270 likes | 574 Views
Radware DoS / DDoS Attack Mitigation System . Orly Sorokin January 2013. AGENDA. DDoS attacks & Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations. DoS – How does it Look . Simple Way
E N D
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013
AGENDA DDoS attacks & Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations
DoS – How does it Look • Simple Way • Excessive or specially crafted traffic causing network/server/application resources misuse, thus preventing legitimate traffic to reach its destination and limits the service providing, generated by tools, humans or both. Can be based on Volume / Rate / Vulnerability Exploitation • Detailed • Layer 3 Floods – targeting the network equipment, and the actual pipe capacity • Layer 4 Floods – targeting the servers (physical or virtual), their stack resources • Layer 7 Floods – targeting real applications and services
Cyber Security Study A research study by Ponemon & Radware Surveyed 700 IT & IT Security Practitioners Non Radware customers Release date: Q4/2012
DDoS Attacks Frequency How many DDoS attacks experienced in the past 12 months? 65% of organizations had an average of 3 DDoS attacks in the past 12 months
Average downtime during one DDoS attack 54 Minutes average downtime during one DDoS attack
AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations
Information Resources • Industry Security Survey • External survey • 179 companies • Mostare not using Radware DoS mitigation solution • ERT Cases • Internal survey • Unique visibility into attacks behavior • 95 selected cases • Customer identity remains undisclosed ERT gets to see attacks in real-time on daily basis
AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations
Organizations Bring a Knife to a Gunfight • ”Someone who brings a knife to a gun fight” • Is someone who does prepare himself for the fight, but does not understand its true nature • Organizations today are like that • They do invest before the attack starts, and conduct excellent forensics after it is over, • however, they have one critical blind-spot – they don't have the capabilities or resources to sustain a long, complicated attack campaign. • Attackers target this blind spot!
Attacked in 2012 They had the budget They made the investment And yet they went offline
ERT Cases – Attack Duration Trend 21% 23% 21% 12% 11% 12% Attacks last longer: The number of DoS attacks lasting over a week had doubled in 2012
ERT Cases – Attack Vectors Trend ERT Cases – Attack Vectors Attacks are more complex: 2012 DoS/DDoS attacks have become more sophisticated, using more complex attack vectors. Note the number of attacks using a complexity level of 7-10.
Attack Vectors Trends Industry Security Survey – Attack Count by Type Attack remained diversified between different attack types.This reflects attackers using multi-vector attacks.
Entities That Are The Bottlenecks in DoS Attacks Industry Security SurveyWhich services or network elements are (or have been) the bottleneck of DoS? The three entities that are consistently the bottlenecks in DoS/DDoSattacksare the server under attack, the firewall and the Internet pipe.
Solutions Used Against DoS Attacks Industry Security SurveyWhich solutions do you use against DoS attacks?
Attackers Motivation Trend DoS motivation did not change in 2012 compared to last year.
Who’s On The Target List? Low Medium ISP High Financial Government eCommerce eGaming Mobile 2012 2011 Prior to 2011
AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations
AMS Protection Set DoS Protection • Prevent all type of network DDoS attacks Reputation Engine • Financial fraud protection • Anti Trojan & Phishing IPS • Prevent application vulnerability exploits NBA • Prevent application resource misuse • Prevent zero-minute malware WAF • Mitigating Web application threats and zero-day attacks
Radware Security Event Management (SEM) • Correlated reports • Trend analysis • Compliance management • RT monitoring • Advanced alerts • Forensics NB / API 3rd Party SEM
Thank You www.radware.com