SlideShare a Scribd company logo
The Morphing DDoS and Bot Landscape
Featuring Guest Speaker from IDC
What you will learn today
2
How is DDoS evolving? Why should bot management
also be part of your DDoS
mitigation strategy?
How Cloudflare helps you
address these challenges
Today’s Speakers
Timothy Fong
Product Marketing Lead,
Security Solutions @
Cloudflare
Romain Fouchereau
Manager, Security
Appliance Program,
European Systems and
Infrastructure Solutions @
IDC
We are helping
build a better
Internet
4
5
Cloudflare Security Vision
Provide world-class visibility, controls, and guided
configurations so that customers of any size and
technical sophistication can keep their Internet property
safe and secure without sacrificing speed and
performance
5
A Global Anycast Network
175+Data centers globally
2.8B
Monthly active visitors
generating 1.3 trillion
page view
10%Internet requests
everyday
8MRequests/second
websites, apps & APIs
in 150+ countries
14M+
2x
Speed up each
request by
Rate
Limiting
SSL
L3/4 DDoS
Protection
`
We secure traffic end-to-end, providing a layered
defense
Request Passed!
Bot
Management
WAFDNS/DNSSEC
Argo
Tunnel
7
Orbit Spectrum
EXTEND
WorkersAccess
CONTROL
7
L7 DDoS
Protection
Factors increasing exposure to security risks
Greater scrutiny by
government and media
around data, privacy
and security
Greater attack surface area
from more public APIs, moving
to the cloud, and increasing
third-party integrations
Stronger and more
sophisticated attackers
IDC MarketScape: WW DDoS Prevention Solutions
IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a
rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The
Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer
requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the icons.
Cloudflare is positioned as a
Leader
in the IDC MarketScape:
Worldwide DDoS Prevention
Solutions 2019 Assessment
According to IDC, Cloudflare Strengths are its
"unique architecture" and "rapid on-boarding
process which is considered one of the easiest
and fastest in the industry."
Source: IDC MarketScape: Worldwide DDoS Prevention Solutions 2019
Vendor Assessment, by Martha Vazquez, March 2019, IDC
#US43699318
Report Link: here
Romain Fouchereau is a Manager in IDC's Security Appliance Program,
European Systems and Infrastructure Solutions. He specializes in monitoring
the security server appliance market in Western Europe and maintains IDC’s
extensive tracker product for this technology.
Specific technology focus areas include network security (including unified
threat management, firewall, IDP) and content management appliances. Of
particular focus for Fouchereau is the development, evolution, and
penetration of this technology and the approaches vendors are taking to
stimulate adoption both at channel and end-user level.
10© IDC
Today’s Presenter
© IDC 11
Three Security Mega Drivers in Europe
Dynamic
Threat
Landscape
Regulatory
Upheaval
Digital
Transformation
Top Trends in Today’s DDoS Attacks
12© IDC
▪ Volumetric attack; TCP exhaustion ; Application layer; Multi-vector
▪ Volumetric to various
types of DDoS
attacks, such as TCP
exhaustion ,
application layer,
multi-vector
▪ IoT connected
devices is becoming
a major force
behind DDoS attacks
▪ Highly profitable
and low entry (e.g.
Script Kiddies)
▪ Convergence of
DDoS attack and
fraud (e.g. targeting
at business logics)
Prominent Types of DDoS Attacks
13© IDC
Q. What type of attacks did you experience?
Source: IDC DDoS Prevention Survey, January 2018, n=140
• TCP exhaustion (focuses on web servers, firewalls, and
load balancers to disrupt connections, thus exhausting
the finite number of concurrent connections devices
can support)
• Application layer attacks (also known as Layer 7 attacks,
specifically targets weaknesses in an application or
server with the goal of establishing a connection and
exhausting it by monopolizing processes and
transactions)
• Multivector attacks (combine volumetric attacks, stateful
exhaustion attacks, and application-layer attacks)
• DDoS attacks with ransom requests
• DDoS attacks as smoke screen
Over 50% of Respondents Had Been Attacked Between 1-10 Times in the Past Year
With Over 60% Attacks Lasting an Average of 0-10 Hours
14© IDC
Q. How frequently did your organization experience a DDoS attack in the past year?
Q. If you experienced a DDoS attack, on average, how long did the attack last?
Source: DDoS Prevention Survey, January 2018, IDC
Frequency of Attacks Duration of Attacks
© IDC 15
Significant market developments
More targeted
attacks
Evolution of
the attacks
Internet of
Things & 5G
E-commerce, E-gaming
CX
High Cost
Botnet protection
More Complex
Larger
Multi-Vector
More sophisticated
Part of larger illegal
activity
Easy targets
Consumer devices have
no security
Huge scale of available
new devices
© IDC 16
Bot Management
Looking
beyond DDoS
attacks:
Bot Activity
▪ Search engine bots
▪ Partner systems
▪ Web indexing
▪ Archiving
▪ Data collection
▪ Inventory hoarding
▪ Ad fraud / Skewed
metrics
▪ Scalping
▪ Credential stuffing
▪ Account takeover
▪ Others (?)
© IDC 17
DDOS attacks headlines in Europe
© IDC 18
European Market Sizing
Source: Western Europe DDoS Protection Forecast, 2018-2022
▪ Growing demand for
DDoS mitigation
products and
solutions in Europe at
+13.8% CAGR through
2022
▪ Cloud services
growing faster and
representing 2/3 of
the total market
© IDC 19
European Trends
▪ Cloud providers adoption and MSSP growth
▪ IoT growth will only increase DDoS attacks
▪ European organisation increase DDoS Protection
spending
▪ DDoS as smokescreen
▪ Beyond DDoS protection, need for Bot management
▪ Get the facts. To assess the imminent risk and determine what action to take and, perhaps more importantly,
communicate to senior management, you must determine who, what, where, when, and how at a broad level.
▪ Identify, friend or foe. With facts in hand, now you can determine whether your organization is a target, in line
for collateral damage, or reasonably unaffected.
▪ Take action. If you haven't planned for an outage or the attack exceeds your capacity, your immediate response
options are limited to network reconfiguration or isolation (e.g., pulling the plug).
▪ Spread the (accurate) word. With major outages, communication is key. Remember, there could be all sorts of
rumors spreading that can only be addressed with specifics of the organization's plan.
▪ Kick the tires. Even if your organization is not the target, these are excellent real-world scenarios that allow
organizations to work through their protection mechanisms as if they are affected.
▪ Watch your back. Perhaps the more insidious opportunity for attackers during big splashy failures like these is to
execute targeted attacks undercover, using the event as a distraction.
▪ Be a good neighbor. In today's interconnected world, your technical presence on the internet affects others.
Downstream liability due to perceived negligence is a budding concern for many.
© IDC 20
The CIOs’ Seven-Step Checklist for Internet Availability
Source: IDC #US41895416, Nov2016 DNS DDoS Debacle: The CIO's Seven-Step Checklist for Internet Availability
Timothy Fong
Security Lead, Product Marketing Manager @ Cloudflare
Industry Legacy Scrubbing vs. Cloudflare Always-On
22
Industry Legacy Scrubbing
- Long propagation times (up to 300 sec)
- Asynchronous routing
- Adds significant latency
- Typically requires manual intervention
Always-On
- Zero propagation time
- Synchronous routing
- No added latency
- Immediate, automated mitigation,
with no “cut over” required
Cloudflare DDoS Solution
23
Protect Non HTTP Ports
Spectrum protects non-
HTTP ports open to the
Internet with the same
distributed architecture
Custom Rate Limiting
Customers can tune
Layer 7 protections to
their specific
applications and traffic
profile through rate
limiting rules.
Resilient DNS
Cloudflare’s resilient
DNS protects customers
from going down
because their DNS is
overwhelmed by a
volumetric attack.
Always On DDoS
With automatic
heuristics and a
distributed Anycast
network, Cloudflare’s
Always On DDoS detects
and mitigates Layer ¾
and Layer 7 attacks at
scale.
Cloudflare DDoS Differentiation
24
Easy Deployment
Easy to turn-on
protections that mitigate
within minutes and
remain “always on”
without requiring
ongoing maintenance or
configuration.
Integrated
Our integration with Bot
Management and
Firewall Rules gives
additional capabilities
from a single control
plane.
Scale
As our network
continues to grows, so
does our capacity and
data-driven insight to
block attacks
automatically.
Bot Management Use Cases
Attempts to log into and
take-over a user’s
account by automatically
applying previously
stolen account
credentials
Steals public information
from a website
Adds malicious content to
web properties such as
forums and registration
forms
Credential
Stuffing
Content
Scraping
Content
Spam
Fraudulently purchases
goods to deprive legitimate
customers or resell for a
higher price
Inventory
Hoarding
Credit Card
Stuffing
Tries to validate stolen
credit cards to then
make fraudulent
purchases
25
Cloudflare Bot Management
One-Click Deployment
● With a single click, deploy rules with Cloudflare recommended bot score thresholds
● No instrumentation with third-party JavaScript required
Control and Configurability
● Scope rules by path or URI pattern, request method, and bot score thresholds
● Select mitigation methods, such as log, CAPTCHA, or block
Rich Analytics and Logs
● Time-series graphs with drill-down tables
● Logs bot management rule, action, and rich request meta-data for every request
Detect and mitigate bad bots by leveraging intelligence from over 14 million Internet
properties. All with one click.
Cloudflare Bot Management Methods
Machine Learning
Cloudflare’s ML trains on a
curated subset of more than
475 billion requests per day
across 14M+ Internet properties
to create a reliable “bot score” for
every request.
Behavioral Analysis
Behavioral analysis detects
anomalies in site-specific traffic,
scoring every request on how
different it is from the baseline.
Automatic Whitelist
Because not all bots are bad,
the solution automatically
maintains and updates a
white list of "good" bots, such
as those belonging to search
engines.
Mobile SDK
The mobile SDK prevents
attacks against mobile
application APIs by
impersonation and emulation
bots.
27
Detection Protection
Cloudflare Bot Management Differentiation
28
Integrated Complete not Complex
Cloudflare Bot Management is best-in-class
both as a stand-alone solution and as
integrated with WAF and DDoS protection:
● Streamlines deployment by integrating
with a CDN and smart routing for origin
traffic.
● Shares control plane through UI and API
with WAF and Firewall Rules for better
consistency and lower context switching
● Gives a holistic view through common
analytics and logs
Deploys a bot management solution against a
full range of bot attacks with a single click:
● Deploys protections against content/price
scraping, credential and credit card
stuffing, content spam, and inventory
hoarding -- all in one click.
● Fingerprints all traffic without requiring
Javascript injection
● Suggested rules work out-of-the box. No
fiddling and endless configuration required
to get solid results
Smart Data
Cloudflare Bot Management leverages the
trillions of requests per day processed from
protecting 14M+ Internet properties:
● Machine learning trains on data curated
from 475B requests per day and analyzed
on a state-of-the-art GPU cluster
● Our data set contains traffic from over 150
countries
● Learnings from one website are
immediately applied to the whole network
Summary
29
How DDoS is evolving Why should bot management
also be part of your DDoS
mitigation strategy
How Cloudflare helps you
address these challenges
Questions?
Thank You

More Related Content

PPTX
What You're Missing With Your Current WAF Provider
PPTX
Recent DDoS attack trends, and how you should respond
PPTX
The Advent of Serverless Technologies
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PPTX
Network Transformation: What it is, and how it’s helping companies stay secur...
PDF
Stopping DDoS Attacks in North America
PPTX
Strengthening security posture for modern-age SaaS providers
PPTX
Accelerate your digital transformation
What You're Missing With Your Current WAF Provider
Recent DDoS attack trends, and how you should respond
The Advent of Serverless Technologies
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Network Transformation: What it is, and how it’s helping companies stay secur...
Stopping DDoS Attacks in North America
Strengthening security posture for modern-age SaaS providers
Accelerate your digital transformation

What's hot (20)

PPTX
Fight bad bot on the internet
PDF
A Different Approach to Securing Your Cloud Journey
PPTX
Bring speed and security to the intranet with cloudflare for teams
PPTX
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
PPTX
Application layer attack trends through the lens of Cloudflare data
PPTX
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
PPTX
Cyber Security 101
PPTX
The 2019 Security Strategy
PPTX
Why you should replace your d do s hardware appliance
PPTX
Cyber security fundamentals (Cantonese)
PPTX
Authentication, Security, and Performance for the Internet of Things
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PPTX
Scaling service provider business with DDoS-mitigation-as-a-service
PPTX
Close your security gaps and get 100% of your traffic protected with Cloudflare
PPTX
Going Beyond the Cloud to Modernize Your Banking Infrastructure
PPTX
Cyber security fundamentals
PPTX
Zero trust for everybody: 3 ways to get there fast
PPTX
Filling the Gaps in Your DDoS Mitigation Strategy
PPTX
Stopping DDoS Attacks In South Africa
PDF
How to Plan for Performance and Scale for Multiplayer Games
Fight bad bot on the internet
A Different Approach to Securing Your Cloud Journey
Bring speed and security to the intranet with cloudflare for teams
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Application layer attack trends through the lens of Cloudflare data
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cyber Security 101
The 2019 Security Strategy
Why you should replace your d do s hardware appliance
Cyber security fundamentals (Cantonese)
Authentication, Security, and Performance for the Internet of Things
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Scaling service provider business with DDoS-mitigation-as-a-service
Close your security gaps and get 100% of your traffic protected with Cloudflare
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Cyber security fundamentals
Zero trust for everybody: 3 ways to get there fast
Filling the Gaps in Your DDoS Mitigation Strategy
Stopping DDoS Attacks In South Africa
How to Plan for Performance and Scale for Multiplayer Games
Ad

Similar to The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC (20)

PPTX
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
DOCX
DDoS Report.docx
PDF
comparing-approaches-for-web-dns-infrastructure-security-white-paper
PDF
Level 3 Security solutions
PDF
The role of DDoS Providers
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
PDF
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
PDF
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
PDF
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
DOCX
ITSecurity_DDOS_Mitigation
PDF
a-guide-to-ddos-2015-2
PDF
Introduction of Cloudflare Solution for Mobile Payment
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PPT
ICRTITCS-2012 Conference Publication
PPTX
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
PDF
HaltDos DDoS Protection Solution
PPTX
The evolution of IT in a cloud world
PPT
UTM Unified Threat Management
PDF
Toward Continuous Cybersecurity With Network Automation
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
DDoS Report.docx
comparing-approaches-for-web-dns-infrastructure-security-white-paper
Level 3 Security solutions
The role of DDoS Providers
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
The_Forrester_Wave_DDoS_S 2015Q3.PDF
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
ITSecurity_DDOS_Mitigation
a-guide-to-ddos-2015-2
Introduction of Cloudflare Solution for Mobile Payment
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
ICRTITCS-2012 Conference Publication
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
HaltDos DDoS Protection Solution
The evolution of IT in a cloud world
UTM Unified Threat Management
Toward Continuous Cybersecurity With Network Automation
Ad

More from Cloudflare (10)

PDF
Succeeding with Secure Access Service Edge (SASE)
PPTX
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
PPTX
Why Zero Trust Architecture Will Become the New Normal in 2021
PPTX
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PPTX
It’s 9AM... Do you know what’s happening on your network?
PPTX
Cyber security fundamentals (simplified chinese)
PPTX
Cloudflareのソリューションを使用して悪意のあるBot対策
PPTX
Webinar - Cyber Security basics in Japanese
PDF
How to Build a Practical and Cost-Effective Security Strategy
Succeeding with Secure Access Service Edge (SASE)
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Why Zero Trust Architecture Will Become the New Normal in 2021
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cybersecurity 2020 threat landscape and its implications (AMER)
It’s 9AM... Do you know what’s happening on your network?
Cyber security fundamentals (simplified chinese)
Cloudflareのソリューションを使用して悪意のあるBot対策
Webinar - Cyber Security basics in Japanese
How to Build a Practical and Cost-Effective Security Strategy

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
A Presentation on Touch Screen Technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Approach and Philosophy of On baking technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
project resource management chapter-09.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Group 1 Presentation -Planning and Decision Making .pptx
A Presentation on Touch Screen Technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A novel scalable deep ensemble learning framework for big data classification...
Approach and Philosophy of On baking technology
WOOl fibre morphology and structure.pdf for textiles
project resource management chapter-09.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
OMC Textile Division Presentation 2021.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
1 - Historical Antecedents, Social Consideration.pdf
Tartificialntelligence_presentation.pptx
Mushroom cultivation and it's methods.pdf
Hindi spoken digit analysis for native and non-native speakers
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Heart disease approach using modified random forest and particle swarm optimi...

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC

  • 1. The Morphing DDoS and Bot Landscape Featuring Guest Speaker from IDC
  • 2. What you will learn today 2 How is DDoS evolving? Why should bot management also be part of your DDoS mitigation strategy? How Cloudflare helps you address these challenges
  • 3. Today’s Speakers Timothy Fong Product Marketing Lead, Security Solutions @ Cloudflare Romain Fouchereau Manager, Security Appliance Program, European Systems and Infrastructure Solutions @ IDC
  • 4. We are helping build a better Internet 4
  • 5. 5 Cloudflare Security Vision Provide world-class visibility, controls, and guided configurations so that customers of any size and technical sophistication can keep their Internet property safe and secure without sacrificing speed and performance 5
  • 6. A Global Anycast Network 175+Data centers globally 2.8B Monthly active visitors generating 1.3 trillion page view 10%Internet requests everyday 8MRequests/second websites, apps & APIs in 150+ countries 14M+ 2x Speed up each request by
  • 7. Rate Limiting SSL L3/4 DDoS Protection ` We secure traffic end-to-end, providing a layered defense Request Passed! Bot Management WAFDNS/DNSSEC Argo Tunnel 7 Orbit Spectrum EXTEND WorkersAccess CONTROL 7 L7 DDoS Protection
  • 8. Factors increasing exposure to security risks Greater scrutiny by government and media around data, privacy and security Greater attack surface area from more public APIs, moving to the cloud, and increasing third-party integrations Stronger and more sophisticated attackers
  • 9. IDC MarketScape: WW DDoS Prevention Solutions IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the icons. Cloudflare is positioned as a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Assessment According to IDC, Cloudflare Strengths are its "unique architecture" and "rapid on-boarding process which is considered one of the easiest and fastest in the industry." Source: IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment, by Martha Vazquez, March 2019, IDC #US43699318 Report Link: here
  • 10. Romain Fouchereau is a Manager in IDC's Security Appliance Program, European Systems and Infrastructure Solutions. He specializes in monitoring the security server appliance market in Western Europe and maintains IDC’s extensive tracker product for this technology. Specific technology focus areas include network security (including unified threat management, firewall, IDP) and content management appliances. Of particular focus for Fouchereau is the development, evolution, and penetration of this technology and the approaches vendors are taking to stimulate adoption both at channel and end-user level. 10© IDC Today’s Presenter
  • 11. © IDC 11 Three Security Mega Drivers in Europe Dynamic Threat Landscape Regulatory Upheaval Digital Transformation
  • 12. Top Trends in Today’s DDoS Attacks 12© IDC ▪ Volumetric attack; TCP exhaustion ; Application layer; Multi-vector ▪ Volumetric to various types of DDoS attacks, such as TCP exhaustion , application layer, multi-vector ▪ IoT connected devices is becoming a major force behind DDoS attacks ▪ Highly profitable and low entry (e.g. Script Kiddies) ▪ Convergence of DDoS attack and fraud (e.g. targeting at business logics)
  • 13. Prominent Types of DDoS Attacks 13© IDC Q. What type of attacks did you experience? Source: IDC DDoS Prevention Survey, January 2018, n=140 • TCP exhaustion (focuses on web servers, firewalls, and load balancers to disrupt connections, thus exhausting the finite number of concurrent connections devices can support) • Application layer attacks (also known as Layer 7 attacks, specifically targets weaknesses in an application or server with the goal of establishing a connection and exhausting it by monopolizing processes and transactions) • Multivector attacks (combine volumetric attacks, stateful exhaustion attacks, and application-layer attacks) • DDoS attacks with ransom requests • DDoS attacks as smoke screen
  • 14. Over 50% of Respondents Had Been Attacked Between 1-10 Times in the Past Year With Over 60% Attacks Lasting an Average of 0-10 Hours 14© IDC Q. How frequently did your organization experience a DDoS attack in the past year? Q. If you experienced a DDoS attack, on average, how long did the attack last? Source: DDoS Prevention Survey, January 2018, IDC Frequency of Attacks Duration of Attacks
  • 15. © IDC 15 Significant market developments More targeted attacks Evolution of the attacks Internet of Things & 5G E-commerce, E-gaming CX High Cost Botnet protection More Complex Larger Multi-Vector More sophisticated Part of larger illegal activity Easy targets Consumer devices have no security Huge scale of available new devices
  • 16. © IDC 16 Bot Management Looking beyond DDoS attacks: Bot Activity ▪ Search engine bots ▪ Partner systems ▪ Web indexing ▪ Archiving ▪ Data collection ▪ Inventory hoarding ▪ Ad fraud / Skewed metrics ▪ Scalping ▪ Credential stuffing ▪ Account takeover ▪ Others (?)
  • 17. © IDC 17 DDOS attacks headlines in Europe
  • 18. © IDC 18 European Market Sizing Source: Western Europe DDoS Protection Forecast, 2018-2022 ▪ Growing demand for DDoS mitigation products and solutions in Europe at +13.8% CAGR through 2022 ▪ Cloud services growing faster and representing 2/3 of the total market
  • 19. © IDC 19 European Trends ▪ Cloud providers adoption and MSSP growth ▪ IoT growth will only increase DDoS attacks ▪ European organisation increase DDoS Protection spending ▪ DDoS as smokescreen ▪ Beyond DDoS protection, need for Bot management
  • 20. ▪ Get the facts. To assess the imminent risk and determine what action to take and, perhaps more importantly, communicate to senior management, you must determine who, what, where, when, and how at a broad level. ▪ Identify, friend or foe. With facts in hand, now you can determine whether your organization is a target, in line for collateral damage, or reasonably unaffected. ▪ Take action. If you haven't planned for an outage or the attack exceeds your capacity, your immediate response options are limited to network reconfiguration or isolation (e.g., pulling the plug). ▪ Spread the (accurate) word. With major outages, communication is key. Remember, there could be all sorts of rumors spreading that can only be addressed with specifics of the organization's plan. ▪ Kick the tires. Even if your organization is not the target, these are excellent real-world scenarios that allow organizations to work through their protection mechanisms as if they are affected. ▪ Watch your back. Perhaps the more insidious opportunity for attackers during big splashy failures like these is to execute targeted attacks undercover, using the event as a distraction. ▪ Be a good neighbor. In today's interconnected world, your technical presence on the internet affects others. Downstream liability due to perceived negligence is a budding concern for many. © IDC 20 The CIOs’ Seven-Step Checklist for Internet Availability Source: IDC #US41895416, Nov2016 DNS DDoS Debacle: The CIO's Seven-Step Checklist for Internet Availability
  • 21. Timothy Fong Security Lead, Product Marketing Manager @ Cloudflare
  • 22. Industry Legacy Scrubbing vs. Cloudflare Always-On 22 Industry Legacy Scrubbing - Long propagation times (up to 300 sec) - Asynchronous routing - Adds significant latency - Typically requires manual intervention Always-On - Zero propagation time - Synchronous routing - No added latency - Immediate, automated mitigation, with no “cut over” required
  • 23. Cloudflare DDoS Solution 23 Protect Non HTTP Ports Spectrum protects non- HTTP ports open to the Internet with the same distributed architecture Custom Rate Limiting Customers can tune Layer 7 protections to their specific applications and traffic profile through rate limiting rules. Resilient DNS Cloudflare’s resilient DNS protects customers from going down because their DNS is overwhelmed by a volumetric attack. Always On DDoS With automatic heuristics and a distributed Anycast network, Cloudflare’s Always On DDoS detects and mitigates Layer ¾ and Layer 7 attacks at scale.
  • 24. Cloudflare DDoS Differentiation 24 Easy Deployment Easy to turn-on protections that mitigate within minutes and remain “always on” without requiring ongoing maintenance or configuration. Integrated Our integration with Bot Management and Firewall Rules gives additional capabilities from a single control plane. Scale As our network continues to grows, so does our capacity and data-driven insight to block attacks automatically.
  • 25. Bot Management Use Cases Attempts to log into and take-over a user’s account by automatically applying previously stolen account credentials Steals public information from a website Adds malicious content to web properties such as forums and registration forms Credential Stuffing Content Scraping Content Spam Fraudulently purchases goods to deprive legitimate customers or resell for a higher price Inventory Hoarding Credit Card Stuffing Tries to validate stolen credit cards to then make fraudulent purchases 25
  • 26. Cloudflare Bot Management One-Click Deployment ● With a single click, deploy rules with Cloudflare recommended bot score thresholds ● No instrumentation with third-party JavaScript required Control and Configurability ● Scope rules by path or URI pattern, request method, and bot score thresholds ● Select mitigation methods, such as log, CAPTCHA, or block Rich Analytics and Logs ● Time-series graphs with drill-down tables ● Logs bot management rule, action, and rich request meta-data for every request Detect and mitigate bad bots by leveraging intelligence from over 14 million Internet properties. All with one click.
  • 27. Cloudflare Bot Management Methods Machine Learning Cloudflare’s ML trains on a curated subset of more than 475 billion requests per day across 14M+ Internet properties to create a reliable “bot score” for every request. Behavioral Analysis Behavioral analysis detects anomalies in site-specific traffic, scoring every request on how different it is from the baseline. Automatic Whitelist Because not all bots are bad, the solution automatically maintains and updates a white list of "good" bots, such as those belonging to search engines. Mobile SDK The mobile SDK prevents attacks against mobile application APIs by impersonation and emulation bots. 27 Detection Protection
  • 28. Cloudflare Bot Management Differentiation 28 Integrated Complete not Complex Cloudflare Bot Management is best-in-class both as a stand-alone solution and as integrated with WAF and DDoS protection: ● Streamlines deployment by integrating with a CDN and smart routing for origin traffic. ● Shares control plane through UI and API with WAF and Firewall Rules for better consistency and lower context switching ● Gives a holistic view through common analytics and logs Deploys a bot management solution against a full range of bot attacks with a single click: ● Deploys protections against content/price scraping, credential and credit card stuffing, content spam, and inventory hoarding -- all in one click. ● Fingerprints all traffic without requiring Javascript injection ● Suggested rules work out-of-the box. No fiddling and endless configuration required to get solid results Smart Data Cloudflare Bot Management leverages the trillions of requests per day processed from protecting 14M+ Internet properties: ● Machine learning trains on data curated from 475B requests per day and analyzed on a state-of-the-art GPU cluster ● Our data set contains traffic from over 150 countries ● Learnings from one website are immediately applied to the whole network
  • 29. Summary 29 How DDoS is evolving Why should bot management also be part of your DDoS mitigation strategy How Cloudflare helps you address these challenges