SlideShare une entreprise Scribd logo
1  sur  24
Security without sacrificing performance
Konrad Kaczanowski & Rafał Jaskulski
©2013 AKAMAI | FASTER FORWARDTM
Agenda
1.State of the Internet
2.Why use protection?
3.Choose wisely – you get what you pay for
©2013 AKAMAI | FASTER FORWARDTM
The numbers of Akamai
• Average traffic levels of over 6 Tbps
• Peak traffic levels to date of ~10Tbps
• Handling ~20 million hits/second, on average
700+
Cities
2,000+
Locations
80
Countries
The Akamai Intelligent Platform
1,100+
Networks
130,000+
Servers
©2013 AKAMAI | FASTER FORWARDTM
90% of Internet
users are within one
network hop of an
Akamai server
Close to the edge of the internet
©2013 AKAMAI | FASTER FORWARDTM
State of the internet
• 5% average connection speed
increase
• 4.6% average peak speed
increase
• 2.4% increase in unique IP v4 addresses
©2013 AKAMAI | FASTER FORWARDTM
Where do attacks come from?
 Attacks coming from wide range of countries (117 unique countries in Q4 2012)
 Rise in attacks originating from China – now account for 41% of worldwide attack traffic
 Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
©2013 AKAMAI | FASTER FORWARDTM
Attack trends
 Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25
Gbps
 Average attack duration increased by 7.14 percent from 32.2 hours to
34.5 hours
 Regional distribution:
 56% Asia
 25% Europe
 18% North & South America
 1% Africa
©2013 AKAMAI | FASTER FORWARDTM
What's your favorite port?
©2013 AKAMAI | FASTER FORWARDTM
Fancy an attack?
©2013 AKAMAI | FASTER FORWARDTM
Value of a hacked machine
Courtesy of http://krebsonsecurity.com/
©2013 AKAMAI | FASTER FORWARDTM
Real life example
• Top 500 online retailer generating just under 100,000 USD per hour in
revenue
• Internationally coordinated DDoS attack
• Shifting attack sources
• Changing attack signatures
• Peak attack traffic at ~112 Gbps (over 10000 more than usually)
• Akamai absorbed the attack traffic
• Savings of ~10 million USD over a period of several days
©2013 AKAMAI | FASTER FORWARDTM
• Inhouse solutions
• Dedicated security services
1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack
direct incoming traffic to go through a ‘scrubbing centre’.
2. Proactive – always-on model, 24h protection, adjust only for new attack
vectors
What are my security choices?
©2013 AKAMAI | FASTER FORWARDTM
In house security
Network
Firewall
Web
Application
Firewall
Application
or Database
Server
Customer
Database
Web
Server
(Origin)
Traditional Data Center Security
Limited scalability
Self-managed or MSSP
Off the shelf solution
©2013 AKAMAI | FASTER FORWARDTM
Scrubbers
©2013 AKAMAI | FASTER FORWARDTM
Akamai
• Distributed Intelligent Platform
• Security and Acceleration capabilities
• Several attack types dropped by default
• „Always on” protection
• Full control over features and configuration
• Real-time monitoring
• Acceleration, caching and more
©2013 AKAMAI | FASTER FORWARDTM
Akamai Intelligent Platform basic protection levels
• TCP SYN flood attacks
• UDP flood
• ICMP flood
• Some HTTP response splitting attacks (when the split is in the URL
path)
• Malformed request
• Port scanning
• Some basic DDoS protection (due to caching)
©2013 AKAMAI | FASTER FORWARDTM
Akamai Security Portfolio
Enhanced DNS:
Attack against the DNS infrastructure
Attack against the TLD (customer.com)
BIND vulnerability exploits
Basic DNS poisoning attacks (TSIG)
Advanced DNS poisoning attacks
(DNSSEC)
SiteShield:
Any layer 4-7 attacks directly against the origin
Still a risk to over at the layer 3
GTM:
Data center failure (load balancing, failover)
Web Application Firewall:
IP/CIDR/Geo whitelisting/blacklisting
XSS, SQLi
Protocol violations, Encoding abuse
Layer 7 floods
Shopper Prioritization:
Flash crowd (real or DDoS)
©2013 AKAMAI | FASTER FORWARDTM
(Cloud)
Datacenters
End User
1
10
100
10000
Origin
Traffic
1000
Akamai
Traffic
1
10
100
10000
1000 COVERED
Web Application security with Akamai
©2013 AKAMAI | FASTER FORWARDTM
Comparison
In-house Scrubbers Akamai
Pricing model Whatever you are
willing to pay
Moderate Monthly Fee +
Processed Traffic
Monthly Fee + Traffic (Insurance
option)
Protection Depending on what
is installed
On request Always on
Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team
notifications on ongoing and
planned attacks
Integration None (Internal) For each attack: BGP route
modification, GRE tunnel
configuration
Once:
DNS entry modification
Ports - All 80 & 443
Performance Possible decrease Decrease when activated Increase due to accelerated
©2013 AKAMAI | FASTER FORWARDTM
Before DDoS hits you
DDoS cheat sheet
• Decision makers list
• Define escalation paths
• Who to call and when (emergency contact information)
©2013 AKAMAI | FASTER FORWARDTM
Check out our app
©2013 AKAMAI | FASTER FORWARDTM
Questions?
©2013 AKAMAI | FASTER FORWARDTM
Under attack? Call us!
www.ddos-hotline.com
©2013 AKAMAI | FASTER FORWARDTM
Thank you!
Visit our booth at

Contenu connexe

En vedette

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśBeyond.pl
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Bluerank
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasangmorrod
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The New School
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisJesus Mejia
 

En vedette (6)

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
 
BOMMA Certificado
BOMMA CertificadoBOMMA Certificado
BOMMA Certificado
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolas
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este pais
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

#IT fest 2013 - Security without sacrificing performance

  • 1. Security without sacrificing performance Konrad Kaczanowski & Rafał Jaskulski
  • 2. ©2013 AKAMAI | FASTER FORWARDTM Agenda 1.State of the Internet 2.Why use protection? 3.Choose wisely – you get what you pay for
  • 3. ©2013 AKAMAI | FASTER FORWARDTM The numbers of Akamai • Average traffic levels of over 6 Tbps • Peak traffic levels to date of ~10Tbps • Handling ~20 million hits/second, on average 700+ Cities 2,000+ Locations 80 Countries The Akamai Intelligent Platform 1,100+ Networks 130,000+ Servers
  • 4. ©2013 AKAMAI | FASTER FORWARDTM 90% of Internet users are within one network hop of an Akamai server Close to the edge of the internet
  • 5. ©2013 AKAMAI | FASTER FORWARDTM State of the internet • 5% average connection speed increase • 4.6% average peak speed increase • 2.4% increase in unique IP v4 addresses
  • 6. ©2013 AKAMAI | FASTER FORWARDTM Where do attacks come from?  Attacks coming from wide range of countries (117 unique countries in Q4 2012)  Rise in attacks originating from China – now account for 41% of worldwide attack traffic  Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
  • 7. ©2013 AKAMAI | FASTER FORWARDTM Attack trends  Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25 Gbps  Average attack duration increased by 7.14 percent from 32.2 hours to 34.5 hours  Regional distribution:  56% Asia  25% Europe  18% North & South America  1% Africa
  • 8. ©2013 AKAMAI | FASTER FORWARDTM What's your favorite port?
  • 9. ©2013 AKAMAI | FASTER FORWARDTM Fancy an attack?
  • 10. ©2013 AKAMAI | FASTER FORWARDTM Value of a hacked machine Courtesy of http://krebsonsecurity.com/
  • 11. ©2013 AKAMAI | FASTER FORWARDTM Real life example • Top 500 online retailer generating just under 100,000 USD per hour in revenue • Internationally coordinated DDoS attack • Shifting attack sources • Changing attack signatures • Peak attack traffic at ~112 Gbps (over 10000 more than usually) • Akamai absorbed the attack traffic • Savings of ~10 million USD over a period of several days
  • 12. ©2013 AKAMAI | FASTER FORWARDTM • Inhouse solutions • Dedicated security services 1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack direct incoming traffic to go through a ‘scrubbing centre’. 2. Proactive – always-on model, 24h protection, adjust only for new attack vectors What are my security choices?
  • 13. ©2013 AKAMAI | FASTER FORWARDTM In house security Network Firewall Web Application Firewall Application or Database Server Customer Database Web Server (Origin) Traditional Data Center Security Limited scalability Self-managed or MSSP Off the shelf solution
  • 14. ©2013 AKAMAI | FASTER FORWARDTM Scrubbers
  • 15. ©2013 AKAMAI | FASTER FORWARDTM Akamai • Distributed Intelligent Platform • Security and Acceleration capabilities • Several attack types dropped by default • „Always on” protection • Full control over features and configuration • Real-time monitoring • Acceleration, caching and more
  • 16. ©2013 AKAMAI | FASTER FORWARDTM Akamai Intelligent Platform basic protection levels • TCP SYN flood attacks • UDP flood • ICMP flood • Some HTTP response splitting attacks (when the split is in the URL path) • Malformed request • Port scanning • Some basic DDoS protection (due to caching)
  • 17. ©2013 AKAMAI | FASTER FORWARDTM Akamai Security Portfolio Enhanced DNS: Attack against the DNS infrastructure Attack against the TLD (customer.com) BIND vulnerability exploits Basic DNS poisoning attacks (TSIG) Advanced DNS poisoning attacks (DNSSEC) SiteShield: Any layer 4-7 attacks directly against the origin Still a risk to over at the layer 3 GTM: Data center failure (load balancing, failover) Web Application Firewall: IP/CIDR/Geo whitelisting/blacklisting XSS, SQLi Protocol violations, Encoding abuse Layer 7 floods Shopper Prioritization: Flash crowd (real or DDoS)
  • 18. ©2013 AKAMAI | FASTER FORWARDTM (Cloud) Datacenters End User 1 10 100 10000 Origin Traffic 1000 Akamai Traffic 1 10 100 10000 1000 COVERED Web Application security with Akamai
  • 19. ©2013 AKAMAI | FASTER FORWARDTM Comparison In-house Scrubbers Akamai Pricing model Whatever you are willing to pay Moderate Monthly Fee + Processed Traffic Monthly Fee + Traffic (Insurance option) Protection Depending on what is installed On request Always on Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team notifications on ongoing and planned attacks Integration None (Internal) For each attack: BGP route modification, GRE tunnel configuration Once: DNS entry modification Ports - All 80 & 443 Performance Possible decrease Decrease when activated Increase due to accelerated
  • 20. ©2013 AKAMAI | FASTER FORWARDTM Before DDoS hits you DDoS cheat sheet • Decision makers list • Define escalation paths • Who to call and when (emergency contact information)
  • 21. ©2013 AKAMAI | FASTER FORWARDTM Check out our app
  • 22. ©2013 AKAMAI | FASTER FORWARDTM Questions?
  • 23. ©2013 AKAMAI | FASTER FORWARDTM Under attack? Call us! www.ddos-hotline.com
  • 24. ©2013 AKAMAI | FASTER FORWARDTM Thank you! Visit our booth at