SlideShare a Scribd company logo
1 of 20
www.eduserv.org.uk
Surviving a DDoS Attack
Matt Johnson, Head of Research, Eduserv
January 2015
Agenda
 Background
 Diary of the DDoS
 Attack profiles & social media
 Analysis and solution overview
 Costs
 Lessons learned
 Q&A
Background
 Eduserv is a registered charity providing IT services to
public good organisations
 Operates primary services from our Swindon datacentre,
secondary and DR services from Slough / London
 Providing hosting services since 1996
 IT services customer base
 20+ customers, across government, health, education and the
charity sectors
 Some of the government customers are high-profile targets
Day 1
 Initial attack was seen on Sunday evening
 Lasted around 2 hours
 Attack was TCP-based, volumetric, probably HTTP-based
 Primary sources in Brazil, Canada
 Attack claimed by hacker via Twitter
Day 2
 Second attack on Monday afternoon
 Against a range of Govt. websites
 Attack was UDP-based
 Probably DNS-amplification
 Diverse source addresses
 1 hour DoS for a number of customers
 Damage limitation
 Re-address and black-hole the address block
of the targeted website services
 “One sacrificed to save the many”
Day 3
 Attacked website brought back online
 Separate ISP link to mitigate impact to other
services
 DDoS attacks resumed immediately
 Web service was a 3rd party legacy build, with
poor support for caching
 HTTP volumetric based attack overwhelmed
web server cluster
Attack Methods
 Range of attack methods used
 Low Orbit Ion Cannon (LOIC), High Orbit Ion Cannon (HOIC)
 DNS Amplification, HTTP Idle Attacks,
 Scale of the attack
 Bandwidth peak estimated >5 Gbps
 200+ malformed requests p/sec (normally 2-3 requests p/sec)
 Lack of support from upstream ISP for real-time blocking
 Without this support, in a volumetric attack, hands are tied
Social Media
 Many attackers like to promote their “work” – can give an
early insight into what’s happening (or about to happen)
 Don’t believe everything you read 
Incident Analysis
 Incident Response Team formed
 Multi-disciplinary teams – can bring new insight into solutions
 Whiteboard-based evaluation of options
 Continual comms with the impacted customer
 Possible solutions
 Block or disable attacking platforms at source
 Rebuild the web service to cope with the additional workloads
 Filter the DDoS traffic whilst allowing legitimate requests
Starting Situation
attack attack attack attack
attack attack attack attack
web
firewalls
routers
www.customer.gov.uk
user
www.customer.gov.uk
Proposed Solution
web
firewalls
routers
Proxy-2LogServer
Load Bal.
Proxy-1
attack attack attack attack
attack attack attack attack
safe.customer.gov.uk
user
Black Hole
www.customer.gov.uk
Web Proxy in the Cloud
 Cloud provider choice – Amazon Web Services
 Already had expertise in deploying AWS services
 Huge bandwidth capacity (estimated at 600 Gbps+)
 AWS Marketplace offers quick deployment of application servers
 Proxy choice - AiCache
 Reviewed options in the AWS Marketplace
 AiCache seemed to deliver the functionality required
 Available on a PAYG basis with no up-front licensing commitments
 Configured and implemented inside of 4 hours
Enabling DDoS protection
Total HTTP
requests
Valid HTTP
requests
Bad HTTP
requests
DDoS
protection
enabled
Enabling IP Throttling
Initial (Test)
IP throttling
started
Initial (Test)
IP throttling
finished
Full IP
Throttling
enabled
Traffic profile before and after proxy implementation
Initial DDoS
causing
outages
Ongoing
DDoS – proxy
in place
Normal traffic
profile
Costs
 IT costs: £350, comprising:
 AWS: 150 GB of data transfer, load-balancing; 2 large VMs; 100
GB of data storage: ~$270 over 14 days
 AiCache: 2 licences & support: $280, again over 14 days
 People costs: £25k, comprising
 Incident response: ~£15k
 Incident analysis: ~£10k
 Indirect costs: ~£20k
 Impact on customer services, 3rd party effort, opportunity costs
Lessons Learned
 Bandwidth is king
 In a sustained attack, whoever has the most, wins
 DNS flexibility is vital
 Having a well-architected DNS infrastructure allows you to change
service endpoints quickly in response to targeted attacks
 Make sure you have a diverse route into your DNS management
 Watch social media
 Can often give you insights into upcoming attacks, motivation
 Log everything
 Never know what might be needed to support further investigations
AWS Learning
 Amazon CloudWatch
 Useful near-real time insight into DDoS traffic (via ELB metrics)
 Provided evidence for the criminal investigation
 Only stores data for 2 weeks – grab the data whilst you can
 Needed to write custom CLI/API scripts to extract CloudWatch data
 Really could do with a built-in data export capability!
 AWS Elastic Load Balancer
 Partially mitigated some of the DDoS attack vectors
 Supports X-Forwarded-For (XFF) header to track originating IPs
AWS Learning
 EC2 capabilities
 AWS offers an incredibly easy way to tap into huge data pipes
 Incoming bandwidth is free… useful in DDoS situations
 Route53 is great!
 Supports simple mapping of Zone Apex to ELB target
 Geo-distributed endpoints make it incredibly quick and reliable
 Amazon Marketplace
 Great source of pre-configured AWS-ready services
 Use it!
Thank you! Questions?
 Matt Johnson
 Matt.Johnson@eduserv.org.uk
 @mhj_work
 www.eduserv.org.uk
 www.slideshare.net/eduserv

More Related Content

What's hot

SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsNexgen Technology
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core SecurityCore Security
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEIJNSA Journal
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issuesJoo Manthar
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storageIEEEFINALYEARPROJECTS
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity Blockchain Council
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storageijtsrd
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Blockchain for network engineers
Blockchain for network engineersBlockchain for network engineers
Blockchain for network engineersBlockchain Council
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 

What's hot (18)

SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Https interception
Https interceptionHttps interception
Https interception
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storage
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Blockchain for network engineers
Blockchain for network engineersBlockchain for network engineers
Blockchain for network engineers
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 

Viewers also liked

OpenAthens Service Provider in the cloud: development update
OpenAthens Service Provider in the cloud: development update OpenAthens Service Provider in the cloud: development update
OpenAthens Service Provider in the cloud: development update Eduserv
 
Information sharing to improve service delivery - Eddie Copeland, Head of tec...
Information sharing to improve service delivery - Eddie Copeland, Head of tec...Information sharing to improve service delivery - Eddie Copeland, Head of tec...
Information sharing to improve service delivery - Eddie Copeland, Head of tec...Eduserv
 
Defra Network Open Working - a CloudStore case study
Defra Network Open Working - a CloudStore case studyDefra Network Open Working - a CloudStore case study
Defra Network Open Working - a CloudStore case studyEduserv
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud servicesEduserv
 
Emerald Health and Social Care 17 April 2015
Emerald Health and Social Care 17 April 2015Emerald Health and Social Care 17 April 2015
Emerald Health and Social Care 17 April 2015Eduserv
 
Eduserv Symposium 2013 - Adapting to an Open Data World
Eduserv Symposium 2013 - Adapting to an Open Data WorldEduserv Symposium 2013 - Adapting to an Open Data World
Eduserv Symposium 2013 - Adapting to an Open Data WorldEduserv
 
UK Space Agency - launching for superior results
UK Space Agency - launching for superior resultsUK Space Agency - launching for superior results
UK Space Agency - launching for superior resultsEduserv
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015Eduserv
 
Using technology to achieve healthcare objecitves
Using technology to achieve healthcare objecitvesUsing technology to achieve healthcare objecitves
Using technology to achieve healthcare objecitvesEduserv
 
Eduserv Symposium 2013 - Advice in the 21st century
Eduserv Symposium 2013 - Advice in the 21st centuryEduserv Symposium 2013 - Advice in the 21st century
Eduserv Symposium 2013 - Advice in the 21st centuryEduserv
 
Martyn Jansen - licence portability workshop
Martyn Jansen - licence portability workshopMartyn Jansen - licence portability workshop
Martyn Jansen - licence portability workshopEduserv
 
CILIP ARLG '12: Measuring impact and quality
CILIP ARLG '12: Measuring impact and qualityCILIP ARLG '12: Measuring impact and quality
CILIP ARLG '12: Measuring impact and qualityEduserv
 
eduGain - Brook Schofield, TERENA
eduGain -  Brook Schofield, TERENAeduGain -  Brook Schofield, TERENA
eduGain - Brook Schofield, TERENAEduserv
 
Our product development methodology
Our product development methodologyOur product development methodology
Our product development methodologyEduserv
 

Viewers also liked (15)

OpenAthens Service Provider in the cloud: development update
OpenAthens Service Provider in the cloud: development update OpenAthens Service Provider in the cloud: development update
OpenAthens Service Provider in the cloud: development update
 
Information sharing to improve service delivery - Eddie Copeland, Head of tec...
Information sharing to improve service delivery - Eddie Copeland, Head of tec...Information sharing to improve service delivery - Eddie Copeland, Head of tec...
Information sharing to improve service delivery - Eddie Copeland, Head of tec...
 
Defra Network Open Working - a CloudStore case study
Defra Network Open Working - a CloudStore case studyDefra Network Open Working - a CloudStore case study
Defra Network Open Working - a CloudStore case study
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
Emerald Health and Social Care 17 April 2015
Emerald Health and Social Care 17 April 2015Emerald Health and Social Care 17 April 2015
Emerald Health and Social Care 17 April 2015
 
Eduserv Symposium 2013 - Adapting to an Open Data World
Eduserv Symposium 2013 - Adapting to an Open Data WorldEduserv Symposium 2013 - Adapting to an Open Data World
Eduserv Symposium 2013 - Adapting to an Open Data World
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
UK Space Agency - launching for superior results
UK Space Agency - launching for superior resultsUK Space Agency - launching for superior results
UK Space Agency - launching for superior results
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015
 
Using technology to achieve healthcare objecitves
Using technology to achieve healthcare objecitvesUsing technology to achieve healthcare objecitves
Using technology to achieve healthcare objecitves
 
Eduserv Symposium 2013 - Advice in the 21st century
Eduserv Symposium 2013 - Advice in the 21st centuryEduserv Symposium 2013 - Advice in the 21st century
Eduserv Symposium 2013 - Advice in the 21st century
 
Martyn Jansen - licence portability workshop
Martyn Jansen - licence portability workshopMartyn Jansen - licence portability workshop
Martyn Jansen - licence portability workshop
 
CILIP ARLG '12: Measuring impact and quality
CILIP ARLG '12: Measuring impact and qualityCILIP ARLG '12: Measuring impact and quality
CILIP ARLG '12: Measuring impact and quality
 
eduGain - Brook Schofield, TERENA
eduGain -  Brook Schofield, TERENAeduGain -  Brook Schofield, TERENA
eduGain - Brook Schofield, TERENA
 
Our product development methodology
Our product development methodologyOur product development methodology
Our product development methodology
 

Similar to Surviving a DDOS Attack

ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS ProvidersNeil Hinton
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacksSaptha Wanniarachchi
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015saifam
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSIJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Sharon Lee
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paperRenny Shen
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)DefCamp
 
ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionmoataz82
 
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...Amazon Web Services
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016TierPoint
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSSuzanne Aldrich
 
Study of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptxStudy of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptxvasep68958
 
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdfSolution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdfمنیزہ ہاشمی
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdffms12345
 

Similar to Surviving a DDOS Attack (20)

ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future direction
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
CRITICAL CHANGES TO SECURITY FOR CLOUD ENVIRONMENTS - Toronto FSI Symposium -...
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Study of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptxStudy of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptx
 
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdfSolution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdf
 
D do s_white_paper
D do s_white_paperD do s_white_paper
D do s_white_paper
 

More from Eduserv

Phase two of OpenAthens SP evolution including OpenID connect option
Phase two of OpenAthens SP evolution including OpenID connect optionPhase two of OpenAthens SP evolution including OpenID connect option
Phase two of OpenAthens SP evolution including OpenID connect optionEduserv
 
Partnership Licensing - allowing access to licensed resources
Partnership Licensing - allowing access to licensed resources Partnership Licensing - allowing access to licensed resources
Partnership Licensing - allowing access to licensed resources Eduserv
 
Lightning talk - EBSCO
Lightning talk - EBSCOLightning talk - EBSCO
Lightning talk - EBSCOEduserv
 
Lightning talk - Boopsie
Lightning talk - BoopsieLightning talk - Boopsie
Lightning talk - BoopsieEduserv
 
Lightning talk - Softlink
Lightning talk - SoftlinkLightning talk - Softlink
Lightning talk - SoftlinkEduserv
 
Lightning talk - Third Iron BrowZine
Lightning talk - Third Iron BrowZineLightning talk - Third Iron BrowZine
Lightning talk - Third Iron BrowZineEduserv
 
Lightning talk - Eduserv Chest Agreements
Lightning talk - Eduserv Chest AgreementsLightning talk - Eduserv Chest Agreements
Lightning talk - Eduserv Chest AgreementsEduserv
 
Phase one of OpenAthens SP evolution
Phase one of OpenAthens SP evolutionPhase one of OpenAthens SP evolution
Phase one of OpenAthens SP evolutionEduserv
 
Key considerations when mapping your end user experience
Key considerations when mapping your end user experienceKey considerations when mapping your end user experience
Key considerations when mapping your end user experienceEduserv
 
How Readers Discover Content
How Readers Discover ContentHow Readers Discover Content
How Readers Discover ContentEduserv
 
OpenAthens product update
OpenAthens product updateOpenAthens product update
OpenAthens product updateEduserv
 
OpenAthens Customer Conference - Welcome address
OpenAthens Customer Conference - Welcome addressOpenAthens Customer Conference - Welcome address
OpenAthens Customer Conference - Welcome addressEduserv
 
Generating leads with content marketing
Generating leads with content marketingGenerating leads with content marketing
Generating leads with content marketingEduserv
 
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016Eduserv
 
Mobius from Maplesoft
Mobius from MaplesoftMobius from Maplesoft
Mobius from MaplesoftEduserv
 
QSR NVivo
QSR NVivo QSR NVivo
QSR NVivo Eduserv
 
How Eduserv are helping local government organisations
How Eduserv are helping local government organisationsHow Eduserv are helping local government organisations
How Eduserv are helping local government organisationsEduserv
 
Is cloud the right fit for your needs?
Is cloud the right fit for your needs?Is cloud the right fit for your needs?
Is cloud the right fit for your needs?Eduserv
 
Planning your cloud strategy: Adur and Worthing Councils
Planning your cloud strategy: Adur and Worthing CouncilsPlanning your cloud strategy: Adur and Worthing Councils
Planning your cloud strategy: Adur and Worthing CouncilsEduserv
 
Software Asset Management and Education
Software Asset Management and EducationSoftware Asset Management and Education
Software Asset Management and EducationEduserv
 

More from Eduserv (20)

Phase two of OpenAthens SP evolution including OpenID connect option
Phase two of OpenAthens SP evolution including OpenID connect optionPhase two of OpenAthens SP evolution including OpenID connect option
Phase two of OpenAthens SP evolution including OpenID connect option
 
Partnership Licensing - allowing access to licensed resources
Partnership Licensing - allowing access to licensed resources Partnership Licensing - allowing access to licensed resources
Partnership Licensing - allowing access to licensed resources
 
Lightning talk - EBSCO
Lightning talk - EBSCOLightning talk - EBSCO
Lightning talk - EBSCO
 
Lightning talk - Boopsie
Lightning talk - BoopsieLightning talk - Boopsie
Lightning talk - Boopsie
 
Lightning talk - Softlink
Lightning talk - SoftlinkLightning talk - Softlink
Lightning talk - Softlink
 
Lightning talk - Third Iron BrowZine
Lightning talk - Third Iron BrowZineLightning talk - Third Iron BrowZine
Lightning talk - Third Iron BrowZine
 
Lightning talk - Eduserv Chest Agreements
Lightning talk - Eduserv Chest AgreementsLightning talk - Eduserv Chest Agreements
Lightning talk - Eduserv Chest Agreements
 
Phase one of OpenAthens SP evolution
Phase one of OpenAthens SP evolutionPhase one of OpenAthens SP evolution
Phase one of OpenAthens SP evolution
 
Key considerations when mapping your end user experience
Key considerations when mapping your end user experienceKey considerations when mapping your end user experience
Key considerations when mapping your end user experience
 
How Readers Discover Content
How Readers Discover ContentHow Readers Discover Content
How Readers Discover Content
 
OpenAthens product update
OpenAthens product updateOpenAthens product update
OpenAthens product update
 
OpenAthens Customer Conference - Welcome address
OpenAthens Customer Conference - Welcome addressOpenAthens Customer Conference - Welcome address
OpenAthens Customer Conference - Welcome address
 
Generating leads with content marketing
Generating leads with content marketingGenerating leads with content marketing
Generating leads with content marketing
 
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016
Pre-launch introduction to the new OpenAthens SP dashboard - 13/09/2016
 
Mobius from Maplesoft
Mobius from MaplesoftMobius from Maplesoft
Mobius from Maplesoft
 
QSR NVivo
QSR NVivo QSR NVivo
QSR NVivo
 
How Eduserv are helping local government organisations
How Eduserv are helping local government organisationsHow Eduserv are helping local government organisations
How Eduserv are helping local government organisations
 
Is cloud the right fit for your needs?
Is cloud the right fit for your needs?Is cloud the right fit for your needs?
Is cloud the right fit for your needs?
 
Planning your cloud strategy: Adur and Worthing Councils
Planning your cloud strategy: Adur and Worthing CouncilsPlanning your cloud strategy: Adur and Worthing Councils
Planning your cloud strategy: Adur and Worthing Councils
 
Software Asset Management and Education
Software Asset Management and EducationSoftware Asset Management and Education
Software Asset Management and Education
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Surviving a DDOS Attack

  • 1. www.eduserv.org.uk Surviving a DDoS Attack Matt Johnson, Head of Research, Eduserv January 2015
  • 2. Agenda  Background  Diary of the DDoS  Attack profiles & social media  Analysis and solution overview  Costs  Lessons learned  Q&A
  • 3. Background  Eduserv is a registered charity providing IT services to public good organisations  Operates primary services from our Swindon datacentre, secondary and DR services from Slough / London  Providing hosting services since 1996  IT services customer base  20+ customers, across government, health, education and the charity sectors  Some of the government customers are high-profile targets
  • 4. Day 1  Initial attack was seen on Sunday evening  Lasted around 2 hours  Attack was TCP-based, volumetric, probably HTTP-based  Primary sources in Brazil, Canada  Attack claimed by hacker via Twitter
  • 5. Day 2  Second attack on Monday afternoon  Against a range of Govt. websites  Attack was UDP-based  Probably DNS-amplification  Diverse source addresses  1 hour DoS for a number of customers  Damage limitation  Re-address and black-hole the address block of the targeted website services  “One sacrificed to save the many”
  • 6. Day 3  Attacked website brought back online  Separate ISP link to mitigate impact to other services  DDoS attacks resumed immediately  Web service was a 3rd party legacy build, with poor support for caching  HTTP volumetric based attack overwhelmed web server cluster
  • 7. Attack Methods  Range of attack methods used  Low Orbit Ion Cannon (LOIC), High Orbit Ion Cannon (HOIC)  DNS Amplification, HTTP Idle Attacks,  Scale of the attack  Bandwidth peak estimated >5 Gbps  200+ malformed requests p/sec (normally 2-3 requests p/sec)  Lack of support from upstream ISP for real-time blocking  Without this support, in a volumetric attack, hands are tied
  • 8. Social Media  Many attackers like to promote their “work” – can give an early insight into what’s happening (or about to happen)  Don’t believe everything you read 
  • 9. Incident Analysis  Incident Response Team formed  Multi-disciplinary teams – can bring new insight into solutions  Whiteboard-based evaluation of options  Continual comms with the impacted customer  Possible solutions  Block or disable attacking platforms at source  Rebuild the web service to cope with the additional workloads  Filter the DDoS traffic whilst allowing legitimate requests
  • 10. Starting Situation attack attack attack attack attack attack attack attack web firewalls routers www.customer.gov.uk user
  • 11. www.customer.gov.uk Proposed Solution web firewalls routers Proxy-2LogServer Load Bal. Proxy-1 attack attack attack attack attack attack attack attack safe.customer.gov.uk user Black Hole www.customer.gov.uk
  • 12. Web Proxy in the Cloud  Cloud provider choice – Amazon Web Services  Already had expertise in deploying AWS services  Huge bandwidth capacity (estimated at 600 Gbps+)  AWS Marketplace offers quick deployment of application servers  Proxy choice - AiCache  Reviewed options in the AWS Marketplace  AiCache seemed to deliver the functionality required  Available on a PAYG basis with no up-front licensing commitments  Configured and implemented inside of 4 hours
  • 13. Enabling DDoS protection Total HTTP requests Valid HTTP requests Bad HTTP requests DDoS protection enabled
  • 14. Enabling IP Throttling Initial (Test) IP throttling started Initial (Test) IP throttling finished Full IP Throttling enabled
  • 15. Traffic profile before and after proxy implementation Initial DDoS causing outages Ongoing DDoS – proxy in place Normal traffic profile
  • 16. Costs  IT costs: £350, comprising:  AWS: 150 GB of data transfer, load-balancing; 2 large VMs; 100 GB of data storage: ~$270 over 14 days  AiCache: 2 licences & support: $280, again over 14 days  People costs: £25k, comprising  Incident response: ~£15k  Incident analysis: ~£10k  Indirect costs: ~£20k  Impact on customer services, 3rd party effort, opportunity costs
  • 17. Lessons Learned  Bandwidth is king  In a sustained attack, whoever has the most, wins  DNS flexibility is vital  Having a well-architected DNS infrastructure allows you to change service endpoints quickly in response to targeted attacks  Make sure you have a diverse route into your DNS management  Watch social media  Can often give you insights into upcoming attacks, motivation  Log everything  Never know what might be needed to support further investigations
  • 18. AWS Learning  Amazon CloudWatch  Useful near-real time insight into DDoS traffic (via ELB metrics)  Provided evidence for the criminal investigation  Only stores data for 2 weeks – grab the data whilst you can  Needed to write custom CLI/API scripts to extract CloudWatch data  Really could do with a built-in data export capability!  AWS Elastic Load Balancer  Partially mitigated some of the DDoS attack vectors  Supports X-Forwarded-For (XFF) header to track originating IPs
  • 19. AWS Learning  EC2 capabilities  AWS offers an incredibly easy way to tap into huge data pipes  Incoming bandwidth is free… useful in DDoS situations  Route53 is great!  Supports simple mapping of Zone Apex to ELB target  Geo-distributed endpoints make it incredibly quick and reliable  Amazon Marketplace  Great source of pre-configured AWS-ready services  Use it!
  • 20. Thank you! Questions?  Matt Johnson  Matt.Johnson@eduserv.org.uk  @mhj_work  www.eduserv.org.uk  www.slideshare.net/eduserv