SlideShare a Scribd company logo
Multi-vector DDOS Attacks
Detection and Mitigation
Paul Mazzucco
Chief Security Officer
January 2016
Key Reasons for Cyber Attacks
Source: Hackmagedden Source: Hackmagedden
4 months later …December 2014
DoS/DDoS Attacks New Cyber Weapon of Choice
Cyber Attack Sophistication Is Increasing
• Lower bandwidth attacks occur more
frequently, last longer, evade detection
- Overwhelm servers, take down site
• Multi-vector campaigns
- Booter services
- Dark DDoS attacks (smokescreens)
- Distract victims, other attacks infiltrate
corporate networks
- DDoS-as-a-Service business model
- Botnets for hire, $6/month
Cyber Attack Sophistication Is Increasing
• Lower bandwidth attacks occur more
frequently, last longer, evade detection
- Overwhelm servers, take down site
• Multi-vector campaigns
- Booter services
- Dark DDoS attacks (smokescreens)
- Distract victims, other attacks infiltrate
corporate networks
- DDoS-as-a-Service business model
- Botnets for hire, $6/month
Source: AkamaiSource: AkamaiSource: Imperva
The Industry Hit List
Drivers: the rise of the Internet of Things,
web vulnerabilities and botnet building
Choice Targets
• Competitive industries, e.g. gaming
• SaaS platforms, e.g. healthcare data
• Multi-tenant platforms: attacks on one
tenant impact all other tenants
Drivers: the rise of the Internet of Things,
web vulnerabilities and botnet building
Choice Targets
• Competitive industries, e.g. gaming
• SaaS platforms, e.g. healthcare data
• Multi-tenant platforms: attacks on one
tenant impact all other tenants Source: Akamai
20% of DDoS attacks last over 5 days
The longest attack in 2015 lasted 64 days
Lightening Often Strikes More Than Twice
50% of North American and European
companies have been attacked
• 83% of companies attacked repeatedly
• Star Trek Online (STO) – 3 times, Sept ‘15
• Neverwinter Online – 3 times, Sept ‘15
• 54% attacked 6+ times annually
• Rutgers Univ – 6 times in 2015
• 25% experienced theft of data or funds
• U.S. FTC has reached settlements with 50+
companies over poor data security practices
50% of North American and European
companies have been attacked
• 83% of companies attacked repeatedly
• Star Trek Online (STO) – 3 times, Sept ‘15
• Neverwinter Online – 3 times, Sept ‘15
• 54% attacked 6+ times annually
• Rutgers Univ – 6 times in 2015
• 25% experienced theft of data or funds
• U.S. FTC has reached settlements with 50+
companies over poor data security practices
Source: Akamai
Losses greater than 30,000 records
Source: Neustar and The Ponemon Institute
Where Are the Attacks Taking Place?
The 7 Layers of the OSI Model
Session attacks typically defeat
conventional firewalls
Source: Akamai
Infrastructure-layer DDoS attacks
outnumber application-layer attacks 9-to-1
Source: Akamai
• 88% of application-based attacks came
over HTTP
• 15% of organizations reported attacks
targeting Web application log in pages
on a daily basis
• UDP fragments becoming the largest
portion of network layer attack traffic
Source: Akamai
• 88% of application-based attacks came
over HTTP
• 15% of organizations reported attacks
targeting Web application log in pages
on a daily basis
• UDP fragments becoming the largest
portion of network layer attack traffic
Source: Akamai
Significant Attack Vectors Have Emerged
The Simple Service Discovery Protocol (SSDP)
- Top Infrastructure-based Attack Vector
SSDP comes pre-enabled on millions of
devices – routers, media servers, web cams,
smart TVs, printers, automobiles
Allows devices to discover each other on a
network, establish communication, coordinate
activities
Attackers are armed with a list of vulnerable
devices; use them as reflectors to amplify a
DDoS attack
SSDP comes pre-enabled on millions of
devices – routers, media servers, web cams,
smart TVs, printers, automobiles
Allows devices to discover each other on a
network, establish communication, coordinate
activities
Attackers are armed with a list of vulnerable
devices; use them as reflectors to amplify a
DDoS attackSSDP accounted for more than
20% of attack vectors in 2015
Attackers Quickly Strike Back
Attackers are continually developing new attack
vectors that defeat mitigation tools
They respond in days / hours after mitigation tools
are deployed
Meaning businesses face two chief challenges:
• The increasing complexity of security, i.e.
multi-pronged nature of the attacks
• Speed at which attackers adapt to new
mitigation tools
Compromise Takes Minutes, Discovery Takes Longer
Source: Radware
The cost of DDoS attacks
• Average $40K per hour
• 32% of companies would
loose over $100K revenue
per hour of attack
• 11% of US companies would
loose $1 Million+ revenue
per hour of attack
Source: Neustar
1 in 5 companies were told of attacks by
customers, partners, other 3rd parties
• Envelope Attacks – Device Overload
• Directed Attacks - Exploits
• Intrusions – Mis-Configurations
• Localized Volume Attacks
• Low & Slow Attacks
• SSL Floods
Required Detection:
Encrypted/Non-Volumetric Attacks
• Web Attacks
• Application Misuse
• Connection Floods
• Brute Force
• Directory Traversals
• Injections
• Scraping & API Misuse
Required Detection:
Application Attacks
• Network DDoS
• SYN Floods
• HTTP Floods
Required Detection:
Volumetric Attacks
Fight Back – Advice #1
Don’t assume your company is not a target
Bake DDoS mitigation into your business
resiliency planning
Understand that no two DDoS attacks are
exactly alike
Ensure buy-in from ALL C-suite executives
Fight Back – Advice #2
Protecting your data is not the same as
protecting your business
Also review your current investments in
system integrity and operational
availability
Then gauge the increase required to
ensure appropriate protection
Fight Back – Advice #3
You can’t defend against attacks you can’t
detect
Understand your vulnerabilities in today’s
distributed environments
Fight Back – Advice #4
Evaluate DDoS protection solutions
Consider a hybrid approach of layered
DDoS defenses: always on, on-premise
hardware blocking plus cloud-based traffic
scrubbing
Fight Back – Advice #5
Know your limitations
Enlist specialists that have the expertise
to help you fight and win
> Submit your question via webinar
chat box
> Email the Event Moderator post-
event
– If we can’t get to your question on the
call, we’ll respond promptly via email:
Sue.Lawrence-Longo@tierpoint.com
Webinars On Demand…
> Visit our website to view any of our previous webinars on demand
(Resources > Library > Webinars):
– Cloud Security Myths
– When Virtualization Meets Infrastructure: A Business Transformation Story
– BYOD: Is This Exploding Trend a Security Time-Bomb?
– How to Investigate Your Cloud Provider’s Security Capabilities
– How to Position Cloud ROI
– Mitigate Risk with Hybrid DR in the Cloud
– 7 Smart Metrics to Calculate Cloud ROI
– Cloud, Colo or Hybrid - Top 4 Considerations

More Related Content

PDF
Web Attack Survival Guide
PDF
AI for Ransomware Detection & Prevention Insights from Patents
PDF
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
PDF
Cyber Attack Analysis : Part I DDoS
PDF
20140313_tu_delft
PPTX
Industry reactions to wanna cry ransomware attacks
PDF
20150311 bit module7_tbk_bit_lecture
Web Attack Survival Guide
AI for Ransomware Detection & Prevention Insights from Patents
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
Cyber Attack Analysis : Part I DDoS
20140313_tu_delft
Industry reactions to wanna cry ransomware attacks
20150311 bit module7_tbk_bit_lecture

What's hot (20)

PPT
DDOS Attack
PDF
20160316_tbk_bit_module7
PDF
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PDF
Denial of Service Attacks
PPTX
How to Recover from a Ransomware Disaster
PPTX
Ransomware Has Evolved And So Should Your Company
PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PPTX
Crack the Code
PPTX
Ransomware: The Impact is Real
PDF
IBM X-Force Threat Intelligence Quarterly Q4 2015
PPT
DDoS Attack PPT by Nitin Bisht
PDF
Brochure - Jan 14
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
Hitcon 2014: Surviving in tough Russian Environment
 
PPTX
Can cyber extortion happen to you? Practical tools for assessing the threat
PPTX
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
PDF
DDoS threat landscape report
PDF
Cyber security series advanced persistent threats
PDF
Extend Network Visibility and Secure Applications and Data in Azure
DDOS Attack
20160316_tbk_bit_module7
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Denial of Service Attacks
How to Recover from a Ransomware Disaster
Ransomware Has Evolved And So Should Your Company
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Crack the Code
Ransomware: The Impact is Real
IBM X-Force Threat Intelligence Quarterly Q4 2015
DDoS Attack PPT by Nitin Bisht
Brochure - Jan 14
Cyber Incident Response Team - NIMS - Public Comment
Hitcon 2014: Surviving in tough Russian Environment
 
Can cyber extortion happen to you? Practical tools for assessing the threat
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
DDoS threat landscape report
Cyber security series advanced persistent threats
Extend Network Visibility and Secure Applications and Data in Azure
Ad

Similar to Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016 (20)

PDF
Luncheon 2015-08-20 - Multi-vector DDOS Attacks Detection and Mitigation by P...
PPT
Protecting your business from ddos attacks
PDF
comparing-approaches-for-web-dns-infrastructure-security-white-paper
PDF
Akamai___WebSecurity_eBook_Final
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PDF
The Art of Cyber War [From Black Hat Brazil 2014]
DOCX
DDoS Report.docx
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PPTX
types of cyber attack by taufiqurrahman.pptx
PDF
The role of DDoS Providers
PPTX
Malware attack Social engineering attack
PDF
module 1 Cyber Security Concepts
PPTX
5 Ways To Fight A DDoS Attack
PDF
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
DOCX
Stickler_Unit6
PDF
Russian and Worldwide Internet Security Trends 2015
PDF
2016 CYBERSECURITY PLAYBOOK
PDF
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Luncheon 2015-08-20 - Multi-vector DDOS Attacks Detection and Mitigation by P...
Protecting your business from ddos attacks
comparing-approaches-for-web-dns-infrastructure-security-white-paper
Akamai___WebSecurity_eBook_Final
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Art of Cyber War [From Black Hat Brazil 2014]
DDoS Report.docx
week2-cybersecurityOverview of social engineering attacks.pptx
types of cyber attack by taufiqurrahman.pptx
The role of DDoS Providers
Malware attack Social engineering attack
module 1 Cyber Security Concepts
5 Ways To Fight A DDoS Attack
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
Stickler_Unit6
Russian and Worldwide Internet Security Trends 2015
2016 CYBERSECURITY PLAYBOOK
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf

Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016

  • 1. Multi-vector DDOS Attacks Detection and Mitigation Paul Mazzucco Chief Security Officer January 2016
  • 2. Key Reasons for Cyber Attacks Source: Hackmagedden Source: Hackmagedden 4 months later …December 2014
  • 3. DoS/DDoS Attacks New Cyber Weapon of Choice Cyber Attack Sophistication Is Increasing • Lower bandwidth attacks occur more frequently, last longer, evade detection - Overwhelm servers, take down site • Multi-vector campaigns - Booter services - Dark DDoS attacks (smokescreens) - Distract victims, other attacks infiltrate corporate networks - DDoS-as-a-Service business model - Botnets for hire, $6/month Cyber Attack Sophistication Is Increasing • Lower bandwidth attacks occur more frequently, last longer, evade detection - Overwhelm servers, take down site • Multi-vector campaigns - Booter services - Dark DDoS attacks (smokescreens) - Distract victims, other attacks infiltrate corporate networks - DDoS-as-a-Service business model - Botnets for hire, $6/month Source: AkamaiSource: AkamaiSource: Imperva
  • 4. The Industry Hit List Drivers: the rise of the Internet of Things, web vulnerabilities and botnet building Choice Targets • Competitive industries, e.g. gaming • SaaS platforms, e.g. healthcare data • Multi-tenant platforms: attacks on one tenant impact all other tenants Drivers: the rise of the Internet of Things, web vulnerabilities and botnet building Choice Targets • Competitive industries, e.g. gaming • SaaS platforms, e.g. healthcare data • Multi-tenant platforms: attacks on one tenant impact all other tenants Source: Akamai 20% of DDoS attacks last over 5 days The longest attack in 2015 lasted 64 days
  • 5. Lightening Often Strikes More Than Twice 50% of North American and European companies have been attacked • 83% of companies attacked repeatedly • Star Trek Online (STO) – 3 times, Sept ‘15 • Neverwinter Online – 3 times, Sept ‘15 • 54% attacked 6+ times annually • Rutgers Univ – 6 times in 2015 • 25% experienced theft of data or funds • U.S. FTC has reached settlements with 50+ companies over poor data security practices 50% of North American and European companies have been attacked • 83% of companies attacked repeatedly • Star Trek Online (STO) – 3 times, Sept ‘15 • Neverwinter Online – 3 times, Sept ‘15 • 54% attacked 6+ times annually • Rutgers Univ – 6 times in 2015 • 25% experienced theft of data or funds • U.S. FTC has reached settlements with 50+ companies over poor data security practices Source: Akamai Losses greater than 30,000 records Source: Neustar and The Ponemon Institute
  • 6. Where Are the Attacks Taking Place? The 7 Layers of the OSI Model Session attacks typically defeat conventional firewalls Source: Akamai Infrastructure-layer DDoS attacks outnumber application-layer attacks 9-to-1 Source: Akamai
  • 7. • 88% of application-based attacks came over HTTP • 15% of organizations reported attacks targeting Web application log in pages on a daily basis • UDP fragments becoming the largest portion of network layer attack traffic Source: Akamai • 88% of application-based attacks came over HTTP • 15% of organizations reported attacks targeting Web application log in pages on a daily basis • UDP fragments becoming the largest portion of network layer attack traffic Source: Akamai Significant Attack Vectors Have Emerged
  • 8. The Simple Service Discovery Protocol (SSDP) - Top Infrastructure-based Attack Vector SSDP comes pre-enabled on millions of devices – routers, media servers, web cams, smart TVs, printers, automobiles Allows devices to discover each other on a network, establish communication, coordinate activities Attackers are armed with a list of vulnerable devices; use them as reflectors to amplify a DDoS attack SSDP comes pre-enabled on millions of devices – routers, media servers, web cams, smart TVs, printers, automobiles Allows devices to discover each other on a network, establish communication, coordinate activities Attackers are armed with a list of vulnerable devices; use them as reflectors to amplify a DDoS attackSSDP accounted for more than 20% of attack vectors in 2015
  • 9. Attackers Quickly Strike Back Attackers are continually developing new attack vectors that defeat mitigation tools They respond in days / hours after mitigation tools are deployed Meaning businesses face two chief challenges: • The increasing complexity of security, i.e. multi-pronged nature of the attacks • Speed at which attackers adapt to new mitigation tools
  • 10. Compromise Takes Minutes, Discovery Takes Longer Source: Radware The cost of DDoS attacks • Average $40K per hour • 32% of companies would loose over $100K revenue per hour of attack • 11% of US companies would loose $1 Million+ revenue per hour of attack Source: Neustar 1 in 5 companies were told of attacks by customers, partners, other 3rd parties
  • 11. • Envelope Attacks – Device Overload • Directed Attacks - Exploits • Intrusions – Mis-Configurations • Localized Volume Attacks • Low & Slow Attacks • SSL Floods Required Detection: Encrypted/Non-Volumetric Attacks
  • 12. • Web Attacks • Application Misuse • Connection Floods • Brute Force • Directory Traversals • Injections • Scraping & API Misuse Required Detection: Application Attacks
  • 13. • Network DDoS • SYN Floods • HTTP Floods Required Detection: Volumetric Attacks
  • 14. Fight Back – Advice #1 Don’t assume your company is not a target Bake DDoS mitigation into your business resiliency planning Understand that no two DDoS attacks are exactly alike Ensure buy-in from ALL C-suite executives
  • 15. Fight Back – Advice #2 Protecting your data is not the same as protecting your business Also review your current investments in system integrity and operational availability Then gauge the increase required to ensure appropriate protection
  • 16. Fight Back – Advice #3 You can’t defend against attacks you can’t detect Understand your vulnerabilities in today’s distributed environments
  • 17. Fight Back – Advice #4 Evaluate DDoS protection solutions Consider a hybrid approach of layered DDoS defenses: always on, on-premise hardware blocking plus cloud-based traffic scrubbing
  • 18. Fight Back – Advice #5 Know your limitations Enlist specialists that have the expertise to help you fight and win
  • 19. > Submit your question via webinar chat box > Email the Event Moderator post- event – If we can’t get to your question on the call, we’ll respond promptly via email: Sue.Lawrence-Longo@tierpoint.com
  • 20. Webinars On Demand… > Visit our website to view any of our previous webinars on demand (Resources > Library > Webinars): – Cloud Security Myths – When Virtualization Meets Infrastructure: A Business Transformation Story – BYOD: Is This Exploding Trend a Security Time-Bomb? – How to Investigate Your Cloud Provider’s Security Capabilities – How to Position Cloud ROI – Mitigate Risk with Hybrid DR in the Cloud – 7 Smart Metrics to Calculate Cloud ROI – Cloud, Colo or Hybrid - Top 4 Considerations