SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
© 2015 Imperva, Inc. All rights reserved.
An Inside Look at a Sophisticated,
Multi-vector DDoS Attack
Orion Cassetto, Dir. of Product Marketing, Incapsula
June 2015
© 2015 Imperva, Inc. All rights reserved.
Agenda
•  What is Imperva Incapsula
•  Overview of DDoS attacks
•  DDoS attack trends
•  Anatomy of a sophisticated DDoS attack
•  Lessons learned
2
© 2015 Imperva, Inc. All rights reserved.
Speaker Bio for Orion Cassetto
•  Background
–  8+ years experience with web application security
and SaaS security solutions
–  Held product marketing roles at Imperva, Incapsula, Armorize
Technologies, etc.
•  Contact:
•  Twitter:@orionevolution
•  Email: Orion@incapsula.com
3
Imperva products
Products that cover both Protect and Comply
Partners
User Rights
Management for File
Data Loss
Prevention
SecureSphere
File Firewall
File Activity
Monitor
SecureSphere Database
Assessment Server
SecureSphere
Database Firewall
SecureSphere
for Big Data
SecureSphere Database
Activity Monitor
User Rights
Management
Data Masking
Vulnerability
Assessment
Incapsula
Back Door Detection
Incapsula
Website Security
SecureSphere
WAF ThreatRadar
Skyfence
Cloud Discovery
Skyfence
Cloud Analytics
Skyfence
Cloud Protection
Skyfence
Cloud Governance
Incapsula
Infrastructure Protection
Incapsula
Website Protection
Incapsula
Name Server Protection
SecureSphere
WAF
© 2015 Imperva, Inc. All rights reserved.
Incapsula Overview
5
PerformanceSecurity Availability
Solving Top Operational Problems
Delivered from the Cloud
© 2015 Imperva, Inc. All rights reserved.
Incapsula Application Delivery Cloud
6
© 2015 Imperva, Inc. All rights reserved.
An Overview of DDoS Attacks
1
7
© 2015 Imperva, Inc. All rights reserved.
DDoS Attacks in the News
8
© 2015 Imperva, Inc. All rights reserved.
What is a DDoS Attack
•  DDoS attacks
–  Are performed by large groups of infected computers (botnets)
–  Usually require special tools or services to defend against
9
Legitimate
Traffic
Your Site
Your Internet
Connection
Your ISP
DDoS Bots
An attack that makes your websites or online infrastructure completely inaccessible
© 2015 Imperva, Inc. All rights reserved.
DDoS Attack Landscape Trends
10
The number of DDoS attacks in 2014 vs. 2013
2x	
  
Average DDoS attack size in
2014
15Gbps	
  
© 2015 Imperva, Inc. All rights reserved.
What Are the Main Types of DDoS Attacks?
11
•  Network layer DDoS attacks
•  Consume all available upload and download bandwidth to prevent access to websites
“Clogging the
Pipe to a
website” Your Site
Your Internet
Connection
Your ISP
© 2015 Imperva, Inc. All rights reserved.
What Are the Main Types of DDoS Attacks?
12
•  Application layer DDoS attacks
–  Application requests overwhelm the Web server or database causing it to crash
–  The website then becomes unavailable
“Overloading
The
Server” Your Site
Your Internet
Connection
Your ISP
Application layer requests
© 2015 Imperva, Inc. All rights reserved.
Who Is Performing These DDoS Attacks?
13
Extortionists
Looking for ransom money
Vandals
Looking to cause trouble
Hacktivists
Looking to make a point
Competitors
Looking to keep you out of a deal
© 2015 Imperva, Inc. All rights reserved.
What Is the Impact of a DDoS Attack Cost?
14
Average  Cost  of
DDoS  A0ack
$40,000per hour
45%
of organizations
are attacked
75%
Are attacked
more than once
91%
Were attacked in
the last 12 months
10%
Are attacked on
a weekly basis
© 2015 Imperva, Inc. All rights reserved.
The Anatomy of a Sophisticated DDoS Attack
2
15
© 2015 Imperva, Inc. All rights reserved.
The Target of the Attack
•  Successful SaaS platform
•  Very competitive industry – Online trading
•  Multi-tenant environment; Attacks on a
single tenant impact all other tenants
16
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 1 – SYN Flood
•  30Gbps SYN Flood (Volumetric / Network Layer attack)
•  Typical of any DDoS attack
–  Easy to perform (given the resources)
•  No DNS amplification was used
17
© 2015 Imperva, Inc. All rights reserved.
SYN Flood DDoS Trends from Q2 DDoS Report
•  SYN floods and Large-SYN
floods are two of the top
three DDoS attack vectors
by
–  Frequency
–  Size
18
Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 1 – Mitigation
•  Geo-distribution of attack
traffic
–  Sharing the load
•  Dedicated networking
capabilities to deal with
volumetric attacks
•  Aggressive blacklisting of
offending IP addresses
19
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 2 – HTTP Flood
•  HTTP Flood DDoS attack with 10M requests per second
•  Targeting “resource intensive” pages
•  “The smoke screen” for other application layer attacks
–  This type and level of attack persisted for weeks
20
© 2015 Imperva, Inc. All rights reserved.
Application DDoS Trends from Q2 DDoS Report
•  In Q2 2015 we saw that
application layer attacks
were
–  Shorter in duration than the
past
–  More frequently recurring
21
Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 2 – Mitigation
•  Employ anti-bot technology
•  Use non-intrusive progressive challenges to
differentiate legit browsers vs. bots
–  IP Address and ASN Info
–  Cookie Support Variations
–  JavaScript Challenges
–  CAPTCHA
Further notes
•  Be transparent, don’t punish humans
•  Be bot friendly (good bots like Google, Baidu, still
need access)
22
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 3 – An AJAX Attack
•  Primary target – the database
•  AJAX requests can sometimes bypass JS Challenges
•  Requests were targeting separate sub services in a
“registered users only” area of the application
•  Used hijacked cookies to make heavy AJAX requests
23
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 3 – Mitigation
•  Visitor reputation techniques
•  Detecting abnormal behavioral patterns
–  Order and frequency of requests
–  Interaction between clients and servers
–  JavaScript Injection to actively classify clients
24
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 4 – On Demand Browser Barrage
•  The symptoms:
–  Huge spike in browser based traffic
–  Browser windows popping up in people’s PCs
–  Innocent people contacting Incapsula “You’re hijacking my PC!”
•  Initial response – CAPTCHA Challenges
•  Post-mortem analysis conclusion
–  A PushDo botnet with 20k bots was opening real browsers on hijacked computers,
pointing them at the target application
25
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 4 – Mitigation
•  Reverse engineering the trojan
•  Crafting a signature to identify and block the bots
26
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 5 – Headless Browsers
•  The symptoms:
–  150 hours of spike in browser based traffic
–  180,000 new IP sources
–  861 variants
•  Headless browsers leveraging “Phantom JS” were being used to emulate real
users
–  Generating 700 Million requests per day
27
© 2015 Imperva, Inc. All rights reserved.
Application DDoS Attack Results from Q2 DDoS Report
In Q2 2015 the largest application layer DDoS attack we saw had 179,712
RPS (that’s 15,527,116,800 requests per day)
28
Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
© 2015 Imperva, Inc. All rights reserved.
Attack Phase 5 – Mitigation
•  Reverse engineering the Phantom JS kit
•  Crafting a signature to identify and block all bots using this kit
29
© 2015 Imperva, Inc. All rights reserved.
Findings from Q2 2015 Global DDoS Threat Landscape Report
•  In Q2 botnet owners displayed more
ability to assume identities to avoid
detection
•  Roughly 74% of application DDoS
attack bots are still primitive
30
© 2015 Imperva, Inc. All rights reserved.
Attack Analysis Conclusions
•  DDoS attacks are becoming more like APTs
•  It is an ongoing cat-and-mouse game
•  Attacks can last for weeks and reappear repeatedly
•  Don’t expect to have a silver bullet
31
© 2015 Imperva, Inc. All rights reserved.
Five Lessons Learned
3
32
© 2015 Imperva, Inc. All rights reserved.
Attacks are Increasing in Size, So Should Your Defense Capability
•  Network layer DDoS attacks are getting bigger
•  You’re defenses need to be able to deal with multi-
gigabit attacks
•  Select a provider with a large scrubbing network
33
Past	
   Present	
  
© 2015 Imperva, Inc. All rights reserved.
Don’t Punish Your Users
•  Your users don’t need to know or care if you are under
attack
•  People don’t like to hang out in dangerous places
•  DDoS attacks should be mitigated in a way that
doesn’t
–  Cause delays (no hold screens)
–  Require extra steps (no CAPTCHAs or Splash screens)
–  Serve outdated content
34
© 2015 Imperva, Inc. All rights reserved.
Fail-open for Humans
•  All human users should be able to bypass protection mechanisms
•  Legitimate users should be given an opportunity to
–  Express concern or complain if they are affected
–  Prove they are legitimate with a CAPTCHA
35
© 2015 Imperva, Inc. All rights reserved.
Automation
•  Automated, always on solutions should be
used whenever possible
–  Web assets should be monitored for attacks
24x7
–  Identification is always on
•  Always on doesn’t mean always “locked
down”
–  DDoS rules should be on call but not
implemented until necessary
–  Mitigation is on when needed
36
© 2015 Imperva, Inc. All rights reserved.
Conclusions
•  Ensure you have enough network capacity
•  Invest in technology:
–  Rapid analysis tools
–  Instant patching infrastructure
–  Trial and error methodology
•  Keep up with your research
•  Have people at the wheel!
37
© 2015 Imperva, Inc. All rights reserved.
Want to Learn More?
Download the
Q2 2015 Global DDoS Threat Landscape Report
or
sign up for a free 14 day trial
by visiting www.incapsula.com
38
An Inside Look at a Sophisticated, Multi-vector DDoS Attack

Mais conteúdo relacionado

Mais procurados

Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud AttacksImperva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesSkybox Security
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItSkybox Security
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and OrchestrationGreg Foss
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
 
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack DemonstrationAlert Logic
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAAAlert Logic
 

Mais procurados (20)

Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and Orchestration
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAA
 

Destaque

Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 WorldTom Paseka
 
ASERT's DDoS Malware Corral, Volume 2
ASERT's DDoS Malware Corral, Volume 2ASERT's DDoS Malware Corral, Volume 2
ASERT's DDoS Malware Corral, Volume 2dschwarz_arbor
 
Implement API Gateway using Azure API Management
Implement API Gateway using Azure API ManagementImplement API Gateway using Azure API Management
Implement API Gateway using Azure API ManagementAlexander Laysha
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceImperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...ShortestPathFirst
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoSjgrahamc
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 

Destaque (17)

Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 World
 
ASERT's DDoS Malware Corral, Volume 2
ASERT's DDoS Malware Corral, Volume 2ASERT's DDoS Malware Corral, Volume 2
ASERT's DDoS Malware Corral, Volume 2
 
Implement API Gateway using Azure API Management
Implement API Gateway using Azure API ManagementImplement API Gateway using Azure API Management
Implement API Gateway using Azure API Management
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 

Semelhante a An Inside Look at a Sophisticated, Multi-vector DDoS Attack

Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREDeivid Toledo
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityImperva Incapsula
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalImperva
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentMarketingArrowECS_CZ
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksImperva
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016TierPoint
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 

Semelhante a An Inside Look at a Sophisticated, Multi-vector DDoS Attack (20)

Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack Survival
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser Attacks
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 

Mais de Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 

Mais de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

An Inside Look at a Sophisticated, Multi-vector DDoS Attack

  • 1. © 2015 Imperva, Inc. All rights reserved. An Inside Look at a Sophisticated, Multi-vector DDoS Attack Orion Cassetto, Dir. of Product Marketing, Incapsula June 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. Agenda •  What is Imperva Incapsula •  Overview of DDoS attacks •  DDoS attack trends •  Anatomy of a sophisticated DDoS attack •  Lessons learned 2
  • 3. © 2015 Imperva, Inc. All rights reserved. Speaker Bio for Orion Cassetto •  Background –  8+ years experience with web application security and SaaS security solutions –  Held product marketing roles at Imperva, Incapsula, Armorize Technologies, etc. •  Contact: •  Twitter:@orionevolution •  Email: Orion@incapsula.com 3
  • 4. Imperva products Products that cover both Protect and Comply Partners User Rights Management for File Data Loss Prevention SecureSphere File Firewall File Activity Monitor SecureSphere Database Assessment Server SecureSphere Database Firewall SecureSphere for Big Data SecureSphere Database Activity Monitor User Rights Management Data Masking Vulnerability Assessment Incapsula Back Door Detection Incapsula Website Security SecureSphere WAF ThreatRadar Skyfence Cloud Discovery Skyfence Cloud Analytics Skyfence Cloud Protection Skyfence Cloud Governance Incapsula Infrastructure Protection Incapsula Website Protection Incapsula Name Server Protection SecureSphere WAF
  • 5. © 2015 Imperva, Inc. All rights reserved. Incapsula Overview 5 PerformanceSecurity Availability Solving Top Operational Problems Delivered from the Cloud
  • 6. © 2015 Imperva, Inc. All rights reserved. Incapsula Application Delivery Cloud 6
  • 7. © 2015 Imperva, Inc. All rights reserved. An Overview of DDoS Attacks 1 7
  • 8. © 2015 Imperva, Inc. All rights reserved. DDoS Attacks in the News 8
  • 9. © 2015 Imperva, Inc. All rights reserved. What is a DDoS Attack •  DDoS attacks –  Are performed by large groups of infected computers (botnets) –  Usually require special tools or services to defend against 9 Legitimate Traffic Your Site Your Internet Connection Your ISP DDoS Bots An attack that makes your websites or online infrastructure completely inaccessible
  • 10. © 2015 Imperva, Inc. All rights reserved. DDoS Attack Landscape Trends 10 The number of DDoS attacks in 2014 vs. 2013 2x   Average DDoS attack size in 2014 15Gbps  
  • 11. © 2015 Imperva, Inc. All rights reserved. What Are the Main Types of DDoS Attacks? 11 •  Network layer DDoS attacks •  Consume all available upload and download bandwidth to prevent access to websites “Clogging the Pipe to a website” Your Site Your Internet Connection Your ISP
  • 12. © 2015 Imperva, Inc. All rights reserved. What Are the Main Types of DDoS Attacks? 12 •  Application layer DDoS attacks –  Application requests overwhelm the Web server or database causing it to crash –  The website then becomes unavailable “Overloading The Server” Your Site Your Internet Connection Your ISP Application layer requests
  • 13. © 2015 Imperva, Inc. All rights reserved. Who Is Performing These DDoS Attacks? 13 Extortionists Looking for ransom money Vandals Looking to cause trouble Hacktivists Looking to make a point Competitors Looking to keep you out of a deal
  • 14. © 2015 Imperva, Inc. All rights reserved. What Is the Impact of a DDoS Attack Cost? 14 Average  Cost  of DDoS  A0ack $40,000per hour 45% of organizations are attacked 75% Are attacked more than once 91% Were attacked in the last 12 months 10% Are attacked on a weekly basis
  • 15. © 2015 Imperva, Inc. All rights reserved. The Anatomy of a Sophisticated DDoS Attack 2 15
  • 16. © 2015 Imperva, Inc. All rights reserved. The Target of the Attack •  Successful SaaS platform •  Very competitive industry – Online trading •  Multi-tenant environment; Attacks on a single tenant impact all other tenants 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Attack Phase 1 – SYN Flood •  30Gbps SYN Flood (Volumetric / Network Layer attack) •  Typical of any DDoS attack –  Easy to perform (given the resources) •  No DNS amplification was used 17
  • 18. © 2015 Imperva, Inc. All rights reserved. SYN Flood DDoS Trends from Q2 DDoS Report •  SYN floods and Large-SYN floods are two of the top three DDoS attack vectors by –  Frequency –  Size 18 Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
  • 19. © 2015 Imperva, Inc. All rights reserved. Attack Phase 1 – Mitigation •  Geo-distribution of attack traffic –  Sharing the load •  Dedicated networking capabilities to deal with volumetric attacks •  Aggressive blacklisting of offending IP addresses 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Attack Phase 2 – HTTP Flood •  HTTP Flood DDoS attack with 10M requests per second •  Targeting “resource intensive” pages •  “The smoke screen” for other application layer attacks –  This type and level of attack persisted for weeks 20
  • 21. © 2015 Imperva, Inc. All rights reserved. Application DDoS Trends from Q2 DDoS Report •  In Q2 2015 we saw that application layer attacks were –  Shorter in duration than the past –  More frequently recurring 21 Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
  • 22. © 2015 Imperva, Inc. All rights reserved. Attack Phase 2 – Mitigation •  Employ anti-bot technology •  Use non-intrusive progressive challenges to differentiate legit browsers vs. bots –  IP Address and ASN Info –  Cookie Support Variations –  JavaScript Challenges –  CAPTCHA Further notes •  Be transparent, don’t punish humans •  Be bot friendly (good bots like Google, Baidu, still need access) 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Attack Phase 3 – An AJAX Attack •  Primary target – the database •  AJAX requests can sometimes bypass JS Challenges •  Requests were targeting separate sub services in a “registered users only” area of the application •  Used hijacked cookies to make heavy AJAX requests 23
  • 24. © 2015 Imperva, Inc. All rights reserved. Attack Phase 3 – Mitigation •  Visitor reputation techniques •  Detecting abnormal behavioral patterns –  Order and frequency of requests –  Interaction between clients and servers –  JavaScript Injection to actively classify clients 24
  • 25. © 2015 Imperva, Inc. All rights reserved. Attack Phase 4 – On Demand Browser Barrage •  The symptoms: –  Huge spike in browser based traffic –  Browser windows popping up in people’s PCs –  Innocent people contacting Incapsula “You’re hijacking my PC!” •  Initial response – CAPTCHA Challenges •  Post-mortem analysis conclusion –  A PushDo botnet with 20k bots was opening real browsers on hijacked computers, pointing them at the target application 25
  • 26. © 2015 Imperva, Inc. All rights reserved. Attack Phase 4 – Mitigation •  Reverse engineering the trojan •  Crafting a signature to identify and block the bots 26
  • 27. © 2015 Imperva, Inc. All rights reserved. Attack Phase 5 – Headless Browsers •  The symptoms: –  150 hours of spike in browser based traffic –  180,000 new IP sources –  861 variants •  Headless browsers leveraging “Phantom JS” were being used to emulate real users –  Generating 700 Million requests per day 27
  • 28. © 2015 Imperva, Inc. All rights reserved. Application DDoS Attack Results from Q2 DDoS Report In Q2 2015 the largest application layer DDoS attack we saw had 179,712 RPS (that’s 15,527,116,800 requests per day) 28 Source: Imperva Incapsula - Q2 Global DDoS threat Landscape Report
  • 29. © 2015 Imperva, Inc. All rights reserved. Attack Phase 5 – Mitigation •  Reverse engineering the Phantom JS kit •  Crafting a signature to identify and block all bots using this kit 29
  • 30. © 2015 Imperva, Inc. All rights reserved. Findings from Q2 2015 Global DDoS Threat Landscape Report •  In Q2 botnet owners displayed more ability to assume identities to avoid detection •  Roughly 74% of application DDoS attack bots are still primitive 30
  • 31. © 2015 Imperva, Inc. All rights reserved. Attack Analysis Conclusions •  DDoS attacks are becoming more like APTs •  It is an ongoing cat-and-mouse game •  Attacks can last for weeks and reappear repeatedly •  Don’t expect to have a silver bullet 31
  • 32. © 2015 Imperva, Inc. All rights reserved. Five Lessons Learned 3 32
  • 33. © 2015 Imperva, Inc. All rights reserved. Attacks are Increasing in Size, So Should Your Defense Capability •  Network layer DDoS attacks are getting bigger •  You’re defenses need to be able to deal with multi- gigabit attacks •  Select a provider with a large scrubbing network 33 Past   Present  
  • 34. © 2015 Imperva, Inc. All rights reserved. Don’t Punish Your Users •  Your users don’t need to know or care if you are under attack •  People don’t like to hang out in dangerous places •  DDoS attacks should be mitigated in a way that doesn’t –  Cause delays (no hold screens) –  Require extra steps (no CAPTCHAs or Splash screens) –  Serve outdated content 34
  • 35. © 2015 Imperva, Inc. All rights reserved. Fail-open for Humans •  All human users should be able to bypass protection mechanisms •  Legitimate users should be given an opportunity to –  Express concern or complain if they are affected –  Prove they are legitimate with a CAPTCHA 35
  • 36. © 2015 Imperva, Inc. All rights reserved. Automation •  Automated, always on solutions should be used whenever possible –  Web assets should be monitored for attacks 24x7 –  Identification is always on •  Always on doesn’t mean always “locked down” –  DDoS rules should be on call but not implemented until necessary –  Mitigation is on when needed 36
  • 37. © 2015 Imperva, Inc. All rights reserved. Conclusions •  Ensure you have enough network capacity •  Invest in technology: –  Rapid analysis tools –  Instant patching infrastructure –  Trial and error methodology •  Keep up with your research •  Have people at the wheel! 37
  • 38. © 2015 Imperva, Inc. All rights reserved. Want to Learn More? Download the Q2 2015 Global DDoS Threat Landscape Report or sign up for a free 14 day trial by visiting www.incapsula.com 38