eBook

Ultimate Guide to Multi-Vector DDoS Protection

Table of Contents What you need to know about Multi-Vector DDoS attacks

3

What you should know about existing DDoS solutions

7

5 things to look for in an ultimate solution for Multi-Vector DDoS protection

9

An alternative ultimate Multi-Vector DDoS protection

15

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 2 |

What you need to

know about

DDoS Attacks A10 | Ultimate Guide to Multi-Vector DDoS Protection | 3 |

Multi-Vector (MV) DDoS Attacks Are the New Norm High-Complexity Attacks

By simultaneously attacking the Network, Bandwidth and Application Layers, MV DDoS attacks have been effective disrupting the online services of organizations.

plication Ap

o Volumetric Attacks

idth dw

N et w

rk

Online Service

Ba

n

• Recent attacks like those targeting Spamhaus, Sony and Github indicate DDoS attacks are getting larger, more sophisticated, and more destructive. • 3 out of every 4 DDoS attacks are now Multi-Vector and most victims are attacked multiple times.

Volumetric Attacks

Highly Adaptive Simple to Launch Hard to Mitigate

• MV DDoS attacks employ several techniques to target bandwidth, network devices, and applications. The combined attacks are difficult to stop and frequently overwhelm traditional DDoS defenses, consuming CPU resources rapidly. • MV DDoS attacks find the weakest link to take down online services, which is devastating for organizations depending on their online presence for revenue.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 4 |

MV DDoS Attacks Are on the Rise One doesn’t have to look far to see the rising risk of MV DDoS attacks to businesses everywhere: DDoS attacks

Increased for all vectors

• Network and Application layer DDoS attacks were both up sharply in Q2 2015 vs Q1 2014. • Volumetric DDoS attacks also increased 15.5% in Q1 2015. • At the same time, average DDoS duration topped 24+ hours*, a nearly 19% increase over the same quarter a year before. • In Q4 2015, a prominent MV DDoS attack was launched from the XOR DDoS botnet of infected Linux systems. It targeted the gaming sector as well as many educational institutions, demonstrating an ability to initiate up to 20 attacks per day ranging from just a few to almost 150 Gbps in size.

Average attack

24+

hours

*Akamai

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 5 |

Many Possible Angles, Easy to Launch, and Difficult to Defend The danger from MV DDoS attacks comes from their ability to explore many possible weaknesses across the network at once: SERVICE

• A volumetric attack saturates bandwidth • A network infrastructure attack overwhelms devices • An application layer attack drains CPU resources

Ultimately, MV DDoS attacks look for the weakest link to bring the online service down

By leveraging these multiple angles, MV DDoS attacks increase the chances of the weakest one being discovered. For example, a Network layer attack by itself can be a blunt yet effective instrument against network devices; but paired with DDoS-related pressure on the application layer, it can become even more time and resource intensive for IT to deal with.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 6 |

W h a t yo u sh o u l d

know about

Existing Solutions A10 | Ultimate Guide to Multi-Vector DDoS Protection | 7 |

IT Teams Remain Challenged, Most Existing Solutions Fall Short

Attack Volume

More Rack Units

Volume and complexity of MV DDoS attacks overwhelm existing solutions (firewalls or legacy DDoS solutions) resulting in: • Rapid CPU depletion • Inability to adapt quickly to new vectors because they are not easily programmable and Dev-Ops ready • Poor scalability

CPU CPU Depleted

Existing DDoS Solutions: Inefficient Ineffective Not Agile More Expensive

These shortfalls are usually addressed by adding more resources (rack units) which end up being more costly. The need for a better and more efficient approach for MV DDoS protection is critical.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 8 |

5

Things to look for in an Ultimate Solution for

MV DDoS Protection A10 | Ultimate Guide to Multi-Vector DDoS Protection | 9 |

Support Against the Full 1 Spectrum of MV DDoS Attacks

Slowloris R.U.D.Y HTTP GET

An ultimate MV DDoS protection solution must provide support for a wide variety of attacks that could hit simultaneously:

plication Ap

o Fragmentation SYN Flood Ping of Death

idth dw

N et w

rk

Online Service

Ba

n

Reflection DNS Reflection UDP Flood/ICMP Flood

• Bandwidth (volumetric) attacks such as DNS/NTP reflection, UDP floods, ICMP floods, etc. • Network Protocol Attacks such as TCP SYN floods, Ping of death. • Application resource attacks to exhaust application resources such as Slowloris, R.U.D.Y. • Application exploit attacks such as buffer overflows.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 10 |

Offloading common attacks to hardware

High Performance at 2 a Low Cost MV DDoS attacks are complex and adaptable, straining limited CPU resources between the high volume, low-complexity volumetric attacks and low volume, high-complexity application attacks.

CPU Results in more CPU availability, fewer rack units and ultimately in lower costs

Most solutions in the market respond to this by continuing to add additional processing capacity, resulting in a large data center footprint. As a result, costs just keep adding up, both to acquire new processing capacity and increased operational costs. This approach is both inelegant and unsustainable. A more efficient approach is to offload processing of high volume, low complexity network level attacks to purpose-built embedded hardware, relieving the CPU resources for dealing with more complex and low-volume application attacks. All of this can be done within an efficient appliance size.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 11 |

Smart Attack Detection 3 and Automated Mitigation A good solution should also allow for the intelligent detection of DDoS attacks. Smart MV DDoS Solution

The solution should be smart enough to distinguish between malicious activity and traffic that might look like an attack, but is really legitimate. To accomplish this:

Detect and Mitigate

Validate Legitimate Traffic

• The solution should employ network behavior anomaly detection with progressive escalation to block MV DDoS attacks while at the same time letting legitimate traffic get through. Once an attack is detected it must be stopped. • The system should automatically mitigate such attacks via a dynamic policy-based system that can be programmed in advance.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 12 |

The Right Formula for SmartOn DDoS Solution Cloud

On-Premise DDoS On Premises

+

Hybrid Solution for 4 Customers with Limited Internet Bandwidth Organizations of all sizes are going to be targets of MV DDoS attacks. It’s no longer a matter of if but when.

Protection Device

For smaller organizations with limited Internet bandwidth, large DDoS attacks can be devastating and bring their web applications to a standstill. To prevent such a scenario, a smart MV DDoS protection solution should leverage a hybrid approach. An on-premise DDoS protection device detects the start of an attack and mitigates attacks until the volume exceeds the bandwidth capacity. When this happens, the device signals to a cloud-based scrubbing service for mitigation, ensuring continued operation of the enterprise’s Web operations.

Cloud-Based DDoS Service On Cloud

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 13 |

Easily Integrates 5 with Existing Traffic Analysis and Network Management Solutions Smart MV DDoS Solution

An Ultimate MV DDoS protection solution must be open and flexible. Enterprises already have traffic analysis and network management solutions in place that are leveraged for analysis.

Traffic Analysis

Network Management

Flexible Integration through Open APIs and Signaling

A smart MV DDoS protection solution should be accessible with open APIs and signaling features, enabling it to be integrated with the systems already in place. This ensures minimal disruptions to existing solutions and faster time to deployment of the MV DDoS protection solution.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 14 |

An alternative approach to

Ultimate MV DDoS Protection To learn more visit a10networks.com/tps A10 | Ultimate Guide to Multi-Vector DDoS Protection | 15 |

A10 Thunder TPS from A10 Networks

Thunder TPS THUNDER TPS IS A TRUE TPS MVP Thunder Efficient

Efficient Flexible Flexible Comprehensive Comprehensive Powerful Powerful

The A10 Thunder TPS Threat Protection System brings many unique capabilities to the table in the fight against MV DDoS attacks. A10 Thunder® TPS offers true Multi-Vector protection. It helps defend against the full spectrum of MV DDoS attacks, provides smart detection and automated mitigation capabilities, and is backed by A10 Threat Intelligence Service to minimize attacks before they happen. These are some of the main features offered by A10 Thunder TPS: • Efficiency: 1 rack unit for 200M packets per sec. Includes hardware offload to a field-programmable gate array/FPGA and features 100 GbE ports and high performance CPUs. • Flexibility: highly programmable, full control for agile protection. • Comprehensive: protects against full attack spectrum including 60 hardware mitigations. • Powerful: 155 Gbps attack throughput.

A10 | Ultimate Guide to Multi-Vector DDoS Protection | 16 |

To learn more visit a10networks.com/tps ©2016 A10 Networks, Inc. All rights reserved. The A10 logo, and A10 Networks are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.

Part Number: A10-EB-14103-EN-01

DDos attack protection.pdf

Recent attacks like those targeting Spamhaus, Sony and Github. indicate DDoS attacks are getting larger, more sophisticated, and more. destructive. • 3 out of ...

6MB Sizes 0 Downloads 301 Views

Recommend Documents

DDos attack protection.pdf
Page 4 of 17. DDos attack protection.pdf. DDos attack protection.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying DDos attack protection.pdf.

Cyberspace Administration of China DDoS Attack Forensics.pdf ...
3 -. Page 3 of 11. Cyberspace Administration of China DDoS Attack Forensics.pdf. Cyberspace Administration of China DDoS Attack Forensics.pdf. Open. Extract.

Survey of DDOS Attack in Cloud Survey of DDOS ...
Platform as a Service (PaaS) is a delivery of a computing platform over the web. ... or Software as a Service (SaaS) refers to software delivered over a browser. ... One of the primary reasons the hybrid model is popular is that organizations.

DDos finds new vectors.pdf
Accessed October 04, 2016. https://www.britannica.com/topic/denial-of- service-attack. 2 “Denial of Service Attacks (Published 1997).” Denial of Service (Published 1997). Accessed October 04, 2016. http://www.cert.org/information-for/. denial_of_

NET 3.5 - Pollution Attack: A New Attack Against ...
may be obtained from 1-hop beacons by receiving the location of beacon and measuring the distance between them (e.g., through measuring received signal strength indicator (RSSI). [14] or time difference of arrival (TDoA) [15]), also may be obtained f

Amazing Adwords Attack-www.InstantStressManagement.com.pdf ...
Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Open. Extract. Open with.

Global DDoS Prevention Market 2015-2019.pdf
DDoS services: Hybrid and cloud-based mitigation services provided by telecom ... Corero Network Security ... Global DDoS Prevention Market 2015-2019.pdf.

Fred Reinfeld Attack And counter attack in chess.Pdf
desarrollando diferentes proyectos e ideas. Tenemos miembros .... Pdf. Fred Reinfeld Attack And counter attack in chess.Pdf. Open. Extract. Open with. Sign In.

Nuclear Attack
... Nuclear Attack Be Launched. Page 2 of 2. 1499609635163atomicattackmedicinalguidingprinciplec ... tenceoutlinesympathizewithtothepublicrobustness.pdf.

Operation Attack News - Apr2016
1310 22nd Avenue South St. Petersburg, FL 33705 (727) 822-1187 ... Sanderlin IB World School for “Soxtober,” a school-wide sock drive that collected 900.

attack titan 480p.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. attack titan ...

smurf attack pdf
Whoops! There was a problem loading more pages. smurf attack pdf. smurf attack pdf. Open. Extract. Open with. Sign In. Main menu. Displaying smurf attack pdf.

When milfs attack
Datastructures pdf.Csicyber 2x09.Game plan ... I ride dj.668353804.1pondo – 041115_060.Part 2 mockingjay. ... Transformers g1 complete.Adobe photoshop cc ...

Don't Talk to Zombies: Mitigating DDoS Attacks via ...
Intel's upcoming chipsets are likely to integrate TPM func- tionality [16]. As we show in this paper, verifying attesta- tions in the network would be too expensive. To achieve the properties mentioned above, we break up the attestation process; a di

Best Practices for DDoS Protection and Mitigation on Google Cloud ...
Apr 12, 2016 - A Denial of Service (DoS) attack is an attempt to render your service or ... Google Cloud Virtual Network​. View the best practice ​here​. 1 ...

Dynamic Attack Mitigation using SDN
Abstract—Security threats in the Internet have been ever increasing, in number, type and means used for attacks. In the face of large-scale attacks, such as DDoS attacks, networks take unacceptable time to respond and mitigate the attacks, resultin

dental health plaque attack blog.pdf
Connect more apps... Try one of the apps below to open or edit this item. dental health plaque attack blog.pdf. dental health plaque attack blog.pdf. Open. Extract.

Attack-of-the-Giant-Leeches.pdf
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED.

478435_Addressing the Full Attack Continuum.pdf
engineering and zero-day attacks have made it easier, faster, and cheaper for hackers to get in and increasingly. difficult for defenders to see them and keep them out. Compounding the elusiveness, the attacks themselves can. change rapidly as they p

Profile Injection Attack Detection for Securing ... - CiteSeerX
6.4.2 Robustness Comparison Against Nuke Attacks . . . . . . . . . . . . . . 34. 7 Defense ..... As a result, we have focused on profile analytics data and attribute ...... Data Mining: Practical machine learning tools and techniques, 2nd. Edition. M

Attack Resistant Collaborative Filtering - Research at Google
topic in Computer Science with several successful algorithms and improvements over past years. While early algorithms exploited similarity in small groups ...

star wars attack clone dvd.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. star wars attack ...