1 / 25

Radware DoS / DDoS Attack Mitigation System

Radware DoS / DDoS Attack Mitigation System . Orly Sorokin January 2013. AGENDA. DDoS attacks & Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations. DoS – How does it Look . Simple Way

jersey
Download Presentation

Radware DoS / DDoS Attack Mitigation System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013

  2. AGENDA DDoS attacks & Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations

  3. DoS – How does it Look • Simple Way • Excessive or specially crafted traffic causing network/server/application resources misuse, thus preventing legitimate traffic to reach its destination and limits the service providing, generated by tools, humans or both. Can be based on Volume / Rate / Vulnerability Exploitation • Detailed • Layer 3 Floods – targeting the network equipment, and the actual pipe capacity • Layer 4 Floods – targeting the servers (physical or virtual), their stack resources • Layer 7 Floods – targeting real applications and services

  4. Network and Data Security Attacks: from the News

  5. Cyber Security Study A research study by Ponemon & Radware Surveyed 700 IT & IT Security Practitioners Non Radware customers Release date: Q4/2012

  6. DDoS Attacks Frequency How many DDoS attacks experienced in the past 12 months? 65% of organizations had an average of 3 DDoS attacks in the past 12 months

  7. Average downtime during one DDoS attack 54 Minutes average downtime during one DDoS attack

  8. AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations

  9. Information Resources • Industry Security Survey • External survey • 179 companies • Mostare not using Radware DoS mitigation solution • ERT Cases • Internal survey • Unique visibility into attacks behavior • 95 selected cases • Customer identity remains undisclosed ERT gets to see attacks in real-time on daily basis

  10. AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations

  11. Organizations Bring a Knife to a Gunfight • ”Someone who brings a knife to a gun fight” • Is someone who does prepare himself for the fight, but does not understand its true nature • Organizations today are like that • They do invest before the attack starts, and conduct excellent forensics after it is over, • however, they have one critical blind-spot – they don't have the capabilities or resources to sustain a long, complicated attack campaign. • Attackers target this blind spot!

  12. Attacked in 2012 They had the budget They made the investment And yet they went offline

  13. But Attacks Today Have 3 Phases

  14. ERT Cases – Attack Duration Trend 21% 23% 21% 12% 11% 12% Attacks last longer: The number of DoS attacks lasting over a week had doubled in 2012

  15. ERT Cases – Attack Vectors Trend ERT Cases – Attack Vectors Attacks are more complex: 2012 DoS/DDoS attacks have become more sophisticated, using more complex attack vectors. Note the number of attacks using a complexity level of 7-10.

  16. Attack Vectors Trends Industry Security Survey – Attack Count by Type Attack remained diversified between different attack types.This reflects attackers using multi-vector attacks.

  17. Entities That Are The Bottlenecks in DoS Attacks Industry Security SurveyWhich services or network elements are (or have been) the bottleneck of DoS? The three entities that are consistently the bottlenecks in DoS/DDoSattacksare the server under attack, the firewall and the Internet pipe.

  18. Solutions Used Against DoS Attacks Industry Security SurveyWhich solutions do you use against DoS attacks?

  19. Attackers Motivation Trend DoS motivation did not change in 2012 compared to last year.

  20. Who’s On The Target List? Low Medium ISP High Financial Government eCommerce eGaming Mobile 2012 2011 Prior to 2011

  21. AGENDA Cyber security Statistics About 2012 Global Security Report Key Findings & Trends Recommendations

  22. AMS Protection Set DoS Protection • Prevent all type of network DDoS attacks Reputation Engine • Financial fraud protection • Anti Trojan & Phishing IPS • Prevent application vulnerability exploits NBA • Prevent application resource misuse • Prevent zero-minute malware WAF • Mitigating Web application threats and zero-day attacks

  23. Radware Security Event Management (SEM) • Correlated reports • Trend analysis • Compliance management • RT monitoring • Advanced alerts • Forensics NB / API 3rd Party SEM

  24. Radware AMS & ERT/SOC

  25. Thank You www.radware.com

More Related