SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
case study




Verisign DDos Protection
serVices HelPs e-retailer Mitigate
sustaineD, Multi-layer DDos attack
When a leading online retailer experienced a crippling distributed denial of
service (ddos) attack on its tWo main e-commerce Websites, it dreW on verisign ddos
protection services to mitigate the attack and quickly restore full functionality.



  at the time of the call to verisign, the attack had persisted   technology to identify and then mitigate the type of
  for more than one week and both websites were                   ddos attack that was hitting its system. typical of
  completely unavailable. With thousands of dollars in sales      many companies, it had relied on measures that were
  everyday, the websites were a primary revenue source            insufficient to ward off ddos attacks of the scale and
  for the retailer and an essential conduit for transactions,     sophistication seen in the past few years.
  interactions, and information about the company’s
  products. although the company set up a redirect page           For more information on best practices to protect
  advising e-commerce customers that they could phone             against DDos attacks, see the Verisign white paper,
  in their orders, customers and wholesalers could not view       Best Practices for a rapidly changing landscape.
  online product descriptions and other information they          in this case, a small firewall in front of the company’s
  needed to make their purchase decisions. order volume           Web servers quickly failed once the attack exceeded
  dropped significantly, amounting to an estimated $100,000       the firewall’s traffic threshold. upon recommendation
  in lost sales in one week. facing stiff competition,            by a competitor who had recently experienced a similar
  the company was especially sensitive to further                 attack, the company turned to verisign. verisign® ddos
  inconveniencing its customers and giving up market share.       protection services is a cloud-based ddos detection,
  even though the company tried to fight off the attack           mitigation, and actor attribution solution that rapidly
  on its own, it did not have the in-house expertise or           and selectively mitigates risk in order to maintain high
                                                                  throughput rates for legitimate traffic.
iMMeDiate traFFic reDirection to Verisign’s Mitigation center

Working with the company’s in-house team, verisign’s           this on-demand, cloud-based solution was the most
first step was to point the websites’ domain name              feasible for the retailer because it could be implemented
system (dns) to verisign’s internet protocol (ip) address      immediately, did not require investment in ddos monitoring
so all website traffic would be diverted to verisign’s         and mitigation technology, and offered more scalability,
in-the-cloud mitigation center instead of consuming the        reliability, and flexibility than an in-house, premise-based,
retailer’s bandwidth. at the mitigation center, verisign       or isp-based solution. in addition, the solution was backed
then applied a series of filters to inspect and analyze data   by verisign’s extensive expertise and global intelligence
packets for malicious traffic.                                 network, which proved an advantage in anticipating the
                                                               attackers’ next moves, distinguishing between normal and
designed to handle massive ddos attacks, verisign’s
                                                               malicious traffic, and developing new filters in real time to
proprietary monitoring and mitigation platform readily
                                                               counter those moves.
absorbed attack traffic, while quickly returning legitimate
traffic to the websites so that the company could begin
accepting orders again.




                                                                             “in order to pay for their purchases, the
                                                                            company’s customers needed to add items
                                                                           to their shopping cart and then check out.
                                                                          at first the attackers flooded the company’s
                                                                         internet connections, so customers’ orders
                                                                        could not reach the website. imagine a
                                                                       customer’s frustration at going through the
                                                                      process of researching and selecting items,
                                                                     and then not being able to complete his or
                                                                    her purchase.”

                                                                  Verisign Operations Senior Engineer
agile resPonse to coMPlex anD cHanging attack tactics center

the attack came in multiple waves, which verisign           connect were unable to do so and multiple timeouts
engineers and technology were ready for.                    jammed the internet connections. in conjunction with the
                                                            http attack, the attackers were sending traffic that did
“We regularly mitigate massive, complex attacks             not comply with internet rfc standards (e.g., overlapping
on our.com and .net infrastructure, which has               fragments, non-compliant flags within the tcp and ip
maintained 100 percent availability for 13 plus             headers, and the destination ip address populating
years,” explains the engineer. “this gives us an            as the source ip address).
unmatched level of experience in identifying
and mitigating DDos attacks.”                               Verisign responded by limiting the rate of traffic
                                                            being sent to the Web servers. Verisign also acted
the first series of attacks were transport-layer tcp        as a proxy for the websites, so the attack would
syn flood attacks in the 250 mbps range. once verisign      flow to Verisign first and only complete connections
started mitigating the attack, the volume rose to 2.27      would cross to the website.
gbps in less than 30 minutes. as verisign applied
countermeasures, the attackers changed tactics and          these measures helped the retailer to recover, but as the
started sending application-layer http floods. http         verisign team anticipated, the attackers changed tactics
flood attacks continuously attempt to pull up a Web page    one or two hours later. they went from an http flood
from a single ip address or a range of ip addresses.        attack, which verisign had rendered ineffective, to an ssl
once the flood of requests exceeded the traffic threshold   flood attack, which targeted encrypted, secure traffic for
for the Web page server, new clients that attempted to      credit card transactions.




                                                                       “ssl attacks are more complicated to
                                                                       mitigate because you need to get the
                                                                      customer’s private key and look inside the
                                                                     payload of the ssl packet. We got the private
                                                                    key and when we started decrypting packets
                                                                   we saw that the attackers were making
                                                                  malform requests inside the ssl payload.
                                                                 We quickly updated our mitigation filters
                                                                to drop the requests.”

                                                              Senior Verisign DDoS Protection Services Engineer
“With a smaller, less-experienced solution
                                                                                                             provider, the company’s hard-earned
                                                                                                            leadership position could have dwindled
                                                                                                           away as customers became frustrated and
                                                                                                          concerned about the websites’ unavailability.
                                                                                                         thanks to Verisign’s technology and our
                                                                                                        team’s ability to respond rapidly anD
                                                                                                       appropriately to this complex attack, the
                                                                                                      company was able to get back to business
                                                                                                     without suffering long-term consequences.”

                                                                                                   Senior Verisign DDoS Protection Services Engineer




      Functionality—anD online                                                                  For More inForMation
      orDer leVels—restoreD                                                                     for more information about verisign ddos protection
      the first ddos attack was analyzed and mitigated                                          services, please contact a verisign representative
      within 30 minutes of the company’s call to verisign,                                      at 1-866-200-1979 or 1-703-376-6905, or email
      and orders for merchandise quickly started flowing                                        ddos@verisign.com.
      again through the company’s e-commerce websites.
      even though the attack lasted another week, it no
      longer impacted the company’s websites because                                            aBout Verisign
      all traffic was being diverted to verisign’s ddos                                         verisign is the trusted provider of internet infrastructure
      monitoring and mitigation platform. after that time,                                      services for the digital world. billions of times each
      order levels returned to pre-attack levels.                                               day, companies and consumers rely on our internet
                                                                                                infrastructure to communicate and conduct commerce
                                                                                                with confidence.




VerisignInc.com
© 2011 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc.
and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.

Contenu connexe

Dernier

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

VRSN DDoS Case Study - September 2011

  • 1. case study Verisign DDos Protection serVices HelPs e-retailer Mitigate sustaineD, Multi-layer DDos attack When a leading online retailer experienced a crippling distributed denial of service (ddos) attack on its tWo main e-commerce Websites, it dreW on verisign ddos protection services to mitigate the attack and quickly restore full functionality. at the time of the call to verisign, the attack had persisted technology to identify and then mitigate the type of for more than one week and both websites were ddos attack that was hitting its system. typical of completely unavailable. With thousands of dollars in sales many companies, it had relied on measures that were everyday, the websites were a primary revenue source insufficient to ward off ddos attacks of the scale and for the retailer and an essential conduit for transactions, sophistication seen in the past few years. interactions, and information about the company’s products. although the company set up a redirect page For more information on best practices to protect advising e-commerce customers that they could phone against DDos attacks, see the Verisign white paper, in their orders, customers and wholesalers could not view Best Practices for a rapidly changing landscape. online product descriptions and other information they in this case, a small firewall in front of the company’s needed to make their purchase decisions. order volume Web servers quickly failed once the attack exceeded dropped significantly, amounting to an estimated $100,000 the firewall’s traffic threshold. upon recommendation in lost sales in one week. facing stiff competition, by a competitor who had recently experienced a similar the company was especially sensitive to further attack, the company turned to verisign. verisign® ddos inconveniencing its customers and giving up market share. protection services is a cloud-based ddos detection, even though the company tried to fight off the attack mitigation, and actor attribution solution that rapidly on its own, it did not have the in-house expertise or and selectively mitigates risk in order to maintain high throughput rates for legitimate traffic.
  • 2. iMMeDiate traFFic reDirection to Verisign’s Mitigation center Working with the company’s in-house team, verisign’s this on-demand, cloud-based solution was the most first step was to point the websites’ domain name feasible for the retailer because it could be implemented system (dns) to verisign’s internet protocol (ip) address immediately, did not require investment in ddos monitoring so all website traffic would be diverted to verisign’s and mitigation technology, and offered more scalability, in-the-cloud mitigation center instead of consuming the reliability, and flexibility than an in-house, premise-based, retailer’s bandwidth. at the mitigation center, verisign or isp-based solution. in addition, the solution was backed then applied a series of filters to inspect and analyze data by verisign’s extensive expertise and global intelligence packets for malicious traffic. network, which proved an advantage in anticipating the attackers’ next moves, distinguishing between normal and designed to handle massive ddos attacks, verisign’s malicious traffic, and developing new filters in real time to proprietary monitoring and mitigation platform readily counter those moves. absorbed attack traffic, while quickly returning legitimate traffic to the websites so that the company could begin accepting orders again. “in order to pay for their purchases, the company’s customers needed to add items to their shopping cart and then check out. at first the attackers flooded the company’s internet connections, so customers’ orders could not reach the website. imagine a customer’s frustration at going through the process of researching and selecting items, and then not being able to complete his or her purchase.” Verisign Operations Senior Engineer
  • 3. agile resPonse to coMPlex anD cHanging attack tactics center the attack came in multiple waves, which verisign connect were unable to do so and multiple timeouts engineers and technology were ready for. jammed the internet connections. in conjunction with the http attack, the attackers were sending traffic that did “We regularly mitigate massive, complex attacks not comply with internet rfc standards (e.g., overlapping on our.com and .net infrastructure, which has fragments, non-compliant flags within the tcp and ip maintained 100 percent availability for 13 plus headers, and the destination ip address populating years,” explains the engineer. “this gives us an as the source ip address). unmatched level of experience in identifying and mitigating DDos attacks.” Verisign responded by limiting the rate of traffic being sent to the Web servers. Verisign also acted the first series of attacks were transport-layer tcp as a proxy for the websites, so the attack would syn flood attacks in the 250 mbps range. once verisign flow to Verisign first and only complete connections started mitigating the attack, the volume rose to 2.27 would cross to the website. gbps in less than 30 minutes. as verisign applied countermeasures, the attackers changed tactics and these measures helped the retailer to recover, but as the started sending application-layer http floods. http verisign team anticipated, the attackers changed tactics flood attacks continuously attempt to pull up a Web page one or two hours later. they went from an http flood from a single ip address or a range of ip addresses. attack, which verisign had rendered ineffective, to an ssl once the flood of requests exceeded the traffic threshold flood attack, which targeted encrypted, secure traffic for for the Web page server, new clients that attempted to credit card transactions. “ssl attacks are more complicated to mitigate because you need to get the customer’s private key and look inside the payload of the ssl packet. We got the private key and when we started decrypting packets we saw that the attackers were making malform requests inside the ssl payload. We quickly updated our mitigation filters to drop the requests.” Senior Verisign DDoS Protection Services Engineer
  • 4. “With a smaller, less-experienced solution provider, the company’s hard-earned leadership position could have dwindled away as customers became frustrated and concerned about the websites’ unavailability. thanks to Verisign’s technology and our team’s ability to respond rapidly anD appropriately to this complex attack, the company was able to get back to business without suffering long-term consequences.” Senior Verisign DDoS Protection Services Engineer Functionality—anD online For More inForMation orDer leVels—restoreD for more information about verisign ddos protection the first ddos attack was analyzed and mitigated services, please contact a verisign representative within 30 minutes of the company’s call to verisign, at 1-866-200-1979 or 1-703-376-6905, or email and orders for merchandise quickly started flowing ddos@verisign.com. again through the company’s e-commerce websites. even though the attack lasted another week, it no longer impacted the company’s websites because aBout Verisign all traffic was being diverted to verisign’s ddos verisign is the trusted provider of internet infrastructure monitoring and mitigation platform. after that time, services for the digital world. billions of times each order levels returned to pre-attack levels. day, companies and consumers rely on our internet infrastructure to communicate and conduct commerce with confidence. VerisignInc.com © 2011 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.