SlideShare uma empresa Scribd logo
1 de 48
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shawn Marck, DDoS Response Team
Protect Your Game Servers
From DDoS Attacks
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Agenda
D D o S T h r e a t s & T r e n d s
A W S a p p r o a c h t o D D o S m i t i g a t i o n
A W S S h i e l d S t a n d a r d a n d A d v a n c e d
R e f e r e n c e A r c h i t e c t u r e s & B e s t P r a c t i c e s
C u s t o m e r R e f e r e n c e s & L i v e D e m o
AWS Shield
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS Attack Threats and
Trends
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of Threats
Bad BotsDDoS Application Attacks
Reflection
Layer 4 floods
Slowloris
SSL abuse
HTTP floods
Amplification
Content scrapers
Scanners & probes
Crawlers
SQL injection
Application exploits
Social
engineering
Sensitive data
exposureApplication
Layer
Network /
Transport
Layer
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of Threats
Bad BotsDDoS Application Attacks
Reflection
Layer 4 floods
Slowloris
SSL abuse
HTTP floods
Amplification
Content scrapers
Scanners & probes
Crawlers
SQL injection
Application exploits
Social
engineering
Sensitive data
exposureApplication
Layer
Network /
Transport
Layer
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS Threats
Network / Transport Layer DDoS
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS Threats
Application DDoS
Clients
Attackers
Web server Database
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
0
200
400
600
800
1000
1200
1400
1600
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Largest DDoS Attacks (Gbps)
Memcached Attacks
Mirai Attacks
DDoS Attack Trends
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS Threats and Trends
AWS Shield detects and mitigates 1,000’s of DDoS Attacks Daily
Source: AWS Global Threat Dashboard (Available for AWS Shield Advanced customers)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Availability Financial Impact Security
Why does it matter?
• Flooding game servers can
impact performance and
drastically degrade the
player experience.
• Attacks can last for hours,
even days
• Stealing or misusing data• An attack that brings down your
server will end up as Lost
Revenue
• You could massively scale but
that just translates to Increased
Infrastructure Expense
• Even without an actual attack
DDoS threats are being use for
Extortion
• Any combination of these results
in a hit to your reputation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
1
• Complex to Set up
• Need to Provision additional
capacity
• Re-architect applications
D i f f i c u l t t o E n a b l e
2
• Manual Intervention required
• Re-routing traffic to scrubbing
locations
S u b - O p t i m a l I n c i d e n t
R e s p o n s e
3
Scrubbing centers may be far from
your servers leading to added latency
D e g r a d e p e r f o r m a n c e
4
Manual intervention and re-routing
takes away precious moments from
incident response
I n c r e a s e d T i m e t o M i t i g a t e
5
Due to the size, duration and
complex nature of mitigation
systems it becomes prohibitively
expensive in some cases
E x p e n s i v e t o U s e
Traditional Challenges of DDoS Mitigation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Approach to
DDoS protection
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Evolution of DDoS Mitigation
On-Premise Cloud-Routed Cloud-Native
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
On-Premise
• Scale network and fixed
infrastructure to mitigate DDoS
attacks on-site
• Visibility and control
• Large capital expenditures,
maintenance costs, and in-house
expertise
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud-Routed
• Route traffic to other networks for
better mitigation capacity, managed
services
• Mitigate larger DDoS attacks without
upfront investment or in-house
expertise
• Black box solution – can introduce
latency, additional points of failure,
increased operating costs
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud-Native
• Automatic, always-on DDoS
protection for all applications on AWS
• Leverage 18 AWS Regions and over
100 Edge Locations to mitigate large
attacks close to the source
• Simple, flexible, and affordable
• Robust capabilities without
undifferentiated heavy-lifting
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Four Pillars of our approach to
DDoS Protection
AWS Integration
DDoS protection without
infrastructure changes
Affordable
Don’t force unnecessary
trade-offs between cost and
availability
Flexible
Customize protections
for your applications
Always-On Detection
and Mitigation
Minimize impact on application
latency
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
2015 2016 2017
for CloudFront for ALB
for EC2/NLBfor CloudFront,
Route 53, ELB
AWS WAF
AWS Shield Advanced
~2006
AWS Shield Standard : Protect Amazon.com & AWS Infrastructure
Our journey so far ….
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Layer 3/4 Protection for Everyone
 Automatic defense against the most common network and transport
layer DDoS attacks for any AWS resource, in any AWS Region
 Comprehensive defense against all known network and transport layer
attacks when using Amazon CloudFront and Amazon Route 53
 SYN Floods, UDP Floods, Reflection Attacks, etc.
Layer 7 Protection Available via AWS WAF
 Self-service & pay-as-you-go
 Flexible rule language
 Fast rule propagation
AWS Shield
Standard
AWS WAF
AWS Shield
Standard
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF available on
Amazon CloudFront Application Load Balancer
(ALB)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Popular deployment modes
1. Custom Rules 3. Security Automation2. Managed Rules
Or use any combination of the above …
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Deploy in 3 easy steps
Find rules on AWS WAF
console or AWS
marketplace
Click and
subscribe
Associate rules in
AWS WAF
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced:
Enhanced Protection
• Layer 7 attack detection (HTTP Floods,
DNS Query Floods)
• Baselining and Anomaly detection
• Enhanced Layer 3 attack detection
• Granular detection thresholds (for regional
services EC2/ELB only)
• Proprietary packet filtering stacks
• Suspicion-based filtering
• Advanced mitigations like SYN Throttling
• Pre-configured mitigations according to
resource type
• Customer defined Mitigations
• Traffic Engineering for Large DDoS Attacks
• Network ACLs executed at the border for EIPs
Detection Mitigation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced:
DDoS Response Team (DRT)
• DDoS Architecture Review
• Fire Drills and Game Days
• Custom mitigation templates for
EIPs (EC2/NLBs)
• Automatically engaged for availability
impacting L3/4 events
• Customer driven support cases through
AWS Support or AWS Shield Engagement
Lambda
• Incident triaging
• Manual traffic engineering
For more sophisticated and complex attacks
Pre-emptive
Engagements
24x7 Incident
Response
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced:
Visibility
• Real time CloudWatch
metrics for Alerting
• 15 different metrics
• Multiple vectors - SYN
flood, HTTP flood, and
others
• Attack Details for Triaging
• Top IP address, ASN, Geo,
Referrer, etc.
• HTTP Request samples
• Automate Incident
Response with AWS WAF
rules
• AWS-wide trends of
threats updated hourly
• Largest attack seen,
popular vector, etc.
• Threat Level Indicator
• Trends over last 2 weeks, 3
days, or 24 hours
CloudWatch Metrics Diagnostic Reports Global Threat Reporting
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield
Standard & Advanced
Built-in DDoS
Protection for
Everyone
Enhanced Protection
24x7 access to
DDoS Response
Team (DRT)
CloudWatch Metrics Attack Diagnostics
Global threat
environment
dashboard
DDoS
Expertise
Visibility &
Compliance
Economic
Benefits
AWS WAF at no
additional cost
for protected resources
AWS Firewall
Manager
at no additional cost
Cost Protection for
scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Load
Balancer
Classic Load
Balancer
Amazon
CloudFront
Amazon
Route 53
EC2 Instances
Network Load
Balancer
 Northern Virginia (us-east-1)
 Oregon (us-west-2)
 San Francisco (us-west-1)
 Ireland (eu-west-1)
 Tokyo (ap-northeast-1)
 Sydney (ap-southeast-2)
 Frankfurt (eu-central-1)
 Ohio (us-east-2)
In the these 8 regionsAvailable for 6 AWS services
Elastic IP Address
AWS Shield
Advanced
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced
Look who has already seen value…..
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Reference Architectures
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS-Resilient Architecture
Amazon
Route 53
ALB Security Group
Amazon
EC2
Instances
Application
Load Balancer
Amazon
CloudFront
Public Subnet
Web Application
Security Group
Private Subnet
AWS WAF
Amazon
API Gateway
DDoS
Attack
Users
Globally distributed attack
mitigation capability
SYN proxy feature that verifies
three-way handshake before
passing to the application
Slowloris mitigation that reaps
long-lived collections
Mitigates complex attacks by
allowing only the most reliable
DNS queries
Validates DNS
Provides flexible rule language
to block or rate-limit malicious
requests
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Session-Based Game Architecture
Security Group
Amazon
EC2
Instances
Network Load
Balancer
Public Subnet
Web Application
Security Group
Private Subnet
DDoS
Attack
Users
AWS Shield Elastic IP
Address
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Best Practices
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Releasing a new Title or Service:
Best Practice Checklist
Questions to answer
 Are all the internet facing resources protected?
 Am I monitoring the right metrics?
 Do I know what to do if there is impact as a
result of a DDoS attack?
Register all internet facing resources
 Route53 Hosted Zones
 CloudFront Distributions
 Load Balancers (Classic, Application, Network)
 Exposed EC2 Instances
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Releasing a new Title or Service:
Best Practice Checklist
Questions to answer
 Are all the internet facing resources protected?
 Am I monitoring the right metrics?
 Do I know what to do if there is impact as a
result of a DDoS attack?
Setup your CloudWatch Alarms
 Attack Detected Metrics
 Update your scripts to register against Shield
Advanced API/CLI
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Questions to answer
 Are all the internet facing resources protected?
 Am I monitoring the right metrics?
 Do I know what to do if there is impact as a
result of a DDoS attack?
Grant the DDoS Response Team Permissions
 Easy to deploy CloudFormation Template per
AWS Account
Releasing a new Title or Service:
Best Practice Checklist
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Releasing a new Title or Service:
Best Practice Checklist
Conduct a readiness test / fire-drill call
 Test Shield Engagement Lambda
 Simulated Shield Alarm
 Runbook Validation
Questions to answer
 Are all the internet facing resources protected?
 Am I monitoring the right metrics?
 Do I know what to do if there is impact as a
result of a DDoS attack?
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Export record of trusted sources
 Users Authenticated
 From workflow or S3 triggered Lambda
 Game-day whitelist implementation
Another Best Practice:
Build a trust list
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demonstration
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank You!
bit.ly/GetStartedWithAWSShieldAdvanced

Mais conteúdo relacionado

Mais procurados

SRV206 Edge Computing with AWS Greengrass
 SRV206 Edge Computing with AWS Greengrass SRV206 Edge Computing with AWS Greengrass
SRV206 Edge Computing with AWS GreengrassAmazon Web Services
 
DEM06 How Demandbase Cut Its Container Costs by 79%
DEM06 How Demandbase Cut Its Container Costs by 79%DEM06 How Demandbase Cut Its Container Costs by 79%
DEM06 How Demandbase Cut Its Container Costs by 79%Amazon Web Services
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Amazon Web Services
 
Using Containers and Serverless to Deploy Microservices
Using Containers and Serverless to Deploy MicroservicesUsing Containers and Serverless to Deploy Microservices
Using Containers and Serverless to Deploy MicroservicesAmazon Web Services
 
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksHow to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksAmazon Web Services
 
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Amazon Web Services
 
AWS Summit Benelux 2013 - Enterprise Applications on AWS
AWS Summit Benelux 2013 - Enterprise Applications on AWSAWS Summit Benelux 2013 - Enterprise Applications on AWS
AWS Summit Benelux 2013 - Enterprise Applications on AWSAmazon Web Services
 
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
 Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage BehindAmazon Web Services
 
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech Talks
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech TalksBuilding an Immersive VR Streaming Solution on AWS - AWS Online Tech Talks
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech TalksAmazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS CloudDEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS CloudAmazon Web Services
 
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...
 ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre... ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...Amazon Web Services
 
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...Amazon Web Services
 
Replicate and Manage Data Using Managed Databases and Serverless Technologies
Replicate and Manage Data Using Managed Databases and Serverless Technologies Replicate and Manage Data Using Managed Databases and Serverless Technologies
Replicate and Manage Data Using Managed Databases and Serverless Technologies Amazon Web Services
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Amazon Web Services
 
ENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSAmazon Web Services
 
IOT203_Getting Started with AWS IoT
IOT203_Getting Started with AWS IoTIOT203_Getting Started with AWS IoT
IOT203_Getting Started with AWS IoTAmazon Web Services
 
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud Amazon Web Services
 

Mais procurados (20)

SRV206 Edge Computing with AWS Greengrass
 SRV206 Edge Computing with AWS Greengrass SRV206 Edge Computing with AWS Greengrass
SRV206 Edge Computing with AWS Greengrass
 
DEM06 How Demandbase Cut Its Container Costs by 79%
DEM06 How Demandbase Cut Its Container Costs by 79%DEM06 How Demandbase Cut Its Container Costs by 79%
DEM06 How Demandbase Cut Its Container Costs by 79%
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
 
Using Containers and Serverless to Deploy Microservices
Using Containers and Serverless to Deploy MicroservicesUsing Containers and Serverless to Deploy Microservices
Using Containers and Serverless to Deploy Microservices
 
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksHow to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
 
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
 
AWS Summit Benelux 2013 - Enterprise Applications on AWS
AWS Summit Benelux 2013 - Enterprise Applications on AWSAWS Summit Benelux 2013 - Enterprise Applications on AWS
AWS Summit Benelux 2013 - Enterprise Applications on AWS
 
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
 Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
 
AWS Storage and Edge Processing
AWS Storage and Edge ProcessingAWS Storage and Edge Processing
AWS Storage and Edge Processing
 
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech Talks
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech TalksBuilding an Immersive VR Streaming Solution on AWS - AWS Online Tech Talks
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech Talks
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS CloudDEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
 
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...
 ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre... ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...
 
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
 
Replicate and Manage Data Using Managed Databases and Serverless Technologies
Replicate and Manage Data Using Managed Databases and Serverless Technologies Replicate and Manage Data Using Managed Databases and Serverless Technologies
Replicate and Manage Data Using Managed Databases and Serverless Technologies
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
 
ENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWSENT208 Transform your Business with VMware Cloud on AWS
ENT208 Transform your Business with VMware Cloud on AWS
 
IOT203_Getting Started with AWS IoT
IOT203_Getting Started with AWS IoTIOT203_Getting Started with AWS IoT
IOT203_Getting Started with AWS IoT
 
SRV321 Deep Dive on Amazon EBS
SRV321 Deep Dive on Amazon EBSSRV321 Deep Dive on Amazon EBS
SRV321 Deep Dive on Amazon EBS
 
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
 

Semelhante a Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks

Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...Amazon Web Services
 
Introduction to VMware Cloud on AWS
Introduction to VMware Cloud on AWSIntroduction to VMware Cloud on AWS
Introduction to VMware Cloud on AWSAmazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSAmazon Web Services
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)Amazon Web Services
 
Introduction to Hybrid Cloud on AWS - AWS Online Tech Talks
Introduction to Hybrid Cloud on AWS - AWS Online Tech TalksIntroduction to Hybrid Cloud on AWS - AWS Online Tech Talks
Introduction to Hybrid Cloud on AWS - AWS Online Tech TalksAmazon Web Services
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 

Semelhante a Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks (20)

Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
 
Introduction to VMware Cloud on AWS
Introduction to VMware Cloud on AWSIntroduction to VMware Cloud on AWS
Introduction to VMware Cloud on AWS
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWS
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
 
Hybrid Cloud on AWS
Hybrid Cloud on AWSHybrid Cloud on AWS
Hybrid Cloud on AWS
 
Introduction to Hybrid Cloud on AWS - AWS Online Tech Talks
Introduction to Hybrid Cloud on AWS - AWS Online Tech TalksIntroduction to Hybrid Cloud on AWS - AWS Online Tech Talks
Introduction to Hybrid Cloud on AWS - AWS Online Tech Talks
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Shawn Marck, DDoS Response Team Protect Your Game Servers From DDoS Attacks
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda D D o S T h r e a t s & T r e n d s A W S a p p r o a c h t o D D o S m i t i g a t i o n A W S S h i e l d S t a n d a r d a n d A d v a n c e d R e f e r e n c e A r c h i t e c t u r e s & B e s t P r a c t i c e s C u s t o m e r R e f e r e n c e s & L i v e D e m o AWS Shield
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS Attack Threats and Trends
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of Threats Bad BotsDDoS Application Attacks Reflection Layer 4 floods Slowloris SSL abuse HTTP floods Amplification Content scrapers Scanners & probes Crawlers SQL injection Application exploits Social engineering Sensitive data exposureApplication Layer Network / Transport Layer
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of Threats Bad BotsDDoS Application Attacks Reflection Layer 4 floods Slowloris SSL abuse HTTP floods Amplification Content scrapers Scanners & probes Crawlers SQL injection Application exploits Social engineering Sensitive data exposureApplication Layer Network / Transport Layer
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS Threats Network / Transport Layer DDoS
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS Threats Application DDoS Clients Attackers Web server Database
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 0 200 400 600 800 1000 1200 1400 1600 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Largest DDoS Attacks (Gbps) Memcached Attacks Mirai Attacks DDoS Attack Trends
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS Threats and Trends AWS Shield detects and mitigates 1,000’s of DDoS Attacks Daily Source: AWS Global Threat Dashboard (Available for AWS Shield Advanced customers)
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Availability Financial Impact Security Why does it matter? • Flooding game servers can impact performance and drastically degrade the player experience. • Attacks can last for hours, even days • Stealing or misusing data• An attack that brings down your server will end up as Lost Revenue • You could massively scale but that just translates to Increased Infrastructure Expense • Even without an actual attack DDoS threats are being use for Extortion • Any combination of these results in a hit to your reputation
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 1 • Complex to Set up • Need to Provision additional capacity • Re-architect applications D i f f i c u l t t o E n a b l e 2 • Manual Intervention required • Re-routing traffic to scrubbing locations S u b - O p t i m a l I n c i d e n t R e s p o n s e 3 Scrubbing centers may be far from your servers leading to added latency D e g r a d e p e r f o r m a n c e 4 Manual intervention and re-routing takes away precious moments from incident response I n c r e a s e d T i m e t o M i t i g a t e 5 Due to the size, duration and complex nature of mitigation systems it becomes prohibitively expensive in some cases E x p e n s i v e t o U s e Traditional Challenges of DDoS Mitigation
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Approach to DDoS protection
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Evolution of DDoS Mitigation On-Premise Cloud-Routed Cloud-Native
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. On-Premise • Scale network and fixed infrastructure to mitigate DDoS attacks on-site • Visibility and control • Large capital expenditures, maintenance costs, and in-house expertise
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud-Routed • Route traffic to other networks for better mitigation capacity, managed services • Mitigate larger DDoS attacks without upfront investment or in-house expertise • Black box solution – can introduce latency, additional points of failure, increased operating costs
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud-Native • Automatic, always-on DDoS protection for all applications on AWS • Leverage 18 AWS Regions and over 100 Edge Locations to mitigate large attacks close to the source • Simple, flexible, and affordable • Robust capabilities without undifferentiated heavy-lifting
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Four Pillars of our approach to DDoS Protection AWS Integration DDoS protection without infrastructure changes Affordable Don’t force unnecessary trade-offs between cost and availability Flexible Customize protections for your applications Always-On Detection and Mitigation Minimize impact on application latency
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2015 2016 2017 for CloudFront for ALB for EC2/NLBfor CloudFront, Route 53, ELB AWS WAF AWS Shield Advanced ~2006 AWS Shield Standard : Protect Amazon.com & AWS Infrastructure Our journey so far ….
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Layer 3/4 Protection for Everyone  Automatic defense against the most common network and transport layer DDoS attacks for any AWS resource, in any AWS Region  Comprehensive defense against all known network and transport layer attacks when using Amazon CloudFront and Amazon Route 53  SYN Floods, UDP Floods, Reflection Attacks, etc. Layer 7 Protection Available via AWS WAF  Self-service & pay-as-you-go  Flexible rule language  Fast rule propagation AWS Shield Standard AWS WAF AWS Shield Standard
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF available on Amazon CloudFront Application Load Balancer (ALB)
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Popular deployment modes 1. Custom Rules 3. Security Automation2. Managed Rules Or use any combination of the above …
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Deploy in 3 easy steps Find rules on AWS WAF console or AWS marketplace Click and subscribe Associate rules in AWS WAF
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced: Enhanced Protection • Layer 7 attack detection (HTTP Floods, DNS Query Floods) • Baselining and Anomaly detection • Enhanced Layer 3 attack detection • Granular detection thresholds (for regional services EC2/ELB only) • Proprietary packet filtering stacks • Suspicion-based filtering • Advanced mitigations like SYN Throttling • Pre-configured mitigations according to resource type • Customer defined Mitigations • Traffic Engineering for Large DDoS Attacks • Network ACLs executed at the border for EIPs Detection Mitigation
  • 29. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 30. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced: DDoS Response Team (DRT) • DDoS Architecture Review • Fire Drills and Game Days • Custom mitigation templates for EIPs (EC2/NLBs) • Automatically engaged for availability impacting L3/4 events • Customer driven support cases through AWS Support or AWS Shield Engagement Lambda • Incident triaging • Manual traffic engineering For more sophisticated and complex attacks Pre-emptive Engagements 24x7 Incident Response
  • 31. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 32. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced: Visibility • Real time CloudWatch metrics for Alerting • 15 different metrics • Multiple vectors - SYN flood, HTTP flood, and others • Attack Details for Triaging • Top IP address, ASN, Geo, Referrer, etc. • HTTP Request samples • Automate Incident Response with AWS WAF rules • AWS-wide trends of threats updated hourly • Largest attack seen, popular vector, etc. • Threat Level Indicator • Trends over last 2 weeks, 3 days, or 24 hours CloudWatch Metrics Diagnostic Reports Global Threat Reporting
  • 33. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 34. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 35. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard & Advanced Built-in DDoS Protection for Everyone Enhanced Protection 24x7 access to DDoS Response Team (DRT) CloudWatch Metrics Attack Diagnostics Global threat environment dashboard DDoS Expertise Visibility & Compliance Economic Benefits AWS WAF at no additional cost for protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling
  • 36. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Load Balancer Classic Load Balancer Amazon CloudFront Amazon Route 53 EC2 Instances Network Load Balancer  Northern Virginia (us-east-1)  Oregon (us-west-2)  San Francisco (us-west-1)  Ireland (eu-west-1)  Tokyo (ap-northeast-1)  Sydney (ap-southeast-2)  Frankfurt (eu-central-1)  Ohio (us-east-2) In the these 8 regionsAvailable for 6 AWS services Elastic IP Address AWS Shield Advanced
  • 37. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced Look who has already seen value…..
  • 38. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Reference Architectures
  • 39. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS-Resilient Architecture Amazon Route 53 ALB Security Group Amazon EC2 Instances Application Load Balancer Amazon CloudFront Public Subnet Web Application Security Group Private Subnet AWS WAF Amazon API Gateway DDoS Attack Users Globally distributed attack mitigation capability SYN proxy feature that verifies three-way handshake before passing to the application Slowloris mitigation that reaps long-lived collections Mitigates complex attacks by allowing only the most reliable DNS queries Validates DNS Provides flexible rule language to block or rate-limit malicious requests
  • 40. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Session-Based Game Architecture Security Group Amazon EC2 Instances Network Load Balancer Public Subnet Web Application Security Group Private Subnet DDoS Attack Users AWS Shield Elastic IP Address
  • 41. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Best Practices
  • 42. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Releasing a new Title or Service: Best Practice Checklist Questions to answer  Are all the internet facing resources protected?  Am I monitoring the right metrics?  Do I know what to do if there is impact as a result of a DDoS attack? Register all internet facing resources  Route53 Hosted Zones  CloudFront Distributions  Load Balancers (Classic, Application, Network)  Exposed EC2 Instances
  • 43. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Releasing a new Title or Service: Best Practice Checklist Questions to answer  Are all the internet facing resources protected?  Am I monitoring the right metrics?  Do I know what to do if there is impact as a result of a DDoS attack? Setup your CloudWatch Alarms  Attack Detected Metrics  Update your scripts to register against Shield Advanced API/CLI
  • 44. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Questions to answer  Are all the internet facing resources protected?  Am I monitoring the right metrics?  Do I know what to do if there is impact as a result of a DDoS attack? Grant the DDoS Response Team Permissions  Easy to deploy CloudFormation Template per AWS Account Releasing a new Title or Service: Best Practice Checklist
  • 45. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Releasing a new Title or Service: Best Practice Checklist Conduct a readiness test / fire-drill call  Test Shield Engagement Lambda  Simulated Shield Alarm  Runbook Validation Questions to answer  Are all the internet facing resources protected?  Am I monitoring the right metrics?  Do I know what to do if there is impact as a result of a DDoS attack?
  • 46. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Export record of trusted sources  Users Authenticated  From workflow or S3 triggered Lambda  Game-day whitelist implementation Another Best Practice: Build a trust list
  • 47. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demonstration
  • 48. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank You! bit.ly/GetStartedWithAWSShieldAdvanced