1 / 61

DDos Attacks and Web Threats: How to Protect Your Site & Information

DDos Attacks and Web Threats: How to Protect Your Site & Information. Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com. Hacking Tools. Low-Orbit Ion Canon (LOIC) Purpose - DDoS Windows desktop application, coded in C# UDP/TCP/HTTP flooding.

rossa
Download Presentation

DDos Attacks and Web Threats: How to Protect Your Site & Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com

  2. - CONFIDENTIAL -

  3. - CONFIDENTIAL -

  4. - CONFIDENTIAL -

  5. - CONFIDENTIAL -

  6. - CONFIDENTIAL -

  7. - CONFIDENTIAL -

  8. - CONFIDENTIAL -

  9. - CONFIDENTIAL -

  10. - CONFIDENTIAL -

  11. - CONFIDENTIAL -

  12. - CONFIDENTIAL -

  13. - CONFIDENTIAL -

  14. - CONFIDENTIAL -

  15. - CONFIDENTIAL -

  16. - CONFIDENTIAL -

  17. - CONFIDENTIAL -

  18. Hacking Tools Low-Orbit Ion Canon (LOIC) Purpose - DDoS Windows desktop application, coded in C# UDP/TCP/HTTP flooding

  19. DoS is Another Tool in the Hacker Toolbox Source: Imperva. Covers July 2010 -July 2011 across 600,000 discussions Hacker Forum Discussion Topics

  20. A 100GB attack (Sept 24th) • Featured in eWeek on October 1, 2013 • The attack's load was distributed across our +350Gbps network. (each color represents a different data center)

  21. Imperva Incapsula Overview Incapsula helps Website owners… Confidential

  22. Imperva Incapsula Overview

  23. Versatility Imperva’s ^ “The idea of recognizing your strengths and using them in as versatile a way as you can is cool to me.” - Frank Ocean Tina

  24. Imperva Incapsula Versatility Load Balancing Content Delivery Network (CDN) Load Balancing Web Application Firewall (WAF) Distributed Denial of Service (DDOS) Distributed Denial of Service (DDOS) By routing Website traffic through Incapsula, bad traffic is removed and good traffic is accelerated Confidential

  25. Imperva Incapsula is Deployed as a Reverse Proxy Network 360° Global Threat Detection & Analysis:Enables early detection of threats and attack vectors and instant application of protection rules across the entire proxy network

  26. Incapsula’s Global Content Delivery Network Confidential • Datacenters • Currently 15 Datacenters • USA (Ashville NC, Ashburn VA, Los Angles CA, San Jose CA, Chicago IL, Miami FL, Dallas TX, New York NY), London, Singapore, Israel, Amsterdam, Tokyo, Frankfurt, Sydney • Plans for another 4 Datacenters • Toronto, Hong Kong, Sao Paulo, and Milan • Data Across Borders • Customer data can be locked into (or out of) specific countries

  27. Simplicity Tina Shaw! Security “Life is really simple, but we insist on making it complicated.” - Confusius

  28. The Activation Email Elapsed time 20 sec

  29. Creating a User Account Elapsed time 40 sec

  30. Logging into Incapsula and adding a website Elapsed time 60 sec Confidential

  31. Incapsula Automatically Gathers Site Data Elapsed time 1 min 5 sec Confidential

  32. Changing DNS Settings Elapsed time 1 min 15 sec

  33. Getting Lost in Go Daddy’s HorribleUI Elapsed time 6 min 15 sec

  34. Updating DNS Records Elapsed time 8 min 15 sec

  35. Completing Incapsula’s Setup Elapsed time 8 min 45 sec

  36. The Website is Protected Elapsed time • 9 Minutes • 5 Minutes • 4~5 Minutes Confidential

  37. Dashboard - Traffic Confidential

  38. Dashboard - Traffic Confidential

  39. Dashboard - Security Confidential

  40. Dashboard - Performance Confidential

  41. Dashboard – Datacenter Response Time Confidential

  42. Dashboard – Recent Updates Confidential

  43. Visits - CONFIDENTIAL -

  44. Visits - More Confidential

  45. Visits – Add to Whitelist Confidential

  46. Settings - General Confidential

  47. Settings – Login Protect Confidential

  48. Settings - Performance Confidential

  49. Settings - Performance Confidential

  50. Settings - Notifications Confidential

More Related