SlideShare a Scribd company logo
Surviving a DDoS Attack:
Securing CDN traffic at CloudFlare
Martin J. Levy, Network Strategy
CloudFlare, Inc.
MSK-IX Moscow Russia
December 4, 2014
24 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DDoS Attacks are
becoming massive,
and easier to initiate
Today:
34 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Major Attacks against
CloudFlare Customers
Mar 2013
309
Gbps
Feb 2014
400
Gbps
Feb 2012
65 Gbps
Next?
???
Gbps
44 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare
54 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare network locations
• Global: Deployed into 28 data centers in 20 countries
• Secure: Built into every layer and every protocol
• Robust: Every node can perform any task. Anycast HTTP routing
• Reliable: Built-in redundancy, load balancing, and high-availability
64 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare works at the network level
74 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare works globally
84 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare sample customers
Nearly two million websites
94 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Chronology
of the major attacks
104 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
March 2013
114 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Spamhaus attack
124 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Monday, March 18th thru 21st
“Annoyance” attacks, 10-80Gbps
134 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Wednesday, March 20th
~75Gbps attack
“Instant on”
144 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Then, it got real …
154 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Sunday, March 24th thru 25th
Peaks of the attack reached 309Gbps
“Instant on”
164 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
February 2014
174 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Monday, February 10th, 2014
400Gbps, Globally Distributed Attacks
184 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
194 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Evolving Landscape
204 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Evolving Landscape of DDoS Attacks
DNS amplification
Up to 300 Gbps
NTP reflection
Up to 400+ Gbps
(35% up from DNS amplification)
DNS infrastructure
100s Gbps
HTTP Application
100s Gbps
Sophistication
ATTACK TYPE TREND
• Volumetric Layer 3 / 4
• DNS Infrastructure
• HTTPS application
• Origin: 100s of countries
More sophisticated DDoS mitigation and larger surface area to
block volumetric attacks has forced hackers to change tactics.
New DNS infrastructure and HTTP layer 7 attack signatures that
mimic human-like behavior are increasing in frequency.
20142013
214 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Layer 7 Attacks
224 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Layer 7 Attack methodology
Exhausts CPU
Attackers use millions of
compromised machines to launch
a sophisticated attack that mimics
real users and overloads the slow
points in your web property.
A highly advanced attack that
mimics real users is detected and
blocked by CloudFlare before it
can overload the slow parts of
web server software.
234 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DNS Infrastructure Attacks
Layer 7 – Malicious Payload
• Request sent to exploit vulnerability on server
• WAF on CloudFlare blocks 1.2 billion request per day
• Shellshock
• 10 to 15 attacks per second during the first week
• Top countries: France (80%), US (7%), Netherlands (7%)
244 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
254 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Breaking Down the Attacks
264 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DDoS mechanics
274 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
IP Spoofing
Attacker
Network Device
1.2.3.4
Hi, I’m 1.2.3.4,
and I need some info
Here’s your info
213.4.99.70
Target Website
284 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
IP Spoofing
http://spoofer.cmand.org/
25.5% of networks allow spoofing
294 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Attack #1 – Spamhaus Attack:
309Gbps
UDP DNS
304 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Getting to 309Gbps
10 Mbps 30,900X 309,000 Mbps=
314 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
An easier way: DNS
Amplification
Attacker
Open DNS Resolver
Target Website
64 Bytes
3,363 Bytes
~50x
324 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
How easy is it to
create a DNS query packet?
334 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
64 bytes becomes 3,363 bytes
$ dig ANY isc.org @63.21*.**.** +edns=0 +notcp +bufsize=4096
64 byte query
Sorryforthesmallprint
;; ANSWER SECTION:
isc.org. 7147 IN SOA ns-int.isc.org. hostmaster.isc.org. 2013073000 7200 3600 24796800 3600
isc.org. 7147 IN NS ns.isc.afilias-nst.info.
isc.org. 7147 IN NS ord.sns-pb.isc.org.
isc.org. 7147 IN NS ams.sns-pb.isc.org.
isc.org. 7147 IN NS sfba.sns-pb.isc.org.
isc.org. 7 IN A 149.20.64.69
isc.org. 7147 IN MX 10 mx.pao1.isc.org.
isc.org. 7147 IN TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all"
isc.org. 7147 IN TXT "$Id: isc.org,v 1.1835 2013-07-24 00:15:22 dmahoney Exp $"
isc.org. 7 IN AAAA 2001:4f8:0:2::69
isc.org. 7147 IN NAPTR 20 0 "S" "SIP+D2U" "" _sip._udp.isc.org.
isc.org. 3547 IN NSEC _adsp._domainkey.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF
isc.org. 7147 IN DNSKEY 256 3 5 BQEAAAABwuHz9Cem0BJ0JQTO7C/a3McR6hMaufljs1dfG/inaJpYv7vH XTrAOm/MeKp+/x6eT4QLru0KoZkvZJnqTI8JyaFTw2OM/ItBfh/hL2lm Cft2O7n3MfeqYtvjPnY7dWghYW4sVfH7VVEGm958o9nfi79532Qeklxh x8pXWdeAaRU=
isc.org. 7147 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGr hhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+ u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz
Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bB yBNsO70aEFTd
isc.org. 7147 IN SPF "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all"
isc.org. 7147 IN RRSIG SPF 5 2 7200 20130828233259 20130729233259 50012 isc.org. XDoOYzkTHEV1W1V4TT50SsqXn4cxNhPvEuz3iFjq/oskLY9UOaK4GYDO GqHAjwNT0B6pUakKTQ3GvBjUBufPcEauCOl7L7kb8/cC6zYifUCoW0pS moiQxmyqfrPDTzyVA894myUONGgMmB6QW68HGPVvc6HzGWx9bOmjvFyX uOs=
isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 12892 isc.org. COfF8fU6a8TBUG97SI/X+u2eKv7/mw+ixD3IWBnr3d3cWZmzF1sV8bWT YbuJebwnJMgN5OfB9PLsN+4QT617OjBe1dUF2M9jZeBiWsSsvvrdHnHM P8KwX6eayByDUoFsYe9VAH6C94XmOVXTQ7h7Cr0ytaVSXUytqFZV+DGn
v3kqSi50V3YkFNPAJDqqs0treWjwV/SPlqWVqEAoU/KMZMtYpCEMbHVP 8nbRP3jj/10WLccPtjHhiw4Ka9Sk4o+b7BMYCgXGXlhaap21SUqkytHt 8RJdVxxd5Cj7Bi+O4LXODlS4bAZEDG7UoHR27MzXtvMZogsNyyNUKHSs FtUvBg==
isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 50012 isc.org. Mbr/QqJPoIuf3K5jCuABUIG0/zSHQ8iWZpqvHx7olVBEmTxhi3/vW+IE DW6VCE1EpZclSIlMMRZUnbBnVSpe0rZ13BxoLlRQqvsbC3jD15Se41WB DscD0S63C0GLqI9IhSyVugtlpqhA3CaluSqtABHbAktPP05Rm00tST2Y A5Q=
isc.org. 3547 IN RRSIG NSEC 5 2 3600 20130828233259 20130729233259 50012 isc.org. V7G42xY7TY9wF1vsBlRFuJ2ror/QjftLoRrDCMfqFW6kb5ZswjKt5zho 4o2sIrylTqad68O+lMxrDcg+7c2D8Hdh84SC0DEkjunBXkGBtLtaJvO5 zMn+d/OgUY5O7wtkerybJwZeiHcFxIkMRIcvsPKJYZWKCdaaCWibne7c w1s=
isc.org. 7147 IN RRSIG NAPTR 5 2 7200 20130828233259 20130729233259 50012 isc.org. gWDvD0KACaYgsCgtRS4iKkHBBidfJfqS4drUf4kuPX2Etl9fj1YrqOQK QFB5kBrzJLKh1IF4YpV+KYVUF82l3AtpsohpUH5Uyc3yD3r1CUDVyVvc T9qUrIuRpZLInD2kBLmDaG76MRz4Fz+NAkdXmwxZJhgTrfMLy+Uw/Ktk H7w=
isc.org. 7 IN RRSIG AAAA 5 2 60 20130828233259 20130729233259 50012 isc.org. dfzIo0VGT0MptTaPoua3tFwDxSpeuOg127QedlqLGTxKGN1ppV/bd6R0 WktMagZY9rSqmjfXNPlF3Q+7YeTpMssQhHqjE/tDoj9q9r8RXuBLJ1+a VRq3+xMbxb5EXAyQVZw24LIuloqNprXePRUGCXNINSWd7VZEIDNqhu9C g7U=
isc.org. 7147 IN RRSIG TXT 5 2 7200 20130828233259 20130729233259 50012 isc.org. WtB3SYzcOKpNbOtBlnmtsI0DCbDB4Kiv/HBY24PTZyWF/3tI8l+wZ+/p MfJ/SblbAzT67DO5RfxlOhr8UlRKVa70oqinQp5+rqiS67lv1hGO6ArO k+J0jLTis9Uz32653dgAxlgjEdWDKAg4F12TaHirAXxyI8fos5WNl/h4 GLo=
isc.org. 7147 IN RRSIG MX 5 2 7200 20130828233259 20130729233259 50012 isc.org. BSXC42oV6MCF0dX2icyxnvyijhy569BJCoanm5VrIIuiNeTeo261FQJx 7ofFCWa4fKOoa+EZ0qloNPfDiczStr8MmK8Lznu6+8IRfdmcG/kURuSi JdvDa0swxjmCm9aYu2nhoyHs+jqbJ+9+fneI0iDUX1fiM+9G2K9BjLru NxU=
isc.org. 7 IN RRSIG A 5 2 60 20130828233259 20130729233259 50012 isc.org. Gmb8tt8d7kxx4HsA8L6IdFYGGSJCA8PTWexUP3CBLna39e4a6gVzjoNd dEI7B5mySAujZBEXNx3dSagpjiTJYfMML8AY0uO0tgyjqaTyzwPPV5lW xQKVC092BPJx9IeKw+DC57f3m9LOaHJlMIh7wYFn8jxqeg1lSwJN0e35 Qvc=
isc.org. 7147 IN RRSIG NS 5 2 7200 20130828233259 20130729233259 50012 isc.org. RBvXLeTH0726iKvElmBZYUE+AWG3s2YRxKxuCnrhg7o9qIQGKXvEXrb3 wJeC/74KY2FW+RRz4F0QxODnPm+frpWIPbCpRf0SUFDQ82opQDwAb2CM 0D9N95y1t9hYfSeHEsEEk2yWgLymd9/S24XCmwuVVZ7ZeYQmVEVkF7Jt V3A=
isc.org. 7147 IN RRSIG SOA 5 2 7200 20130828233259 20130729233259 50012 isc.org. iiDnH6tvmap0h2cdULI8Ihme+zbtQ2+D3ycKRqBc9TRfA0poNaaZ97aF 15EIKyIpjiVybkP2DNLm5nkpNsgA+Ur+YQ6pr0hZKzbDkBllBIW4C0LV DsjzPX3qLPH4G3x/20M+TeGe4uzPB5ImPuw0VxB8g8ZP5znvdiZG6qen jas=
;; AUTHORITY SECTION:
isc.org. 7147 IN NS ns.isc.afilias-nst.info.
isc.org. 7147 IN NS ord.sns-pb.isc.org.
isc.org. 7147 IN NS ams.sns-pb.isc.org.
isc.org. 7147 IN NS sfba.sns-pb.isc.org.
;; ADDITIONAL SECTION:
ns.isc.afilias-nst.info. 56648 IN A 199.254.63.254
ns.isc.afilias-nst.info. 56652 IN AAAA 2001:500:2c::254
ord.sns-pb.isc.org. 31018 IN AAAA 2001:500:71::30
ord.sns-pb.isc.org. 31018 IN A 199.6.0.30
ams.sns-pb.isc.org. 31018 IN AAAA 2001:500:60::30
ams.sns-pb.isc.org. 31018 IN A 199.6.1.30
sfba.sns-pb.isc.org. 31018 IN AAAA 2001:4f8:0:2::19
sfba.sns-pb.isc.org. 31018 IN A 149.20.64.3
mx.pao1.isc.org. 3547 IN AAAA 2001:4f8:0:2::2b
mx.pao1.isc.org. 3547 IN A 149.20.64.53
_sip._udp.isc.org. 7147 IN SRV 0 1 5060 asterisk.isc.org.
3,363 byte response
344 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
300Gbps+ of DDoS attack traffic
1 laptop
+ 5-7 compromised servers
+ 3 networks which allow spoofing
+ 9Gbps of DNS requests to
+ 0.1% of all open resolvers
----------------------------------------
= 300Gbps of DDoS traffic
354 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Attack #2 – The NTP Attack:
400Gbps
UDP NTP
364 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Tweets report attack issues
374 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
An EVEN easier way: NTP
Amplification
Attacker
NTP Server with
MONLIST
Target Website
64 Bytes
13,184 Bytes
~206x
1 laptop
+ 1 compromised server
+ 1 network which allowed spoofing
+ 1.94Gbps of MONLIST to
----------------------------------------------------
= 400Gbps+ of DDoS attack traffic
384 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
400Gbps+ of DDoS attack traffic
394 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
What’s Next?
~206x
650x
~50x
8xDNS
EDNS
NTP
SNMP
→
→
→
→
404 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Something extra …
Largest Attack in History
• Hong Kong
• Peaked at ~500Gbps
• 7 days
• Reflection attack (DNS, NTP)
• DNS flood - 250 million DNS
requests per second
• HTTP(S) attack
414 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
424 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Protecting your network
434 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
28 Million Open DNS Resolvers
http://OpenResolverProject.org/
Lock your DNS server (recursive & authoritative) down
444 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
28 Million Open DNS Resolvers
http://team-cymru.org/
Confirm that the resolver is a closed resolver
options {
recursion no;
additional-from-cache no;
};
UNIX bind configuration examples
acl "trusted" {
10.42.0.0/16;
192.0.2.0/24;
192.0.6.0/24;
};
options {
recursion no;
additional-from-cache no;
allow-query { none; };
};
view "trusted" in {
match-clients { trusted; };
allow-query { trusted; };
recursion yes;
additional-from-cache yes;
};
454 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
http://OpenNTPProject.org/
Turn off MONLIST on your NTP servers
464 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
474 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
http://team-cymru.org/
“noquery” is required to disable MONLIST
# by default act only as a basic NTP client
restrict -4 default nomodify nopeer noquery notrap
restrict -6 default nomodify nopeer noquery notrap
# allow NTP messages from the loopback address, useful for debugging
restrict 127.0.0.1
restrict -6 ::1
# server(s) we time sync to
server 192.0.2.1
server 2001:db8::1
server time.example.net
UNIX ntpd configuration example
484 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Prevent IP Spoofing (network hygiene)
• BCP38 / RFC2827 (ingress filtering) – May, 2000:
• http://bcp38.info/
• http://www.ietf.org/rfc/bcp/bcp38.txt
• http://www.ietf.org/rfc/rfc2827.txt
• BCP84 / RFC3704 (for multihomed) – March, 2004:
• http://www.ietf.org/rfc/bcp/bcp84.txt
• http://www.ietf.org/rfc/rfc3704.txt
… and yet still an issue today!
494 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Securing CDN traffic at
CloudFlare
504 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare security
514 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare – a global network
Attack traffic is global and hence a global edge is valuable
524 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Anycast Dilutes Attacks
300Gbps of attack traffic
/ 28 locations
----------------------------------------------------
= ~10.7Gbps average per location
Reality is that some locations are much larger
than others. However every location is vital.
534 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Anycast Dilutes Attacks
544 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Solution: Hide Origin IPs
• Use separate IPs for HTTP, DNS, SMTP, etc
• Public DNS should route to your EDGE’s public IPs
• Keep actual/origin web device IPs protected
554 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Filter traffic by IP and protocol
• No UDP packets should be able to hit your HTTP
server
• UDP is IP protocol 17 vs. TCP for HTTP is IP protocol 6
• No HTTP packets should be able to hit your SMTP
server
• HTTP is TCP port 80 & 443 vs. SMTP is port 25 & 587
564 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Filter traffic by IP and protocol
http://team-cymru.org/
Allow only HTTP& HTTPS via TCP protocol to a specific IP
!
hostname router-www
!
interface ethernet0
ip access-group 102 in
!
access-list 102 permit tcp any host 10.0.0.100 eq 80
access-list 102 permit tcp any host 10.0.0.100 eq 443
access-list 102 deny all
!
Simple Cisco filter configuration example
574 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Protect your infrastructure
• Internal switches, routers, and other devices should be
locked down from any external access
• All traffic should flow through EDGE devices which
handle attacks
• CloudFlare Web Application Firewall (WAF) service
584 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Build relationships upstream
• Understand what your data center and bandwidth
providers do about DDoS
• Know who to call when trouble strikes
• Share your IP/Protocol architecture with them
594 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Communicate about attacks
604 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Summary
614 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Summary
• Volumetric DDoS evolving (NTP came and went)
• Larger botnets / Cloud services user in botnets
• DNS flood on the rise / Application-level on the rise
• Politically motivated attacks
• First, make sure you’re not part of the problem …
• Second, practice good protocol hygiene …
• Third, implement infrastructure ACLs …
• Fourth, know your upstreams
624 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Questions?
Martin J. Levy, Network Strategy
@mahtin
@cloudflare
http://www.cloudflare.com/
AS13335

More Related Content

What's hot

Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
Mostafa El Lathy
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
 
Syn Flood DDoS Saldırıları
Syn Flood DDoS SaldırılarıSyn Flood DDoS Saldırıları
Syn Flood DDoS Saldırıları
BGA Cyber Security
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
Jack Melson
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
Sunny Neo
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
What is SASE
What is SASEWhat is SASE
What is SASE
Adi Ruppin
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
Rony Melo
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
Aj Maurya
 
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & ClusterMySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
Kenny Gryp
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
Mohammed A. Imran
 
F5 BIG-IP Misconfigurations
F5 BIG-IP MisconfigurationsF5 BIG-IP Misconfigurations
F5 BIG-IP Misconfigurations
Denis Kolegov
 
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
NAVER D2
 

What's hot (20)

Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Syn Flood DDoS Saldırıları
Syn Flood DDoS SaldırılarıSyn Flood DDoS Saldırıları
Syn Flood DDoS Saldırıları
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & ClusterMySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
 
F5 BIG-IP Misconfigurations
F5 BIG-IP MisconfigurationsF5 BIG-IP Misconfigurations
F5 BIG-IP Misconfigurations
 
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
[124]네이버에서 사용되는 여러가지 Data Platform, 그리고 MongoDB
 

Viewers also liked

Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
Cloudflare
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
Cloudflare
 
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSRunning a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Cloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
Cloudflare
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
Cloudflare
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for you
Cloudflare
 
Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season
Cloudflare
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
Zero Science Lab
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
Cloudflare
 
Running Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without ParachuteRunning Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without Parachute
Cloudflare
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014
Cloudflare
 
Go Containers
Go ContainersGo Containers
Go Containers
Cloudflare
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 PolandCloudflare
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
Cloudflare
 
SortaSQL
SortaSQLSortaSQL
SortaSQL
Cloudflare
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012Cloudflare
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Cloudflare
 

Viewers also liked (18)

Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSRunning a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for you
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
 
Running Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without ParachuteRunning Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without Parachute
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014
 
Go Containers
Go ContainersGo Containers
Go Containers
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
 
SortaSQL
SortaSQLSortaSQL
SortaSQL
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
 

Similar to Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Ruo Ando
 
LF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft AzureLF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft Azure
LF_DPDK
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
Amazon Web Services
 
How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17
Tom Arnfeld
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
SPC Adriatics
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShield
Sam Pickles
 
What's New in Docker 1.12?
What's New in Docker 1.12?What's New in Docker 1.12?
What's New in Docker 1.12?
Ajeet Singh Raina
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
APNIC
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
Cohesive Networks
 
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-broDefcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Priyanka Aash
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
Fernando564134
 
SANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation TimelineSANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation Timeline
giacomo83m
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Krunal Jain
 
Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)
Shawn Ismail
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
ThousandEyes
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
DevOps.com
 
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Corley S.r.l.
 

Similar to Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare (20)

Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
 
LF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft AzureLF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft Azure
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShield
 
What's New in Docker 1.12?
What's New in Docker 1.12?What's New in Docker 1.12?
What's New in Docker 1.12?
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-broDefcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
 
SANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation TimelineSANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation Timeline
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)
 
Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
 

More from Cloudflare

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
Cloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Cloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
Cloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
Cloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Cloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Cloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
Cloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
Cloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 

More from Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 

Recently uploaded (20)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 

Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

  • 1. Surviving a DDoS Attack: Securing CDN traffic at CloudFlare Martin J. Levy, Network Strategy CloudFlare, Inc. MSK-IX Moscow Russia December 4, 2014
  • 2. 24 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DDoS Attacks are becoming massive, and easier to initiate Today:
  • 3. 34 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Major Attacks against CloudFlare Customers Mar 2013 309 Gbps Feb 2014 400 Gbps Feb 2012 65 Gbps Next? ??? Gbps
  • 4. 44 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare
  • 5. 54 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare network locations • Global: Deployed into 28 data centers in 20 countries • Secure: Built into every layer and every protocol • Robust: Every node can perform any task. Anycast HTTP routing • Reliable: Built-in redundancy, load balancing, and high-availability
  • 6. 64 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare works at the network level
  • 7. 74 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare works globally
  • 8. 84 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare sample customers Nearly two million websites
  • 9. 94 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Chronology of the major attacks
  • 10. 104 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare March 2013
  • 11. 114 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Spamhaus attack
  • 12. 124 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Monday, March 18th thru 21st “Annoyance” attacks, 10-80Gbps
  • 13. 134 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Wednesday, March 20th ~75Gbps attack “Instant on”
  • 14. 144 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Then, it got real …
  • 15. 154 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Sunday, March 24th thru 25th Peaks of the attack reached 309Gbps “Instant on”
  • 16. 164 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare February 2014
  • 17. 174 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Monday, February 10th, 2014 400Gbps, Globally Distributed Attacks
  • 18. 184 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 19. 194 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Evolving Landscape
  • 20. 204 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Evolving Landscape of DDoS Attacks DNS amplification Up to 300 Gbps NTP reflection Up to 400+ Gbps (35% up from DNS amplification) DNS infrastructure 100s Gbps HTTP Application 100s Gbps Sophistication ATTACK TYPE TREND • Volumetric Layer 3 / 4 • DNS Infrastructure • HTTPS application • Origin: 100s of countries More sophisticated DDoS mitigation and larger surface area to block volumetric attacks has forced hackers to change tactics. New DNS infrastructure and HTTP layer 7 attack signatures that mimic human-like behavior are increasing in frequency. 20142013
  • 21. 214 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Layer 7 Attacks
  • 22. 224 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Layer 7 Attack methodology Exhausts CPU Attackers use millions of compromised machines to launch a sophisticated attack that mimics real users and overloads the slow points in your web property. A highly advanced attack that mimics real users is detected and blocked by CloudFlare before it can overload the slow parts of web server software.
  • 23. 234 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DNS Infrastructure Attacks
  • 24. Layer 7 – Malicious Payload • Request sent to exploit vulnerability on server • WAF on CloudFlare blocks 1.2 billion request per day • Shellshock • 10 to 15 attacks per second during the first week • Top countries: France (80%), US (7%), Netherlands (7%) 244 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 25. 254 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Breaking Down the Attacks
  • 26. 264 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DDoS mechanics
  • 27. 274 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare IP Spoofing Attacker Network Device 1.2.3.4 Hi, I’m 1.2.3.4, and I need some info Here’s your info 213.4.99.70 Target Website
  • 28. 284 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare IP Spoofing http://spoofer.cmand.org/ 25.5% of networks allow spoofing
  • 29. 294 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Attack #1 – Spamhaus Attack: 309Gbps UDP DNS
  • 30. 304 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Getting to 309Gbps 10 Mbps 30,900X 309,000 Mbps=
  • 31. 314 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare An easier way: DNS Amplification Attacker Open DNS Resolver Target Website 64 Bytes 3,363 Bytes ~50x
  • 32. 324 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare How easy is it to create a DNS query packet?
  • 33. 334 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 64 bytes becomes 3,363 bytes $ dig ANY isc.org @63.21*.**.** +edns=0 +notcp +bufsize=4096 64 byte query Sorryforthesmallprint ;; ANSWER SECTION: isc.org. 7147 IN SOA ns-int.isc.org. hostmaster.isc.org. 2013073000 7200 3600 24796800 3600 isc.org. 7147 IN NS ns.isc.afilias-nst.info. isc.org. 7147 IN NS ord.sns-pb.isc.org. isc.org. 7147 IN NS ams.sns-pb.isc.org. isc.org. 7147 IN NS sfba.sns-pb.isc.org. isc.org. 7 IN A 149.20.64.69 isc.org. 7147 IN MX 10 mx.pao1.isc.org. isc.org. 7147 IN TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all" isc.org. 7147 IN TXT "$Id: isc.org,v 1.1835 2013-07-24 00:15:22 dmahoney Exp $" isc.org. 7 IN AAAA 2001:4f8:0:2::69 isc.org. 7147 IN NAPTR 20 0 "S" "SIP+D2U" "" _sip._udp.isc.org. isc.org. 3547 IN NSEC _adsp._domainkey.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF isc.org. 7147 IN DNSKEY 256 3 5 BQEAAAABwuHz9Cem0BJ0JQTO7C/a3McR6hMaufljs1dfG/inaJpYv7vH XTrAOm/MeKp+/x6eT4QLru0KoZkvZJnqTI8JyaFTw2OM/ItBfh/hL2lm Cft2O7n3MfeqYtvjPnY7dWghYW4sVfH7VVEGm958o9nfi79532Qeklxh x8pXWdeAaRU= isc.org. 7147 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGr hhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+ u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bB yBNsO70aEFTd isc.org. 7147 IN SPF "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all" isc.org. 7147 IN RRSIG SPF 5 2 7200 20130828233259 20130729233259 50012 isc.org. XDoOYzkTHEV1W1V4TT50SsqXn4cxNhPvEuz3iFjq/oskLY9UOaK4GYDO GqHAjwNT0B6pUakKTQ3GvBjUBufPcEauCOl7L7kb8/cC6zYifUCoW0pS moiQxmyqfrPDTzyVA894myUONGgMmB6QW68HGPVvc6HzGWx9bOmjvFyX uOs= isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 12892 isc.org. COfF8fU6a8TBUG97SI/X+u2eKv7/mw+ixD3IWBnr3d3cWZmzF1sV8bWT YbuJebwnJMgN5OfB9PLsN+4QT617OjBe1dUF2M9jZeBiWsSsvvrdHnHM P8KwX6eayByDUoFsYe9VAH6C94XmOVXTQ7h7Cr0ytaVSXUytqFZV+DGn v3kqSi50V3YkFNPAJDqqs0treWjwV/SPlqWVqEAoU/KMZMtYpCEMbHVP 8nbRP3jj/10WLccPtjHhiw4Ka9Sk4o+b7BMYCgXGXlhaap21SUqkytHt 8RJdVxxd5Cj7Bi+O4LXODlS4bAZEDG7UoHR27MzXtvMZogsNyyNUKHSs FtUvBg== isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 50012 isc.org. Mbr/QqJPoIuf3K5jCuABUIG0/zSHQ8iWZpqvHx7olVBEmTxhi3/vW+IE DW6VCE1EpZclSIlMMRZUnbBnVSpe0rZ13BxoLlRQqvsbC3jD15Se41WB DscD0S63C0GLqI9IhSyVugtlpqhA3CaluSqtABHbAktPP05Rm00tST2Y A5Q= isc.org. 3547 IN RRSIG NSEC 5 2 3600 20130828233259 20130729233259 50012 isc.org. V7G42xY7TY9wF1vsBlRFuJ2ror/QjftLoRrDCMfqFW6kb5ZswjKt5zho 4o2sIrylTqad68O+lMxrDcg+7c2D8Hdh84SC0DEkjunBXkGBtLtaJvO5 zMn+d/OgUY5O7wtkerybJwZeiHcFxIkMRIcvsPKJYZWKCdaaCWibne7c w1s= isc.org. 7147 IN RRSIG NAPTR 5 2 7200 20130828233259 20130729233259 50012 isc.org. gWDvD0KACaYgsCgtRS4iKkHBBidfJfqS4drUf4kuPX2Etl9fj1YrqOQK QFB5kBrzJLKh1IF4YpV+KYVUF82l3AtpsohpUH5Uyc3yD3r1CUDVyVvc T9qUrIuRpZLInD2kBLmDaG76MRz4Fz+NAkdXmwxZJhgTrfMLy+Uw/Ktk H7w= isc.org. 7 IN RRSIG AAAA 5 2 60 20130828233259 20130729233259 50012 isc.org. dfzIo0VGT0MptTaPoua3tFwDxSpeuOg127QedlqLGTxKGN1ppV/bd6R0 WktMagZY9rSqmjfXNPlF3Q+7YeTpMssQhHqjE/tDoj9q9r8RXuBLJ1+a VRq3+xMbxb5EXAyQVZw24LIuloqNprXePRUGCXNINSWd7VZEIDNqhu9C g7U= isc.org. 7147 IN RRSIG TXT 5 2 7200 20130828233259 20130729233259 50012 isc.org. WtB3SYzcOKpNbOtBlnmtsI0DCbDB4Kiv/HBY24PTZyWF/3tI8l+wZ+/p MfJ/SblbAzT67DO5RfxlOhr8UlRKVa70oqinQp5+rqiS67lv1hGO6ArO k+J0jLTis9Uz32653dgAxlgjEdWDKAg4F12TaHirAXxyI8fos5WNl/h4 GLo= isc.org. 7147 IN RRSIG MX 5 2 7200 20130828233259 20130729233259 50012 isc.org. BSXC42oV6MCF0dX2icyxnvyijhy569BJCoanm5VrIIuiNeTeo261FQJx 7ofFCWa4fKOoa+EZ0qloNPfDiczStr8MmK8Lznu6+8IRfdmcG/kURuSi JdvDa0swxjmCm9aYu2nhoyHs+jqbJ+9+fneI0iDUX1fiM+9G2K9BjLru NxU= isc.org. 7 IN RRSIG A 5 2 60 20130828233259 20130729233259 50012 isc.org. Gmb8tt8d7kxx4HsA8L6IdFYGGSJCA8PTWexUP3CBLna39e4a6gVzjoNd dEI7B5mySAujZBEXNx3dSagpjiTJYfMML8AY0uO0tgyjqaTyzwPPV5lW xQKVC092BPJx9IeKw+DC57f3m9LOaHJlMIh7wYFn8jxqeg1lSwJN0e35 Qvc= isc.org. 7147 IN RRSIG NS 5 2 7200 20130828233259 20130729233259 50012 isc.org. RBvXLeTH0726iKvElmBZYUE+AWG3s2YRxKxuCnrhg7o9qIQGKXvEXrb3 wJeC/74KY2FW+RRz4F0QxODnPm+frpWIPbCpRf0SUFDQ82opQDwAb2CM 0D9N95y1t9hYfSeHEsEEk2yWgLymd9/S24XCmwuVVZ7ZeYQmVEVkF7Jt V3A= isc.org. 7147 IN RRSIG SOA 5 2 7200 20130828233259 20130729233259 50012 isc.org. iiDnH6tvmap0h2cdULI8Ihme+zbtQ2+D3ycKRqBc9TRfA0poNaaZ97aF 15EIKyIpjiVybkP2DNLm5nkpNsgA+Ur+YQ6pr0hZKzbDkBllBIW4C0LV DsjzPX3qLPH4G3x/20M+TeGe4uzPB5ImPuw0VxB8g8ZP5znvdiZG6qen jas= ;; AUTHORITY SECTION: isc.org. 7147 IN NS ns.isc.afilias-nst.info. isc.org. 7147 IN NS ord.sns-pb.isc.org. isc.org. 7147 IN NS ams.sns-pb.isc.org. isc.org. 7147 IN NS sfba.sns-pb.isc.org. ;; ADDITIONAL SECTION: ns.isc.afilias-nst.info. 56648 IN A 199.254.63.254 ns.isc.afilias-nst.info. 56652 IN AAAA 2001:500:2c::254 ord.sns-pb.isc.org. 31018 IN AAAA 2001:500:71::30 ord.sns-pb.isc.org. 31018 IN A 199.6.0.30 ams.sns-pb.isc.org. 31018 IN AAAA 2001:500:60::30 ams.sns-pb.isc.org. 31018 IN A 199.6.1.30 sfba.sns-pb.isc.org. 31018 IN AAAA 2001:4f8:0:2::19 sfba.sns-pb.isc.org. 31018 IN A 149.20.64.3 mx.pao1.isc.org. 3547 IN AAAA 2001:4f8:0:2::2b mx.pao1.isc.org. 3547 IN A 149.20.64.53 _sip._udp.isc.org. 7147 IN SRV 0 1 5060 asterisk.isc.org. 3,363 byte response
  • 34. 344 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 300Gbps+ of DDoS attack traffic 1 laptop + 5-7 compromised servers + 3 networks which allow spoofing + 9Gbps of DNS requests to + 0.1% of all open resolvers ---------------------------------------- = 300Gbps of DDoS traffic
  • 35. 354 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Attack #2 – The NTP Attack: 400Gbps UDP NTP
  • 36. 364 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Tweets report attack issues
  • 37. 374 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare An EVEN easier way: NTP Amplification Attacker NTP Server with MONLIST Target Website 64 Bytes 13,184 Bytes ~206x
  • 38. 1 laptop + 1 compromised server + 1 network which allowed spoofing + 1.94Gbps of MONLIST to ---------------------------------------------------- = 400Gbps+ of DDoS attack traffic 384 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 400Gbps+ of DDoS attack traffic
  • 39. 394 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare What’s Next? ~206x 650x ~50x 8xDNS EDNS NTP SNMP → → → →
  • 40. 404 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Something extra …
  • 41. Largest Attack in History • Hong Kong • Peaked at ~500Gbps • 7 days • Reflection attack (DNS, NTP) • DNS flood - 250 million DNS requests per second • HTTP(S) attack 414 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 42. 424 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Protecting your network
  • 43. 434 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 28 Million Open DNS Resolvers http://OpenResolverProject.org/ Lock your DNS server (recursive & authoritative) down
  • 44. 444 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 28 Million Open DNS Resolvers http://team-cymru.org/ Confirm that the resolver is a closed resolver options { recursion no; additional-from-cache no; }; UNIX bind configuration examples acl "trusted" { 10.42.0.0/16; 192.0.2.0/24; 192.0.6.0/24; }; options { recursion no; additional-from-cache no; allow-query { none; }; }; view "trusted" in { match-clients { trusted; }; allow-query { trusted; }; recursion yes; additional-from-cache yes; };
  • 45. 454 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks http://OpenNTPProject.org/ Turn off MONLIST on your NTP servers
  • 46. 464 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks
  • 47. 474 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks http://team-cymru.org/ “noquery” is required to disable MONLIST # by default act only as a basic NTP client restrict -4 default nomodify nopeer noquery notrap restrict -6 default nomodify nopeer noquery notrap # allow NTP messages from the loopback address, useful for debugging restrict 127.0.0.1 restrict -6 ::1 # server(s) we time sync to server 192.0.2.1 server 2001:db8::1 server time.example.net UNIX ntpd configuration example
  • 48. 484 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Prevent IP Spoofing (network hygiene) • BCP38 / RFC2827 (ingress filtering) – May, 2000: • http://bcp38.info/ • http://www.ietf.org/rfc/bcp/bcp38.txt • http://www.ietf.org/rfc/rfc2827.txt • BCP84 / RFC3704 (for multihomed) – March, 2004: • http://www.ietf.org/rfc/bcp/bcp84.txt • http://www.ietf.org/rfc/rfc3704.txt … and yet still an issue today!
  • 49. 494 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Securing CDN traffic at CloudFlare
  • 50. 504 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare security
  • 51. 514 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare – a global network Attack traffic is global and hence a global edge is valuable
  • 52. 524 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Anycast Dilutes Attacks 300Gbps of attack traffic / 28 locations ---------------------------------------------------- = ~10.7Gbps average per location Reality is that some locations are much larger than others. However every location is vital.
  • 53. 534 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Anycast Dilutes Attacks
  • 54. 544 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Solution: Hide Origin IPs • Use separate IPs for HTTP, DNS, SMTP, etc • Public DNS should route to your EDGE’s public IPs • Keep actual/origin web device IPs protected
  • 55. 554 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Filter traffic by IP and protocol • No UDP packets should be able to hit your HTTP server • UDP is IP protocol 17 vs. TCP for HTTP is IP protocol 6 • No HTTP packets should be able to hit your SMTP server • HTTP is TCP port 80 & 443 vs. SMTP is port 25 & 587
  • 56. 564 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Filter traffic by IP and protocol http://team-cymru.org/ Allow only HTTP& HTTPS via TCP protocol to a specific IP ! hostname router-www ! interface ethernet0 ip access-group 102 in ! access-list 102 permit tcp any host 10.0.0.100 eq 80 access-list 102 permit tcp any host 10.0.0.100 eq 443 access-list 102 deny all ! Simple Cisco filter configuration example
  • 57. 574 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Protect your infrastructure • Internal switches, routers, and other devices should be locked down from any external access • All traffic should flow through EDGE devices which handle attacks • CloudFlare Web Application Firewall (WAF) service
  • 58. 584 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Build relationships upstream • Understand what your data center and bandwidth providers do about DDoS • Know who to call when trouble strikes • Share your IP/Protocol architecture with them
  • 59. 594 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Communicate about attacks
  • 60. 604 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Summary
  • 61. 614 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Summary • Volumetric DDoS evolving (NTP came and went) • Larger botnets / Cloud services user in botnets • DNS flood on the rise / Application-level on the rise • Politically motivated attacks • First, make sure you’re not part of the problem … • Second, practice good protocol hygiene … • Third, implement infrastructure ACLs … • Fourth, know your upstreams
  • 62. 624 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Questions? Martin J. Levy, Network Strategy @mahtin @cloudflare http://www.cloudflare.com/ AS13335

Editor's Notes

  1. Founded 1998 // The Spamhaus Project is an international nonprofit organization whose mission is to track the Internet's spam operations
  2. more volumetric attacks (less frequent) more sophisticated attacks (more frequent)
  3. ~50 million packets per second in single location