distributed denial of service introduction

14
Distributed Denial of Service attacks (DDoS) 101

Upload: wremes

Post on 26-May-2015

414 views

Category:

Technology


4 download

DESCRIPTION

presentation on DDoS and potential countermeasures for enterprise applications.

TRANSCRIPT

Page 1: Distributed Denial Of Service Introduction

Distributed Denial of Service attacks(DDoS)

101

Page 2: Distributed Denial Of Service Introduction

History Basic Protection

Advanced

Protectio

n

What is it?

Next Steps

AGENDA

Page 3: Distributed Denial Of Service Introduction

Examples

2002

DNS root serversattacked

2007

DNS attacks

Estoniaattacks

2010 2012

commercialtargets

Page 4: Distributed Denial Of Service Introduction

What is it?

too many requests...can’t handle* this actually happened at a CCC congress in Berlin

Page 5: Distributed Denial Of Service Introduction

infrastructure backupinfrastructure

application

What is it?

L1 L1

L2

L2’

L2’

Level 1 : Network-based (D)DoSLevel 2 : Application-level (D)DoSLevel 2’ : Economic (D)DoS

Process (D)DoS

Page 6: Distributed Denial Of Service Introduction

What is it?

@

c

c

c

c

c

cc

cc

c

c

c

c

c

main backup

s s s s s s

L1infrastucture

some terminology:•node•command&control•recruitment•attrition•rate of growth/decay:

Page 7: Distributed Denial Of Service Introduction

What is it?

L2application

server

web

app

app

server

db server

db

db

<?xml version="1.0"?><!DOCTYPE lolz [ <!ENTITY lol "lol"> <!ENTITY lol2 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"> <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"> <!ENTITY lol6 "&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;"> <!ENTITY lol7 "&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;"> <!ENTITY lol8 "&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;"> <!ENTITY lol9 "&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;">]><lolz>&lol9;</lolz>

Page 8: Distributed Denial Of Service Introduction

Basic

Protection

@

c

c

c

c

c

cc

cc

c

c

c

c

c

main backup

ISP

ONPREMISE s

s

s

s

s

s

CDNcontent

distributionnetwork

- hardware limitations- no control over bandwidth- limited ‘intelligence’

- hardware limitations+ (some) control over bandwidth+ increased ‘intelligence’

+ no hardware limitations+ no bandwidth limits+ intelligence

Page 9: Distributed Denial Of Service Introduction

appserver

web

app

server

db server

db

db

Advanced

Protection

centralized mgmt

secureconfig

secureconfig

secureconfig

secure config

Web Application Firewall

SDLC- cloud- “devops”

Page 10: Distributed Denial Of Service Introduction

APPDN

S SSL

XML

Advanced

Protection

Page 11: Distributed Denial Of Service Introduction

Next

Steps?

process

Incident Response

• Prepare• Integrate service providers• “know your enemy”

Duringan attack

• Containment• Communications• Business Continuity

After the attack

• Return to normal operations• lessons learned• forensics

Page 12: Distributed Denial Of Service Introduction

Next

Steps?

quick wins

★ Build standard security components★ encryption★ AuthN/AuthZ★ Logging★ Input/Output validation★ ...

★ Automate standardized processes (leverage tech)★ deployment (including vuln scanning)★ load balancing

Page 13: Distributed Denial Of Service Introduction

Q&A

Page 14: Distributed Denial Of Service Introduction

some terminology:•node•a computer ‘recruited’ to the botnet and controlled by the botnet owner.

•command&control (C2)•a ‘central’ authority controlling the botnet, providing the nodes with instructions.

•recruitment•the methods used by the botnet owner to add nodes to his botnet.

•attrition•the loss of nodes from the botnet.

•rate of growth/decay: size + recruitment - attrition