Securing your
infrastructure:
Luxury or Must
have?
Roee Besser Technical Manager www.allot.com May 2015
The Cyberspace is unsafe
1
* Source: http://map.ipviking.com/
Who is the Enemy?
Motives:
 Ego
 Hactivism
 Revenge
 Personal and Commercial Profit
Bringing a Civilization to Its Knees…
2
Cyber Warfare
SPAMHOUS DNS DDOS
March 2013
"A 17 year old male from
London was arrested in April
2013 after a series of
distributed denial of service
(DDoS) attacks which led to
worldwide disruption of
internet exchanges and
services. "
knocking PlayStation
Network (PSN) and Xbox
Live offline
December 2014
One group, Lizard Squad,
has claimed responsibility
for the outages. They teased
plans to do this despite a
rival group, The Finest,
claiming they'd be able to
stop them.
2007 cyberattacks on
Estonia
On March 2009 , a
"commissar" of the Kremlin-
backed youth group Nashi,
has claimed responsibility for
the attack.
What Are The Main Threats?
• Worms
• Zero day attacks
• DDosS attacks
• Spam
• Zombies and Botnets
3
4
The World is changing
Enterprises migrated to Hybrid Cloud
6
Private Cloud
Applications
At Home
On the Road
Users
On Campus
In the Branch
ALWAYS CONNECTED
Public Cloud
The Internet is the new IT
Ensuring Availability, Performance & Security across Clouds
WAN
INTERNET
B
Y
O
D
24/7
Emerging SECaaS
6
“Security as a Service refers to the
provision of security applications and
services via the cloud either to cloud-
based infrastructure and software or
from the cloud to the customers’ on
premise systems.”
* CSA SecaaS Working Group “Defined Categories of Service 2011”
7
What is Required?
Richest Intelligence Directly from the Wire
8
Broadband
Experience Analytics User ControlRegulatory
Compliance
Security Intelligence Control & Care
Mobile
SIEM
Operations
Intelligence
Private Cloud
Public Cloud
Internet
Applications
Users
At Home
On the Road
In the Branch
On Campus
USER LOCATION ENDPOINT NETWORK CONTENT APPLICATION
Actionable Security –
URL Filtering – Black List, White List
Categorized Content Filtering
Anti Virus/Malware
User
Access to this
website is forbidden!
HTTP  WAP
www.illegalcontent.com
9
– Web & Mail Protection
SMTP  POP3
Access to this
website is forbidden!
Access to this
website is forbidden!
1st Filter
URL
Blacklist
2nd Filter
Full URL
Categorization
3rd Filter
Virus/Malware
Protection
Actionable Security –
10
Anti-DDoS as a
Service
Audit User
Activity
•NBAD
•DDOS
•Scanning
– DDoS Protection
•HBAD
•Spammers and blacklisted IPs
•Scanning
•DOS
- Network Based Anomaly Detection
- Host Based Anomaly Detection
11
Real UseCase
True story – an ISP in Spain
12
NBAD: 3 Events over a weekend
True story – an ISP in Spain
13
NBAD: UDP Flood DDoS Attack (I)
• Bandwidth wasting flood – 8.32G
• High packet rate – 197Kpps
• payload
True story – an ISP in Spain
14
NBAD: UDP Flood DDoS Attack (III
• You can see here payload of the packet and also the target host:
•5.34.135.36 (dynamic.user.wimaxonline.es)
True story – an ISP in Spain
15
NBAD: UDP Flood DDoS Attack (III)
• Top Attackers with the IP address and reverse resolution along with the
amount of traffic sent.
•Only one internal host attacked.
True story – an ISP in Spain
16
NBAD: Fragmented Traffic Flood(I)
• Bandwidth wasting flood – 11.0G
• High packet rate – 83.7Kpps
• Rubbish payload
True story – an ISP in Spain
17
NBAD: Fragmented Traffic Flood(II)
• See the pattern of an attack. Pay attention to the payload … “flood” 
Securing the Enterprise
in the Cloud Era and
the User in a Mobile
World
Contact Allot to Learn More
www.allot.com

Network Security - Luxury or Must Have?

  • 1.
    Securing your infrastructure: Luxury orMust have? Roee Besser Technical Manager www.allot.com May 2015
  • 2.
    The Cyberspace isunsafe 1 * Source: http://map.ipviking.com/
  • 3.
    Who is theEnemy? Motives:  Ego  Hactivism  Revenge  Personal and Commercial Profit Bringing a Civilization to Its Knees… 2 Cyber Warfare SPAMHOUS DNS DDOS March 2013 "A 17 year old male from London was arrested in April 2013 after a series of distributed denial of service (DDoS) attacks which led to worldwide disruption of internet exchanges and services. " knocking PlayStation Network (PSN) and Xbox Live offline December 2014 One group, Lizard Squad, has claimed responsibility for the outages. They teased plans to do this despite a rival group, The Finest, claiming they'd be able to stop them. 2007 cyberattacks on Estonia On March 2009 , a "commissar" of the Kremlin- backed youth group Nashi, has claimed responsibility for the attack.
  • 4.
    What Are TheMain Threats? • Worms • Zero day attacks • DDosS attacks • Spam • Zombies and Botnets 3
  • 5.
  • 6.
    Enterprises migrated toHybrid Cloud 6 Private Cloud Applications At Home On the Road Users On Campus In the Branch ALWAYS CONNECTED Public Cloud The Internet is the new IT Ensuring Availability, Performance & Security across Clouds WAN INTERNET B Y O D 24/7
  • 7.
    Emerging SECaaS 6 “Security asa Service refers to the provision of security applications and services via the cloud either to cloud- based infrastructure and software or from the cloud to the customers’ on premise systems.” * CSA SecaaS Working Group “Defined Categories of Service 2011”
  • 8.
  • 9.
    Richest Intelligence Directlyfrom the Wire 8 Broadband Experience Analytics User ControlRegulatory Compliance Security Intelligence Control & Care Mobile SIEM Operations Intelligence Private Cloud Public Cloud Internet Applications Users At Home On the Road In the Branch On Campus USER LOCATION ENDPOINT NETWORK CONTENT APPLICATION
  • 10.
    Actionable Security – URLFiltering – Black List, White List Categorized Content Filtering Anti Virus/Malware User Access to this website is forbidden! HTTP WAP www.illegalcontent.com 9 – Web & Mail Protection SMTP POP3 Access to this website is forbidden! Access to this website is forbidden! 1st Filter URL Blacklist 2nd Filter Full URL Categorization 3rd Filter Virus/Malware Protection
  • 11.
    Actionable Security – 10 Anti-DDoSas a Service Audit User Activity •NBAD •DDOS •Scanning – DDoS Protection •HBAD •Spammers and blacklisted IPs •Scanning •DOS - Network Based Anomaly Detection - Host Based Anomaly Detection
  • 12.
  • 13.
    True story –an ISP in Spain 12 NBAD: 3 Events over a weekend
  • 14.
    True story –an ISP in Spain 13 NBAD: UDP Flood DDoS Attack (I) • Bandwidth wasting flood – 8.32G • High packet rate – 197Kpps • payload
  • 15.
    True story –an ISP in Spain 14 NBAD: UDP Flood DDoS Attack (III • You can see here payload of the packet and also the target host: •5.34.135.36 (dynamic.user.wimaxonline.es)
  • 16.
    True story –an ISP in Spain 15 NBAD: UDP Flood DDoS Attack (III) • Top Attackers with the IP address and reverse resolution along with the amount of traffic sent. •Only one internal host attacked.
  • 17.
    True story –an ISP in Spain 16 NBAD: Fragmented Traffic Flood(I) • Bandwidth wasting flood – 11.0G • High packet rate – 83.7Kpps • Rubbish payload
  • 18.
    True story –an ISP in Spain 17 NBAD: Fragmented Traffic Flood(II) • See the pattern of an attack. Pay attention to the payload … “flood” 
  • 19.
    Securing the Enterprise inthe Cloud Era and the User in a Mobile World Contact Allot to Learn More www.allot.com