SlideShare a Scribd company logo
Radware DefenseFlow
The SDN Application That
Programs Networks for
DoS Security

Sales Presentation

April 2013
• DDoS Threat is Evolving
• Limitations of Legacy Out-Of-Path
  Deployments
• Radware DefenseFlow Solution
• Summary
US Banks Under Attack: From The News




                                  3
Anonymous Attacks Grow

                    Industry Security Survey
Which of the following motivation(s) are behind the DDoS/DoS
                 attacks that you experienced?
                          Ransoms
               Competition 5%
                    6%




              Angry users
                 10%


                                    Motivation is
                                     unknown
             Political/Hacktivism
                                       57%
                     22%




                                                                   4
Ponemon Research 2012:
         DDoS Attacks are Mainstream


of organizations had an average of 3
DDoS attacks in the past 12 months



Minutes average downtime during one
DDoS attack



Average cost per minute of downtime




Average annual cost of DDoS attacks



                                       5
Limitations of Netflow Based Mitigation



                                                              Netflow Based
                                 Capability
                                                                Mitigation
        Detection Network DDoS flood attacks                   Full coverage

        Mitigation Mitigation response time                  Slow – 5 Minutes

                    Requires BGP announcement, GRE                Slow
Network Operation                                              Complicated
                    tunneling and several detectors
                                                               Complicated
        Diversion Traffic granularity                         Low Granularity
                                                                Inaccurate
                    Requires hardware detectors
    Cost Effective Requires scrubbing center                    Expensive
                                                                Expensive
                    Consumes routers CPU and ports



                                                                                6
Introducing Radware DefenseFlow



                                   The SDN Application That
SDN Applications                   Programs Networks for
                                   DDoS Protection

                   API




 SDN Controller     Controller




                   OpenFlow API



SDN Data Plane


                                                    DefensePro



                                                                 7
DefenseFlow: The SDN Application That Programs
                                          Networks for DoS Security

                    Configure DefensePro
 Security Service   with learned baselines             Attack!!!
                                                      Create baselines per:
  provisioning
                                                     IP Address, Protocol &
 Programmable                                             Service (Port)
 Probe – Collect

    Detection
Analyze & Decide

 “Flow Diversion”                   SDN
                                Controller
     - Control




    Internet




                                             DefensePro




                                                                              Slide 8
DefenseFlow Vs. Netflow


                                            Netflow Based    Radware
                        Capability
                                              Mitigation     DefenseFlow
Detection Network DDoS flood attacks         Full coverage    Full Coverage

             Mitigation response time                          Immediate –
Mitigation                                   Slow – 5 Min
                                                                 seconds
          Requires BGP announcement,                             Simple -
 Network GRE tunneling and several              Slow
                                             Complicated       diversion is a
Operation detectors
                                             Complicated      network service

                                              Inaccurate    High Granularity
Diversion Traffic granularity               Low Granularity   – divert only
                                              Expensive
                                                            suspicious traffic

             Requires hardware detectors
     Cost
           Requires scrubbing center          Expensive         Low cost
 Effective
           Consumes routers CPU and ports                                       9
Operator Benefits


• Designed for attack mitigation
   – Attack detection is performed out of path
   – During attack period only suspicious traffic is
     diverted through mitigation device
• Scalable solution
   – DefensePro mitigation devices can be placed
     in any location
   – DefenseFlow diverts the traffic to the nearest
     mitigation device
• Easy provisioning
   – Adding protection policy to a customer in a
     few seconds
• Lowest cost solution
   – Detection as a native SDN stats collection
   – Diversion as a native SDN control operation


                                                                      10
Summary


• DDoS attacks are prevalent threat to
  every business and agency

• Current Netflow based solutions fail to
  offer cost effective solution

• DefenseFlow is a SDN application
  that programs networks for DDoS
  Protection, gaining:
    – Easy provisioning
    – Immediate attack detection
    – Low cost




                                                 11
Thank You
www.radware.com

More Related Content

PDF
Sdn&security
PDF
SDN Security Talk - (ISC)2_3
PPTX
The Potential Impact of Software Defined Networking SDN on Security
PDF
DDoS Attack Detection & Mitigation in SDN
PDF
SDN Security: Two Sides of the Same Coin
PPTX
Sdn pres v2-Software-defined networks
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
PDF
Attacking SDN infrastructure: Are we ready for the next gen networking
Sdn&security
SDN Security Talk - (ISC)2_3
The Potential Impact of Software Defined Networking SDN on Security
DDoS Attack Detection & Mitigation in SDN
SDN Security: Two Sides of the Same Coin
Sdn pres v2-Software-defined networks
Security of software defined networking (sdn) and cognitive radio network (crn)
Attacking SDN infrastructure: Are we ready for the next gen networking

What's hot (20)

DOCX
ODP
OWASP Brisbane - SDN Security
PPTX
SDN: is it a solution for network security?
PDF
DDoS Attack Preparation and Mitigation
PPTX
SDN - a new security paradigm?
DOCX
Entropy based DDos Detection in SDN
PDF
The New Landscape of Airborne Cyberattacks
PDF
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
PPTX
BsidesSP: Pentesting in SDN - Owning the Controllers
PPTX
Protection and Visibitlity of Encrypted Traffic by F5
PPTX
SDN and Named Data Networking Security
PDF
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
PDF
Lancope and-cisco-asa-for-advanced-security
PDF
44CON & Ruxcon: SDN security
PDF
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
PPTX
What's New in StealthWatch v6.5
PPTX
Software defined networking players
PPT
PDF
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
PPTX
Software defined security-framework_final
OWASP Brisbane - SDN Security
SDN: is it a solution for network security?
DDoS Attack Preparation and Mitigation
SDN - a new security paradigm?
Entropy based DDos Detection in SDN
The New Landscape of Airborne Cyberattacks
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
BsidesSP: Pentesting in SDN - Owning the Controllers
Protection and Visibitlity of Encrypted Traffic by F5
SDN and Named Data Networking Security
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Lancope and-cisco-asa-for-advanced-security
44CON & Ruxcon: SDN security
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
What's New in StealthWatch v6.5
Software defined networking players
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
Software defined security-framework_final
Ad

Similar to Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security (20)

PPTX
From liability to asset, the role you should be playing in your security arch...
PPTX
BIG-IP Data Center Firewall Solution
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PDF
S series presentation
PPT
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
PDF
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
PDF
Denial of Service - Service Provider Overview
PPTX
Floodlight tutorial - Clemson / Georgia Tech
PDF
Unit 08: Security for Web Applications
PDF
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
PPTX
Recent DDoS attack trends, and how you should respond
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
PDF
Secured Internet Gateway for ISP with pfsense & FRR
PDF
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
PPTX
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
PPT
Day4
PPTX
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
From liability to asset, the role you should be playing in your security arch...
BIG-IP Data Center Firewall Solution
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
S series presentation
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
Denial of Service - Service Provider Overview
Floodlight tutorial - Clemson / Georgia Tech
Unit 08: Security for Web Applications
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
Recent DDoS attack trends, and how you should respond
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Secured Internet Gateway for ISP with pfsense & FRR
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Day4
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
Ad

More from Radware (20)

PDF
Cyber Security Through the Eyes of the C-Suite (Infographic)
PDF
What’s the Cost of a Cyber Attack (Infographic)
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
PPTX
Radware Cloud Security Services
PDF
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
PDF
Radware Hybrid Cloud WAF Service
PDF
The Expanding Role and Importance of Application Delivery Controllers [Resear...
PDF
The Art of Cyber War [From Black Hat Brazil 2014]
PDF
The Real Cost of Slow Time vs Downtime
PPTX
Cyber Attack Survival: Are You Ready?
PDF
Radware ERT Threat Alert: Shellshock Bash
PDF
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
PDF
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
PDF
Emotional Engagement and Brand Perception
PDF
InfoSecurity Europe 2014: The Art Of Cyber War
PDF
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
PPTX
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
PPTX
In the Line of Fire - The Morphology of Cyber-Attacks
PDF
Survival in an Evolving Threat Landscape
PPTX
In the Line of Fire-the Morphology of Cyber Attacks
Cyber Security Through the Eyes of the C-Suite (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
DDoS Threat Landscape - Ron Winward CHINOG16
Radware Cloud Security Services
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware Hybrid Cloud WAF Service
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Art of Cyber War [From Black Hat Brazil 2014]
The Real Cost of Slow Time vs Downtime
Cyber Attack Survival: Are You Ready?
Radware ERT Threat Alert: Shellshock Bash
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Emotional Engagement and Brand Perception
InfoSecurity Europe 2014: The Art Of Cyber War
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
In the Line of Fire - The Morphology of Cyber-Attacks
Survival in an Evolving Threat Landscape
In the Line of Fire-the Morphology of Cyber Attacks

Recently uploaded (20)

PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
GamePlan Trading System Review: Professional Trader's Honest Take
Chapter 3 Spatial Domain Image Processing.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security

  • 1. Radware DefenseFlow The SDN Application That Programs Networks for DoS Security Sales Presentation April 2013
  • 2. • DDoS Threat is Evolving • Limitations of Legacy Out-Of-Path Deployments • Radware DefenseFlow Solution • Summary
  • 3. US Banks Under Attack: From The News 3
  • 4. Anonymous Attacks Grow Industry Security Survey Which of the following motivation(s) are behind the DDoS/DoS attacks that you experienced? Ransoms Competition 5% 6% Angry users 10% Motivation is unknown Political/Hacktivism 57% 22% 4
  • 5. Ponemon Research 2012: DDoS Attacks are Mainstream of organizations had an average of 3 DDoS attacks in the past 12 months Minutes average downtime during one DDoS attack Average cost per minute of downtime Average annual cost of DDoS attacks 5
  • 6. Limitations of Netflow Based Mitigation Netflow Based Capability Mitigation Detection Network DDoS flood attacks Full coverage Mitigation Mitigation response time Slow – 5 Minutes Requires BGP announcement, GRE Slow Network Operation Complicated tunneling and several detectors Complicated Diversion Traffic granularity Low Granularity Inaccurate Requires hardware detectors Cost Effective Requires scrubbing center Expensive Expensive Consumes routers CPU and ports 6
  • 7. Introducing Radware DefenseFlow The SDN Application That SDN Applications Programs Networks for DDoS Protection API SDN Controller Controller OpenFlow API SDN Data Plane DefensePro 7
  • 8. DefenseFlow: The SDN Application That Programs Networks for DoS Security Configure DefensePro Security Service with learned baselines Attack!!! Create baselines per: provisioning IP Address, Protocol & Programmable Service (Port) Probe – Collect Detection Analyze & Decide “Flow Diversion” SDN Controller - Control Internet DefensePro Slide 8
  • 9. DefenseFlow Vs. Netflow Netflow Based Radware Capability Mitigation DefenseFlow Detection Network DDoS flood attacks Full coverage Full Coverage Mitigation response time Immediate – Mitigation Slow – 5 Min seconds Requires BGP announcement, Simple - Network GRE tunneling and several Slow Complicated diversion is a Operation detectors Complicated network service Inaccurate High Granularity Diversion Traffic granularity Low Granularity – divert only Expensive suspicious traffic Requires hardware detectors Cost Requires scrubbing center Expensive Low cost Effective Consumes routers CPU and ports 9
  • 10. Operator Benefits • Designed for attack mitigation – Attack detection is performed out of path – During attack period only suspicious traffic is diverted through mitigation device • Scalable solution – DefensePro mitigation devices can be placed in any location – DefenseFlow diverts the traffic to the nearest mitigation device • Easy provisioning – Adding protection policy to a customer in a few seconds • Lowest cost solution – Detection as a native SDN stats collection – Diversion as a native SDN control operation 10
  • 11. Summary • DDoS attacks are prevalent threat to every business and agency • Current Netflow based solutions fail to offer cost effective solution • DefenseFlow is a SDN application that programs networks for DDoS Protection, gaining: – Easy provisioning – Immediate attack detection – Low cost 11

Editor's Notes

  • #6: Source: Cyber Security on the Offense:A Study of IT Security ExpertsCo-authored with RadwareIndependently conducted by Ponemon Institute LLCPublication Date: November 2012