SlideShare a Scribd company logo
1 of 10
DDoS Protection
The 5 Commandments of
DDoS Mitigation



    Confidential
DDoS – The Basics


   Volume Based Attacks
    • Method: Include UDP floods, ICMP floods, and other spoofed packet
      floods.
    • Objective: Saturate the bandwidth of the attacked site.
    • Magnitude: Typically measured in Bits per second.

   Protocol Attacks:
    • Method: Primarily SYN floods, but also fragmented packet attacks.
    • Objective: Consume web server resources or intermediate communication
      equipment, such as firewalls and load balancers.
    • Magnitude :These are usually measured in Packets per second.

   Application Layer Attacks
    • Method: Unlike protocol attacks, these are comprised of legitimate and
      seemingly innocent requests.
    • Objective: Bring the application servers down.
    • Magnitude: Requests per second.

    Confidential
DDoS – Current and Future Trends

   Volume Based Attacks are getting bigger
    • More and more attacks over 20Gbps

   Application Layer Attacks are becoming more frequent
    • Targeting specific website platforms
    • Targeting smaller websites

   New Attack Types
    • IP Range Blanket Bombing DOS Techniques
    • Amplification through DNS requests to an Open DNS or open “public” SNMP




    Confidential
The 5 Commandment of DDoS Mitigation

 Confidential
Commandment 1:
Thou shall be invisible

    Your users don’t need to know and don’t care
    that you are under attack

    People Don’t like to hang around in
    “dangerous” places

    People should be allowed to enter:
     • Without delays
     • Without being sent through holding areas &
       splash screens
     • Without being served outdated cached content



    Confidential
Commandment 2:
Let he who is innocent step forward

    Self Redemption is Key!!!


    All users should be able to exonerate
    themselves.


    At the very least users should be
    able to:
        Shout out (complain)
        Redeem themselves by
        completing a CAPTCHA.



    Confidential
Commandment 3:
Spare no bot but beware of those holier than thou

    Block all Application Layer Bot Requests
     • There is very little head room for most sites
     • Even 50 excess page views/second can take
       down your site, or slow it down.

    Transparency should not come at the expense of
    airtight protection

    However, you must grant the “Internet Gods”
    (Google, Bing, Pingdom, etc.) access at all times




    Confidential
Commandment 4:
Absorb all that is cast upon you

    Take Cover! Network attacks are getting
    bigger

    You must be able to take a
    “20Gbps +” hit standing

    You must have isolation
    capabilities to prevent others from
    trembling with you




    Confidential
Commandment 5:
To err is Human. Precise Detection is divine

    Automatic & Accurate DDoS detection is
    just as important as effective mitigation

    One shouldn’t be in “DDoS Mode”
    unnecessarily and you can’t watch your
    site 24x7x365

    Real-time protection activation is
    crucial, otherwise you’re going down




    Confidential
Stay Safe
Marc Gaffan
Co-Founder, VP Marketing & Business-Development
marc@incapsula.com


    Confidential

More Related Content

More from Imperva Incapsula

Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Imperva Incapsula
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your Business
Imperva Incapsula
 

More from Imperva Incapsula (20)

D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize Security
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access Control
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery Rules
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Is the Cloud Going to Kill Traditional Application Delivery?
Is the Cloud Going to Kill Traditional Application Delivery?Is the Cloud Going to Kill Traditional Application Delivery?
Is the Cloud Going to Kill Traditional Application Delivery?
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your Business
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

DDoS Protection: The 5 Commandments

  • 1. DDoS Protection The 5 Commandments of DDoS Mitigation Confidential
  • 2. DDoS – The Basics Volume Based Attacks • Method: Include UDP floods, ICMP floods, and other spoofed packet floods. • Objective: Saturate the bandwidth of the attacked site. • Magnitude: Typically measured in Bits per second. Protocol Attacks: • Method: Primarily SYN floods, but also fragmented packet attacks. • Objective: Consume web server resources or intermediate communication equipment, such as firewalls and load balancers. • Magnitude :These are usually measured in Packets per second. Application Layer Attacks • Method: Unlike protocol attacks, these are comprised of legitimate and seemingly innocent requests. • Objective: Bring the application servers down. • Magnitude: Requests per second. Confidential
  • 3. DDoS – Current and Future Trends Volume Based Attacks are getting bigger • More and more attacks over 20Gbps Application Layer Attacks are becoming more frequent • Targeting specific website platforms • Targeting smaller websites New Attack Types • IP Range Blanket Bombing DOS Techniques • Amplification through DNS requests to an Open DNS or open “public” SNMP Confidential
  • 4. The 5 Commandment of DDoS Mitigation Confidential
  • 5. Commandment 1: Thou shall be invisible Your users don’t need to know and don’t care that you are under attack People Don’t like to hang around in “dangerous” places People should be allowed to enter: • Without delays • Without being sent through holding areas & splash screens • Without being served outdated cached content Confidential
  • 6. Commandment 2: Let he who is innocent step forward Self Redemption is Key!!! All users should be able to exonerate themselves. At the very least users should be able to: Shout out (complain) Redeem themselves by completing a CAPTCHA. Confidential
  • 7. Commandment 3: Spare no bot but beware of those holier than thou Block all Application Layer Bot Requests • There is very little head room for most sites • Even 50 excess page views/second can take down your site, or slow it down. Transparency should not come at the expense of airtight protection However, you must grant the “Internet Gods” (Google, Bing, Pingdom, etc.) access at all times Confidential
  • 8. Commandment 4: Absorb all that is cast upon you Take Cover! Network attacks are getting bigger You must be able to take a “20Gbps +” hit standing You must have isolation capabilities to prevent others from trembling with you Confidential
  • 9. Commandment 5: To err is Human. Precise Detection is divine Automatic & Accurate DDoS detection is just as important as effective mitigation One shouldn’t be in “DDoS Mode” unnecessarily and you can’t watch your site 24x7x365 Real-time protection activation is crucial, otherwise you’re going down Confidential
  • 10. Stay Safe Marc Gaffan Co-Founder, VP Marketing & Business-Development marc@incapsula.com Confidential