stallion 141113 · pdf fileforce captcha ! ! ! ! ! slow connection ! ! ! ! ! simulate broken...

24
IT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

Upload: lamnga

Post on 12-Mar-2018

227 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

IT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

Page 2: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

2

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

Content Guides: T: 2.5 B: 2.95 L&R: 4.5

JUNIPER TODAY

2012 Revenue: $4.4 Billion

Global Presence: Offices In 47 Countries

+9000 Employees

#4 In Ethernet Switching #3 In Edge Routing

#2 In Core Routing, SP Routing, Network Security

#1 In High-end Firewall

Doing Business With 100% Of Fortune 100

Powering 6 Of The World’s 7 Largest Stock Exchanges

Mission: Build the BEST

Page 3: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

3

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

COMMITTED TO INNOVATION AND INVESTMENT

Security is core to our business at Juniper

Juniper R&D is 23% of revenues – a figure no one else in the industry comes close to on a percentage basis New in 2012: WebApp Secure - A differentiated approach to security with our Intrusion Deception capabilities New in 2013: Juniper DDoS Secure to prevent volumetric and “low and slow” DDoS attacks

Market Leader

Remote Access SSL VPN

High-End Firewalls

Network Security

$1B global

revenue

#1

Dedicated Innovator

Global Powerhouse

#1

#3

Serving customers in 47 countries, with a worldwide community of over 1000 Reseller Partners

Infonetics Research 2012

Page 4: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

1 Introduction Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 5: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

2 NGFW Use Cases Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 6: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

3 Protecting Campus/Branch Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 7: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

4 Egress vs. Ingress Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 8: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

5 DDoS & AppDoS Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 9: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

6 Web App Security Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 10: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

7 Certainty Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 11: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

8 Specificity Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 12: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

9 Spotlight & Next Steps Ju

nipe

r Pro

prie

tary

& C

onfid

entia

l – D

istri

butio

n or

Rep

rodu

ctio

n P

rohi

bite

d

Securing Web Applications in the Datacenter

Page 13: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS Junos WebApp Secure Junos Spotlight Secure

Page 14: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

16

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

“Tar Traps” detect threats without false

positives.

Track IPs, browsers, software and scripts.

Understand attacker’s capabilities

and intents.

Adaptive responses, including block,

warn and deceive.

THE JUNOS WEBAPP SECURE ADVANTAGE DECEPTION-BASED SECURITY

Detect Track Profile Respond

Page 15: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

17

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

App Server Client

Server  Configura-on  

Network Perimeter

Database Firewall

Query  String  Parameters  

Tar Traps

Hidden  Input  Fields  

DETECTION BY DECEPTION

Page 16: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

18

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

FINGERPRINT OF AN ATTACKER

Browser version

Fonts

Browser add-ons

Timezone

IP Address

attributes used to create the fingerprint.

200+

False Positives

availability of fingerprints

~ Real Time

nearly zero

Page 17: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

19

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

Attacker local name

(on machine)

SMART PROFILE OF ATTACKER

Incident history

Attacker threat level

Attacker global name

(in Spotlight)

Page 18: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

20

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

JUNOS SPOTLIGHT SECURE

Attacker from San Francisco

Junos Spotlight Secure Global Attacker Intelligence Service

Junos WebApp Secure protected site in UK

Attacker fingerprint uploaded

Attacker fingerprint available for all sites protected by Junos

WebApp Secure

Detect Anywhere, Stop Everywhere

Page 19: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

21

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

Junos WebApp Secure Responses

Human Hacker Botnet

Targeted Scan IP Scan

Scripts &Tools

Exploits

Warn attacker l

Block user l l l l l

Force CAPTCHA l l l l l

Slow connection l l l l l

Simulate broken application l l l l l

Force log-out l l l All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat.

RESPOND AND DECEIVE

Page 20: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

22

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

Internal

Virtualized

Cloud

UNIFIED PROTECTION ACROSS PLATFORMS

Page 21: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

INTRODUCTION TO JUNOS DDOS SECURE Advanced DDoS Mitigation Technology

Page 22: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

24

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

DDOS SECURE

Junos DDoS Secure Heuristic Analysis

DDoS Attack Traffic Management PC

Normal Internet Traffic

DDoS Attack Traffic

Normal Internet Traffic

Resources

Normal Internet Traffic

Comprehensive DDoS prevention •  Identifies and deters DDoS attacks,

including those targeting specific apps •  Ensures availability for legitimate users

while blocking malicious traffic, even under the most extreme attack conditions

What’s unique? •  80% effective 10 minutes after installation •  99.999% effective after 6-12 hours •  Dynamic Heuristic Technology •  Delivered in 1Gb to 40Gb HA appliances •  Multi tenanted and fully IPv6 compliant

  Prevents volumetric and “low and slow” DDoS attacks

Page 23: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx

26

Copyright © 2013 Juniper Networks, Inc. www.juniper.net

JUNOS DDoS SECURE VARIANTS

§ 1U 100M/1G/3G/10G

§ 10U 40G

§ Standalone

§ Fail-safe Card §  Fiber (1G SX/LX 10G SR/LR)

§  Copper (10M/100M/1G)

§ Active – Standby

§ Active – Active (Asymmetric Routing)

§ VMware Instance

Variants

Page 24: Stallion 141113  · PDF fileForce CAPTCHA ! ! ! ! ! Slow connection ! ! ! ! ! Simulate broken application ! ! ! ! ! Force log-out ! ! ! All ... Stallion 141113 Presentation.pptx