the 5 Misconceptions about DDos Attacks
Transcription
the 5 Misconceptions about DDos Attacks
Why DDoS Makes for Risky Business – And What You Can Do About It: the 5 Misconceptions about DDos Attacks Dave Shackleford, IANS Faculty Tom Bienkowski, Director of Product Marketing, Arbor Networks The Story Today ➔ There are more and more DDoS attacks every week, month, and year ➔ Many security teams: • Don’t fully understand the landscape of modern DDoS • Believe that DDoS defense is something they should outsource • Believe their existing tools can cover DDoS • Believe DDoS is not that sophisticated or advanced ➔ We need to revisit how we think about DDoS attacks Despite All the Research and Statistics… Neustar 2014 DDoS Attacks & Impact Report: The Danger Deepens DDoS Attacks Still Happen… Why? 4 5 Common Misconceptions about DDoS Attacks My firewalls and IPS (Load balancers, WAF etc.) will stop DDoS attacks. I have adequate DDoS protection solutions in place. The odds are we will NOT be attacked. DDoS is old news … I’m concerned with more Advanced Threats The impact of a DDoS attack does not justify the cost of protection. Misconception #1: Firewall / IPS will Stop DDoS Attacks Fact: Firewalls and IPS (load balancers, WAF etc.) are not designed to stop DDoS attacks. DDoS attacks use legitimate packets and do not violate protocols rules – thus many go undetected by firewalls and IPS. Because firewalls and IPS (load balancers, WAF) are required to track state, they are vulnerable to some DDoS attacks (e.g. HTTP/TCP SYN floods) – and routinely fail during attacks. Completing The Security Triad: Firewalls and IPS are designed for protecting Confidentiality and Integrity. You need purpose built DDoS protection products to protect Availability. Availability? Confidentiality Integrity Misconception #2: In-cloud …or…. On-Prem is Enough Fact: Modern day DDoS attacks use a dynamic combination of volumetric and application layer attack vectors. There are best practices to stop both. Botnet Legit Traffic Volumetric Attack State Exhaustion Application Attack The Internet Case Study: “Operation Ababil” Your (ISP’s) Network Your Data Centers Dynamic combination of volumetric and application layer attacks. Lesson Learned: Targets who only had on-premises protection realized they also needed in-cloud protection …and Vice Versa. Misconception #3: The Odds Are Low That We Will Be Attacked Fact: DDoS attacks are increasing in size , frequency and complexity. Its getting worse, not better. Fact: Changes in motivation and plethora of DDoS attack tools and services make it easy for anyone to launch a DDoS attack. Misconception #4: Impact Does Not Justify Cost of Protection Fact: The impact of a DDoS attack can be immediate and severe. Lost Revenue Indirect / Business Continuity Costs Revenue From Asset Per Year Per Week $200,000,000 $3,846,154 Per Day $547,945 Per Hour $22,831 Unwanted Media Attention Operational Costs to Mitigate Attack. Brand repair Regulatory Fees Customer Credits Lost productivity Others? Executive Impact Misconception #5: DDoS attacks are Not Advanced Threats Fact: Yes, it may be true that DDoS attacks by themselves are not advanced. However… Arbor’s global threat intelligence has evidence that Botnets/DDoS attacks are often part of complex, multi-vector, advanced threat “campaigns” and used during phases of the “Kill Chain”. Example of Abor’s research of global threat “campaigns” consisting of interrelated botnets, DDoS, malware etc. “Kill Chain” Du Jour App BotNet Gray Pigon RAT Gartner DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon Attackers INITIAL COMP Weaponization Delivery Installation SPREAD OUT Exploitation C&C 11 EXTRACT DATA Complete Mission Attack Activities Over Time Port Scanning Phishing DDoS RAT Evasion TOR Port Scanning DDoS Evasion P2P Bad URL Evasion POS Evasion Zero Day Phishing Target Org Malware Bot DDoS DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation SPREAD OUT Exploitation C&C EXTRACT DATA Complete Mission Attack Activities Over Time Port Scanning Phishing Evasion DDoS Bad URL RAT Evasion Evasion TOR Port Scanning DDoS P2P POS Evasion Zero Day Phishing Malware Bot Sizing Up Your Security Posture DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation Attack Activities Over Time Port Scanning Phishing Port Scanning DDoS Evasion P2P Zero Day DDoS Bad URL Phishing SPREAD OUT Exploitation C&C RAT Evasion Malware EXTRACT DATA Complete Mission TOR 13 Evasion POS Evasion Bot DDoS Or Analogous to Looking for Security Stickers… DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation Attack Activities Over Time Port Scanning Phishing Port Scanning DDoS Evasion P2P Zero Day DDoS Bad URL Phishing SPREAD OUT Exploitation C&C RAT Evasion Malware EXTRACT DATA Complete Mission TOR 14 Evasion Or Analogous to Looking for Security Stickers… POS Evasion Bot DDoS If your were a burglar, which house would you rob? DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation SPREAD OUT Exploitation C&C EXTRACT DATA Complete Mission 15 Attack Activities Over Time Port Scanning Phishing Port Scanning DDoS Evasion P2P Zero Day DDoS Bad URL Phishing RAT Evasion Malware Evasion TOR POS Evasion Bot DDoS Evasion/Overwhelming your security forensics DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation SPREAD OUT Exploitation C&C EXTRACT DATA Complete Mission 16 Attack Activities Over Time Port Scanning Phishing Port Scanning DDoS Evasion P2P Zero Day DDoS Bad URL Phishing RAT Evasion Malware Evasion TOR POS Evasion Bot DDoS Evasion/Overwhelming your security forensics DDoS Used in Multiple Stages of Kill Chain Advanced Attack Kill Chain RESEARCH Recon INITIAL COMP Weaponization Delivery Installation SPREAD OUT Exploitation C&C EXTRACT DATA Complete Mission 17 Attack Activities Over Time Port Scanning Phishing Port Scanning DDoS Evasion P2P Zero Day DDoS Bad URL Phishing RAT Evasion Malware Evasion TOR POS Evasion Bot DDoS Diversion: Analogous to setting alarms off at one end of building while thief slips out the other end Arbor’s ATLAS: Global Threat Analysis and Monitoring System “We See Things Others Can’t” The ATLAS Global Threat Analysis and Monitoring System is actively monitoring more than 120 Tbps. That’s more than 1/3 of all internet traffic! ATLAS is a collaborative project with more than 300 ISP’s customers sharing anonymous traffic data through E-mail spam traps, Botnet reconnaissance tools, the worlds largest distributed honeypot, globally dispersed sensors and publicly shared intelligence Examples of DDoS Used in Various Phases of Kill Chain Reconnaissance Stage Weaponization Stage Exfiltration Stage Evidence of DDoS Interrelationship with Other Advanced Threats A single threat infrastructure that has both DDoS and Advanced Threat malware (DarkComet) at its disposal. High confidence means recent activity tracked. Evidence of DDoS Interrelationship with Other Advanced Threats Threat infrastructure that has botnet, DDoS and Advanced Threat malware (DarkComet, Banking RAT) at its disposal. High confidence means recent activity tracked. Conclusion ➔ There are many misunderstandings about DDoS and DDoS defense today ➔ Today’s organizations need layered defenses: 1 Stop volumetric attacks InCloud Botnet, DDoS, Malware Scrubbing Center 3 Intelligent communication between both environments. Legit Traffic Volumetric Attack Application Attack The Internet 4 Backed by continuous threat intelligence Your (ISP’s) Network Your Data Centers/ Internal Networks 2 Stop application layer DDoS attacks and other advanced threats; detect abnormal outbound activity. Thank You! QUESTIONS?