3
localhost
HTTP/2
206.221.179.46
Argo Tunnel Demo
The Long Tail of “Layer 7” Attacks
Site Rank
Capacity(HTTPrequestspersecond)
Cloudflare Rate Limiting
Precise DDoS Mitigation
• High precision denial-of-service protection
through robust configuration options
Protect Customer Data
• Protect sensitive customer information
against brute force login attacks
Ensure Availability
• Avoid service disruptions by setting usage
limits on HTTP requests
Requests per IP address matching the traffic pattern
25
Rate Limiting Demo
Questions?
➔ John: jesterline@cloudflare.com
➔ Tim: fongster@cloudflare.com

More Related Content

More from Cloudflare

Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflare
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Webinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseWebinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseCloudflare
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesCloudflare
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internetCloudflare
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyCloudflare
 

More from Cloudflare (20)

Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Webinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseWebinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in Japanese
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

How To Take Your DDoS Protection To The Next Level

  • 1. How To Take Your DDoS Protection To The Next Level
  • 2. Presenters Tim Fong Product Marketing Manager John Esterline Solutions Engineer
  • 3. Agenda ● The new DDoS landscape ● A little known way attackers can bypass traditional DDoS protections ● Why TCP services may make you vulnerable to a DDoS attack ● Pros and cons of multiple solutions: BGP, MPLS, and building your own ● How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • 4. Poll #1 Have you experienced a DDoS attack in the past year? ● No, but I want DDoS protection ● No, and I already have enough DDoS protection to my site ● Yes, and I want to take my DDoS protection to the next level ● Yes, but I don’t think it will happen to my site again
  • 5. The New DDoS Landscape
  • 6. Volumetric DNS Flood Bots DNS Server DNS Server Server Amplification (Layer 3 & 4) HTTP Flood (Layer 7) 1 2 Bots 3 Bots Degrades availability and performance of applications, websites, and APIs HTTP Application Application/Login Types of DDoS Attack Traffic In-Depth In-Depth
  • 7. DNS Attacks Continue To Be Infrequent 7 Unmetered Mitigation Introduced
  • 9. DDoS 2018 and Beyond More Frequent Difficult to Mitigate DNS Layer 7 SSL CPU Exhaustion (Layer 6) HTTP Layer 7 Layer 3/4 500 Gbps 100 Gbps 200 Gbps 40 Gbps Smaller, target L7 attacks are proving to be more difficult for the industry than L3/4 Less Frequent 9
  • 11. Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras: 128,000+ unique IP’s 220k rps 360 Gbps IoT DDoS / Attack Case Study CHALLENGES • DDoS mitigation systems are tuned to handle volumetric L3/4 attacks; in this instance attackers switched to L7 attacks in an attempt to knock web applications offline • Unlike volumetric L3/4 attacks, HTTP-based attacks eat up resources by making actual HTTP requests to the attacked server. • These attacks came from Internet-of-Things (IoT) category of devices CLOUDFLARE SOLUTION • Seeing the move towards L7 DDoS attacks we put in place a new system that recognizes and blocks these attacks as they happen. The L7 mitigator recognizes attacks against a single host and distributes a fingerprint that protects all Cloudflare customers. Attacks Blog Post: https://blog.cloudflare.com/say-cheese-a-snaps hot-of-the-massive-ddos-attacks-coming-from-i ot-cameras/ The attack lasted 15 minutes with over 1 million HTTP RPS (Requests Per Second) The First Attack This attack had 128,833 unique IP addresses. It generated only 220k RPS, but topped out at a high 360 Gbps bandwidth The Second Attack 11
  • 12. Poll #2 Do you run services (SSH, FTP, SharePoint, SMTP, etc.) other than HTTP/S traffic on your origin? ● Yes ● No
  • 14. Industry Legacy Scrubbing Center Pre-Attack Attack Begins Mitigation Implemented 14 12:05 12:15 12:2012:00 Attack Detected
  • 16. Cloudflare’s Always-On DDoS Mitigation Automatic Mitigation 16 12:0512:00 12:05 Real-Time DetectionContinuous Performance Benefit
  • 17. Other DDoS Attack Vectors
  • 18. Volumetric attacks on TCP-based services Attackers send direct volumetric attack traffic to TCP-based services like email or remote access, impacting performance and availability. DDoS Attack Customer Challenges Non-HTTP/S TCP Attack Traffic SSH Snooping Attempt on clear-text TCP Attackers snoop non-web, unencrypted traffic to gain access to sensitive data, such as user credentials. Data Theft SMTP SFTP SSH SMTP SFTP Snooping of Unencrypted Data in-Transit
  • 19. Cloudflare Spectrum Proxy non-HTTP/S TCP traffic through Cloudflare Mitigate DDoS for TCP Protocols and Ports Cloudflare Spectrum proxies all non-HTTPS TCP traffic through the same 120+ cloudflare data centers, ensuring protection against DDoS attacks targeting layers 3 and 4 across open ports. Encrypt Non-HTTP/S TCP Traffic Cloudflare Spectrum encrypts non-HTTP/S TCP traffic with Universal SSL to protect against snooping of data in transit. Block Traffic by IP or IP Range Spectrum integrates with Cloudflare’s IP Firewall so that traffic from specific IP or IP ranges can be dropped at the edge C loudflare Spectrum 2 1 Client Encrypted TCP Traffic SSH SMTP SFTP SSH SMTP SFTP 3 Client SSH SMTP SFTP IP 10.0.0.1 10.0.0.1 https://developers.cloudflare.com/spectrum/
  • 21. Direct Attack against Origin IP Attackers directly attack the origin IP address. DDoS Data Theft Intrusion Attempt Directly on Origin Applications exposed to the public Internet through the IP address can be brute-forced to access sensitive data. 206.221.179.46 206.221.179.46 Brute Force Attack stopped by Cloudflare proxy Direct Attack against Origin IP Attack bypasses proxy to hit IP address directly Attack stopped by Cloudflare proxy Attack bypasses proxy to hit IP address directly
  • 22. Cloudflare Argo Tunnel Stop Direct Attacks Against the Web Server’s Origin with a Secure Agent Protect web servers from DDoS attacks directly against their origin’s public IP address When connected directly to Cloudflare, web servers can no longer be directly attacked through open ports on public IP addresses with DDoS or data theft attempts, keeping applications and APIs online and performant. Safely and easily expose development environments to the Internet Developers can expose the localhost on their laptop directly to the public Internet for testing code and speeding up development, while also being protected from attacks. Accelerate Origin Traffic Argo Tunnels not only protects web servers from direct attacks, but also accelerates origin requests through a persistent HTTP/2 connection. With Argo Smart routing, origin requests bypass congested networks and are routed on the shortest network distance to ensure fast delivery. Argo Tunnel 2 1 3 localhost HTTP/2 206.221.179.46
  • 24. The Long Tail of “Layer 7” Attacks Site Rank Capacity(HTTPrequestspersecond)
  • 25. Cloudflare Rate Limiting Precise DDoS Mitigation • High precision denial-of-service protection through robust configuration options Protect Customer Data • Protect sensitive customer information against brute force login attacks Ensure Availability • Avoid service disruptions by setting usage limits on HTTP requests Requests per IP address matching the traffic pattern 25