SlideShare une entreprise Scribd logo
1  sur  27
Network Application
Security & WAF
Presenter: Steve Xue
Alibaba Cloud Services Portfolio
Cloud Monitor
Anti-DDoS
Cloud Shield
WAF
Web Application Firewall
HSM
Hardware Secure Module
Monitoring & Security
Block Storage
OSS
Object Storage Service
Archive Storage
NAS
Network Attached Storage
Message Service
Storage
ECS
Elastic Compute Service
Auto Scaling
SLB
Server Load Balancer
Container Service
E-HPC
High Performance
Compute
BatchCompute
Compute
Global IDC Regions Available Zones
MaxCompute
Big Data
RAM
Resource Access
Management
CLI API
DevOps
Media Transcoding OpenSearch
Mobile Analytics
Log Service
EDAS
Enterprise Distributed Application Service
Distributed RDS
ROS
Resource Orchestration
Service
ONS
Open Notification Service
Applications
Infrastructure
Technical
Support
Professional
Services
Training &
Certification
Cloud
Architects
Pricing
Report
Support Solutions
O2O StorageHealthcareMedia Security GovernmentGaming IoT MobileWeb FinanceDigital Marketing
VPC
Virtual Private Cloud
ExpressConnect
Elastic IP
CDN
HA-IP
High Availability IP
RDS
Relational Database Service
Oceanbase
Memcache
Table Store
Redis MongoDB
DMS
Database Management
Analytic DB
DTS
Data Transmission Service
Database
PetaData
KMS
Key Management Service
Performance TestingEMR
Network
1
2
Managed
Security
Service
China
Cybersecurity
Law
Compliance
Service
Vulnerability
Discovery
Service
Key Management
Service
Data Encryption
service
Certificate
Management Service
WAF
Server Guard
Anti-DDoS
Alibaba Cloud Services Portfolio
Network Threats
3
Social Engineering
Reverse Engineering
HTTP Floods
SQL Injection
Bots and Probes
Application Exploits
Reflection & Amplification
Layer 4 and 7 Floods
Slowloris
SSL Abuse
DDoS
Targeted
Attacks
Application
Hacks
Application Attacks
4
What to Trust?
Network Threats
5
OWASP - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - 2013 OWASP Top 10 - 2017
Network Threats
6
Malicious Injection
<?php
$input = $_GET(“param”);
Echo “<idv>”.$input.”</div>”;
?>
Http://www.test.com/test.php?param=“option1”;
User input:
Http://www.test.com/test.php?param=<script>al
ert(xxs)</script>
var City;
City = Request.form(“City”);
var sql = “select * from OrdersTable where City =
‘” + City + “’”;
User input:
Beijing”; drop table OrdersTable--
HTML Injection SQL Injection
Network Threats
7
Browser Security
• Same Origin Policy
• Malicious website (Trojan embedded or
Phishing) blacklist
• Website certification and authentication
Network Threats
8
Application Layer DoS
• CC Flood
• Slowloris
Network Threats
9
Application Security
WAF Highlights
Web application firewall (WAF) is an
appliance, server plugin, or filter that
applies a set of rules to HTTP traffic.
WAF
• Based on 10 years of R&D experience
protecting Alibaba sites
• Helps protect websites and applications
against attacks that cause data breaches &
downtime
• Protection against OWASP Top 10 Threats
• Gartner reports that the main driver of WAF
purchases (25-30%) is PCI compliance
10
Alibaba Cloud Web Application Firewall (WAF) is an application level security product developed by
Alibaba Cloud based on the company’s 10 years of experience in defensive and big data security capaabilities.
Product functions include:
Accurate Access
Block
Crawler Protection
Human-machine
Identification
Big Data & Threat
Intelligence
0-Day Vulnerability
Hotfix
Data Breach
Protection
Application Security
11
Attack Vectors Addressed by WAF
• SQL injection: Attackers insert malicious SQL code into web requests in an effort to extract data from your
database
• Cross-site scripting (XSS): Malicious scripts are injected into otherwise benign and trusted websites
• Scanners and probes: Malicious sources scan and probe Internet-facing web applications for vulnerabilities
• Known attacker origins (IP reputation lists): A number of organizations maintain reputation lists of IP
addresses of known attackers
• Bots and scrapers: Some automated clients misrepresent themselves to bypass restrictions
• Application-level exploits
Application Security
12
WAF Bad Traffic Mitigation
Internet
Hackers
& Bot
Legitimate
Traffic
IP ReputationBig Data Intelligence
Mitigation
Expert SupportEnhanced Algorithm
Backend
WAF
Application Security
13
Traffic Mitigation Example
Client Server
DNS Server
IP:1.1.1.1
3: Access 1.1.1.1
Before: DNS Record:
booking.com 1.1.1.1
Client Server
WAF
DNS Server
After:
2: IP is 1.1.1.1
1: What is the IP?
2: wafabc.alibabcloud.com
1: What is the ’s IP?
DNS CNAME Record:
booking.com wafabc.alibabcloud.com
IP:1.1.1.1
DNS Record:
booking.com 1.1.1.1
3: Access wafabc.alibabcloud.com
HTTP Head
Host: booking.com
4: Forward to 1.1.1.1
wafabc.aliyun.com
Application Security
Console Demonstration
14
Business Sustainability
Industries Suffering With Bad Bots
15
- Ticket on-hold
- Low attendance rate
- Revenue loss
Aviation E-commerce Real Estate
- Product Price Crawler
- Product Line-up Crawler
- Real estate DB Crawler
- Competitor business analysis
16
How Do We Defend Against Bots?
Browser
IP
Reputation
Bot
Protection
Human-bot
Identification
Expert
Support
WAF Anti-Bot Protection
Legitimate Traffic Bot Traffic
Mobile
App
SDK
Web
Server
App
Server
Business Sustainability
The Anti-fraud Architecture
17
Anti-Fraud Architecture
Fintech E-Commerce
Third-party
Payment
Game &
Entertainment
Social Network Other
Malicious
Registration
Brute Force
Marketing
Cheating
SPAM Other
Big Data Analysis
(Mobile phone, Email, IP, etc. )
Human-machine Identification
Data Modeling and Algorithms
Risk Score Risk Rank Risk Report
Input
Output
False Identity
Core
Technology
Business Sustainability
18
Anti-bot Case Study
“We need Alibaba Cloud to continue to give us the support
and assistance in fixing our issues.”
Declan – AirAsia Group CIO
Business Sustainability
19
Anti-bot Case Study
Submit Fake User
Info
Reserving Seats
(30 minutes)
Placed Order
(Without Payment)
Business Sustainability
20
Anti-bot Case Study
Business Sustainability
21
Some Advice About Security O&M
Find and Fix
Defend and
Defer
Secure at
the Source
Management
(70%)
Technology
(30%)
Q&A
?
22
23
Training
Cloud Computing
ACT 81001
Technical Essentials
Security Big Data
ACT 81002
Technical Operating
ACT 83001
Security
ACT 82001
Maxcompute
& DataIDE
ACT 81003
Architecting
ACT 82002
E-MapReduce
24
Certification
Expert
Live Streaming Specialist
Fin Tech Specialist
Cloud Security Specialist
Gaming Solution Specialist
Senior Engineer
Cloud Architect
System Analyst
Data Analyst
Big Data Developer
Junior Engineer
Cloud Developer
Big Data Engineer
Security Engineer
Operator
Beginner
Users
Developers interested in Cloud Computing
Cloud
Computing
Security Big Data
ACP
ACA
ACE
Expert
Professional
Associate
✔️ ✔️
Coming
Soon
✔️ ✔️ 0Coming
Soon
Introduction to WAF and Network Application Security

Contenu connexe

Tendances

Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testingImaginea
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)OWASP Ottawa
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practicesScott Hurrey
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh clevernetsystemsgeneva
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewalldavidjohnrace
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Adam Englander
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and GuidelinesWSO2
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewMichael Furman
 
Securing Kafka
Securing Kafka Securing Kafka
Securing Kafka confluent
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksMarco Morana
 

Tendances (20)

Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
FortiWeb
FortiWebFortiWeb
FortiWeb
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
OWASP Top Ten 2017
OWASP Top Ten 2017OWASP Top Ten 2017
OWASP Top Ten 2017
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
Securing Kafka
Securing Kafka Securing Kafka
Securing Kafka
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Cloud security
Cloud security Cloud security
Cloud security
 

Similaire à Introduction to WAF and Network Application Security

Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWSAmazon Web Services
 
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...Forster CHIU
 
Apache Kafka as Event Streaming Platform for Microservice Architectures
Apache Kafka as Event Streaming Platform for Microservice ArchitecturesApache Kafka as Event Streaming Platform for Microservice Architectures
Apache Kafka as Event Streaming Platform for Microservice ArchitecturesKai Wähner
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture OverviewDavid Solivan
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Scott Sims
 
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...Amazon Web Services
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays
 
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM France Lab
 
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 Secure your app against DDOS, API Abuse, Hijacking, and Fraud Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Secure your app against DDOS, API Abuse, Hijacking, and FraudTu Pham
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.jsShubhra Kar
 
IBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONEIBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONEFondazione CRUI
 
Toronto node js_meetup
Toronto node js_meetupToronto node js_meetup
Toronto node js_meetupShubhra Kar
 
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?Estelle Auberix
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 

Similaire à Introduction to WAF and Network Application Security (20)

Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
 
Apache Kafka as Event Streaming Platform for Microservice Architectures
Apache Kafka as Event Streaming Platform for Microservice ArchitecturesApache Kafka as Event Streaming Platform for Microservice Architectures
Apache Kafka as Event Streaming Platform for Microservice Architectures
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture Overview
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
 
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
 
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
 
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 Secure your app against DDOS, API Abuse, Hijacking, and Fraud Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.js
 
IBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONEIBM CLOUD - PRESENTAZIONE
IBM CLOUD - PRESENTAZIONE
 
Toronto node js_meetup
Toronto node js_meetupToronto node js_meetup
Toronto node js_meetup
 
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?
Azure Edge IoT vs. AWS Lambda, competition or global soluce for IoT?
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 

Plus de Alibaba Cloud

Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
 
Getting Started with Elasticsearch
Getting Started with ElasticsearchGetting Started with Elasticsearch
Getting Started with ElasticsearchAlibaba Cloud
 
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to ThinkAlibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to ThinkAlibaba Cloud
 
Serverless Computing: Driving Innovation and Business Value
Serverless Computing: Driving Innovation and Business ValueServerless Computing: Driving Innovation and Business Value
Serverless Computing: Driving Innovation and Business ValueAlibaba Cloud
 
Loan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningLoan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningAlibaba Cloud
 
Next Level Digital Media with Alibaba Cloud (Part 2)
Next Level Digital Media with Alibaba Cloud (Part 2)Next Level Digital Media with Alibaba Cloud (Part 2)
Next Level Digital Media with Alibaba Cloud (Part 2)Alibaba Cloud
 
An Introduction to Alibaba Cloud’s Message Service
An Introduction to Alibaba Cloud’s Message ServiceAn Introduction to Alibaba Cloud’s Message Service
An Introduction to Alibaba Cloud’s Message ServiceAlibaba Cloud
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudAlibaba Cloud
 
Next Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best PracticesNext Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best PracticesAlibaba Cloud
 
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Alibaba Cloud
 
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail CloudThe Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail CloudAlibaba Cloud
 
Big Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data IntegrationBig Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data IntegrationAlibaba Cloud
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba CloudAlibaba Cloud
 
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the CloudHow to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the CloudAlibaba Cloud
 
Big Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data VisualizationBig Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data VisualizationAlibaba Cloud
 
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...Alibaba Cloud
 
Launch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with MagentoLaunch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with MagentoAlibaba Cloud
 
Responding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database TechnologyResponding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database TechnologyAlibaba Cloud
 
How to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba CloudHow to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba CloudAlibaba Cloud
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaAlibaba Cloud
 

Plus de Alibaba Cloud (20)

Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Getting Started with Elasticsearch
Getting Started with ElasticsearchGetting Started with Elasticsearch
Getting Started with Elasticsearch
 
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to ThinkAlibaba Cloud’s ET City Brain - Empowering Cities to Think
Alibaba Cloud’s ET City Brain - Empowering Cities to Think
 
Serverless Computing: Driving Innovation and Business Value
Serverless Computing: Driving Innovation and Business ValueServerless Computing: Driving Innovation and Business Value
Serverless Computing: Driving Innovation and Business Value
 
Loan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningLoan Default Prediction with Machine Learning
Loan Default Prediction with Machine Learning
 
Next Level Digital Media with Alibaba Cloud (Part 2)
Next Level Digital Media with Alibaba Cloud (Part 2)Next Level Digital Media with Alibaba Cloud (Part 2)
Next Level Digital Media with Alibaba Cloud (Part 2)
 
An Introduction to Alibaba Cloud’s Message Service
An Introduction to Alibaba Cloud’s Message ServiceAn Introduction to Alibaba Cloud’s Message Service
An Introduction to Alibaba Cloud’s Message Service
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the Cloud
 
Next Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best PracticesNext Generation Retail Part 3 - Retail Transformation Best Practices
Next Generation Retail Part 3 - Retail Transformation Best Practices
 
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
 
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail CloudThe Next Generation of Retail - Unlocking Alibaba Retail Cloud
The Next Generation of Retail - Unlocking Alibaba Retail Cloud
 
Big Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data IntegrationBig Data Quickstart Series 3: Perform Data Integration
Big Data Quickstart Series 3: Perform Data Integration
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba Cloud
 
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the CloudHow to Leverage ApsaraDB to Deploy Business Data on the Cloud
How to Leverage ApsaraDB to Deploy Business Data on the Cloud
 
Big Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data VisualizationBig Data Quickstart Series 1: Create Powerful Data Visualization
Big Data Quickstart Series 1: Create Powerful Data Visualization
 
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
Introduction to Elastic Compute Service on Alibaba Cloud to Power Your Busine...
 
Launch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with MagentoLaunch and Scale Your E-commerce Website with Magento
Launch and Scale Your E-commerce Website with Magento
 
Responding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database TechnologyResponding to Digital Transformation With RDS Database Technology
Responding to Digital Transformation With RDS Database Technology
 
How to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba CloudHow to Set Up ApsaraDB for RDS on Alibaba Cloud
How to Set Up ApsaraDB for RDS on Alibaba Cloud
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Introduction to WAF and Network Application Security

  • 1. Network Application Security & WAF Presenter: Steve Xue
  • 2.
  • 3. Alibaba Cloud Services Portfolio Cloud Monitor Anti-DDoS Cloud Shield WAF Web Application Firewall HSM Hardware Secure Module Monitoring & Security Block Storage OSS Object Storage Service Archive Storage NAS Network Attached Storage Message Service Storage ECS Elastic Compute Service Auto Scaling SLB Server Load Balancer Container Service E-HPC High Performance Compute BatchCompute Compute Global IDC Regions Available Zones MaxCompute Big Data RAM Resource Access Management CLI API DevOps Media Transcoding OpenSearch Mobile Analytics Log Service EDAS Enterprise Distributed Application Service Distributed RDS ROS Resource Orchestration Service ONS Open Notification Service Applications Infrastructure Technical Support Professional Services Training & Certification Cloud Architects Pricing Report Support Solutions O2O StorageHealthcareMedia Security GovernmentGaming IoT MobileWeb FinanceDigital Marketing VPC Virtual Private Cloud ExpressConnect Elastic IP CDN HA-IP High Availability IP RDS Relational Database Service Oceanbase Memcache Table Store Redis MongoDB DMS Database Management Analytic DB DTS Data Transmission Service Database PetaData KMS Key Management Service Performance TestingEMR Network 1
  • 5. Network Threats 3 Social Engineering Reverse Engineering HTTP Floods SQL Injection Bots and Probes Application Exploits Reflection & Amplification Layer 4 and 7 Floods Slowloris SSL Abuse DDoS Targeted Attacks Application Hacks Application Attacks
  • 7. 5 OWASP - The Ten Most Critical Web Application Security Risks OWASP Top 10 - 2013 OWASP Top 10 - 2017 Network Threats
  • 8. 6 Malicious Injection <?php $input = $_GET(“param”); Echo “<idv>”.$input.”</div>”; ?> Http://www.test.com/test.php?param=“option1”; User input: Http://www.test.com/test.php?param=<script>al ert(xxs)</script> var City; City = Request.form(“City”); var sql = “select * from OrdersTable where City = ‘” + City + “’”; User input: Beijing”; drop table OrdersTable-- HTML Injection SQL Injection Network Threats
  • 9. 7 Browser Security • Same Origin Policy • Malicious website (Trojan embedded or Phishing) blacklist • Website certification and authentication Network Threats
  • 10. 8 Application Layer DoS • CC Flood • Slowloris Network Threats
  • 11. 9 Application Security WAF Highlights Web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to HTTP traffic. WAF • Based on 10 years of R&D experience protecting Alibaba sites • Helps protect websites and applications against attacks that cause data breaches & downtime • Protection against OWASP Top 10 Threats • Gartner reports that the main driver of WAF purchases (25-30%) is PCI compliance
  • 12. 10 Alibaba Cloud Web Application Firewall (WAF) is an application level security product developed by Alibaba Cloud based on the company’s 10 years of experience in defensive and big data security capaabilities. Product functions include: Accurate Access Block Crawler Protection Human-machine Identification Big Data & Threat Intelligence 0-Day Vulnerability Hotfix Data Breach Protection Application Security
  • 13. 11 Attack Vectors Addressed by WAF • SQL injection: Attackers insert malicious SQL code into web requests in an effort to extract data from your database • Cross-site scripting (XSS): Malicious scripts are injected into otherwise benign and trusted websites • Scanners and probes: Malicious sources scan and probe Internet-facing web applications for vulnerabilities • Known attacker origins (IP reputation lists): A number of organizations maintain reputation lists of IP addresses of known attackers • Bots and scrapers: Some automated clients misrepresent themselves to bypass restrictions • Application-level exploits Application Security
  • 14. 12 WAF Bad Traffic Mitigation Internet Hackers & Bot Legitimate Traffic IP ReputationBig Data Intelligence Mitigation Expert SupportEnhanced Algorithm Backend WAF Application Security
  • 15. 13 Traffic Mitigation Example Client Server DNS Server IP:1.1.1.1 3: Access 1.1.1.1 Before: DNS Record: booking.com 1.1.1.1 Client Server WAF DNS Server After: 2: IP is 1.1.1.1 1: What is the IP? 2: wafabc.alibabcloud.com 1: What is the ’s IP? DNS CNAME Record: booking.com wafabc.alibabcloud.com IP:1.1.1.1 DNS Record: booking.com 1.1.1.1 3: Access wafabc.alibabcloud.com HTTP Head Host: booking.com 4: Forward to 1.1.1.1 wafabc.aliyun.com Application Security
  • 17. Business Sustainability Industries Suffering With Bad Bots 15 - Ticket on-hold - Low attendance rate - Revenue loss Aviation E-commerce Real Estate - Product Price Crawler - Product Line-up Crawler - Real estate DB Crawler - Competitor business analysis
  • 18. 16 How Do We Defend Against Bots? Browser IP Reputation Bot Protection Human-bot Identification Expert Support WAF Anti-Bot Protection Legitimate Traffic Bot Traffic Mobile App SDK Web Server App Server Business Sustainability
  • 19. The Anti-fraud Architecture 17 Anti-Fraud Architecture Fintech E-Commerce Third-party Payment Game & Entertainment Social Network Other Malicious Registration Brute Force Marketing Cheating SPAM Other Big Data Analysis (Mobile phone, Email, IP, etc. ) Human-machine Identification Data Modeling and Algorithms Risk Score Risk Rank Risk Report Input Output False Identity Core Technology Business Sustainability
  • 20. 18 Anti-bot Case Study “We need Alibaba Cloud to continue to give us the support and assistance in fixing our issues.” Declan – AirAsia Group CIO Business Sustainability
  • 21. 19 Anti-bot Case Study Submit Fake User Info Reserving Seats (30 minutes) Placed Order (Without Payment) Business Sustainability
  • 23. 21 Some Advice About Security O&M Find and Fix Defend and Defer Secure at the Source Management (70%) Technology (30%)
  • 25. 23 Training Cloud Computing ACT 81001 Technical Essentials Security Big Data ACT 81002 Technical Operating ACT 83001 Security ACT 82001 Maxcompute & DataIDE ACT 81003 Architecting ACT 82002 E-MapReduce
  • 26. 24 Certification Expert Live Streaming Specialist Fin Tech Specialist Cloud Security Specialist Gaming Solution Specialist Senior Engineer Cloud Architect System Analyst Data Analyst Big Data Developer Junior Engineer Cloud Developer Big Data Engineer Security Engineer Operator Beginner Users Developers interested in Cloud Computing Cloud Computing Security Big Data ACP ACA ACE Expert Professional Associate ✔️ ✔️ Coming Soon ✔️ ✔️ 0Coming Soon

Notes de l'éditeur

  1. Before we talk about Alibaba Cloud Security, I want to talk a little bit about our personal security . After I joined Alibaba as a trainer, my lovely boss Annie told me that we need you to work on cloud security solution training area. I told her I love this direction, because I am a person has serious security problem. Annie was surprised and asked me why? I said, my 2 former employees both promise me to live long enough and now they are all gone, I totally lost my faith to IT industry at all! Then Annie said, don’t worry, man, Alibaba will last for at least ten decades, trust me! I said how do you know, she said, because Ma Yun said so. So, personal security is all about the trust level you have to the future, future is unpredictable and keep changing, what we can only do is strengthen our capabilities to deal with the unknown future. That is also the reason we build Alibaba Cloud Security products and solutions. If you are the person running your own business, you need to trust your partners and your loyal customers to boom your business, but at the same time, you should never trust the whole internet environment and should always be careful to prevent any intrusion from any unknown hackers or organization who want to crash your business in one night.
  2. 1> In previous slide, we show our regions. In each region, we have several Azs. Each AZ is a T3+ or T4 Data Center. 2> We classified our services into several categories. It’s more easier for users to understand. The first 3 categories are compute, network and storage. Those are the most fundamental parts we provided, almost each customer use these services. The difference or we say the benefit of using cloud services is it’s flexibility. Firstly, the infrastructure and the services are already deployed in quite a lot areas. Or the areas you want to deploy can be covered by the cloud regions nearby. So you don’t have to spend a lot of time to setup the infra. You can open, release, scale up/down your cloud infra/services by a simple click and the operation will be completed in several minutes. Another benefit for our customers is they only pay for what they used. Take the ECS service as an example, we have two billing models: one is pay-as-you-go, it’s counted by hours. Another model is reserved, you can reserved the instance for a month or a year. The unit price of reserved is cheaper than PAYG. 3> We also provide managed database services. We assure 99.95% availability and 99.9999% durability. 4> Log service works like Splunk. For ex, you may have web servers. There are logs configured to record each connection to your website or apps. Log service can read and analysis logs in real-time. It’s easy to tell the health of your system by monitoring the errors and also can monitor the PV/UV of your system. The results can be stored into a database as well. 5> Edas is a distributed computing framework. Compared with the traditional service bus architecture, it adopted the de-centralized system architecture. The service provider and invoker are connected directly. It avoids the spof risk of service bus and also improves the efficiency of the system. It embeds auto-scaling feature and can manage 100K servers. It also embeds monitoring system, log analysis system and session management framework. Taobao is using this and it’s working very well in 11.11 festival.
  3. SSL 对服务器性能的要求,导致可能的ddos攻击更高级。 Slowloris is a type of denial of service attack tool invented by Robert "RSnake" Hansen which allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports.Slowloris tries to keep many connections to the target web server open and hold them open as long as possible. It accomplishes this by opening connections to the target web server and sending a partial request. Periodically, it will send subsequent HTTP headers, adding to—but never completing—the request. Affected servers will keep these connections open, filling their maximum concurrent connection pool, eventually denying additional connection attempts from clients. Target attacks: 举例,俄罗斯黑客团伙,针对某一个具体目标,使用所有的社交和可用的渠道,通过换取内部人的信任,或者诱导有权限的人点击,访问一些假的链接,间接的获得权限。或者使用内部人士身份,再次发起诱导。
  4. When server side is not hostile , it might want you to click on some page which has special executable string embedded so they can gain your client side information . This accelerate the protocol invented and also CA is created to provide the sever side authentication. When internet become more and more popular, more and more websites has clients sensitive information like account information stored. So more hackers are. SSL stands for Secure Sockets Layer and, in short, it's the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details. The two systems can be a server and a client (for example, a shopping website and browser) or server to server (for example, an application with personal identifiable information or with payroll information). It does this by making sure that any data transferred between users and sites, or between two systems remain impossible to read. It uses encryption algorithms to scramble data in transit, preventing hackers from reading it as it is sent over the connection. This information could be anything sensitive or personal which can include credit card numbers and other financial information, names and addresses. TLS (Transport Layer Security) is just an updated, more secure, version of SSL. We still refer to our security certificates as SSL because it is a more commonly used term, but when you are buying SSL from Symantec you are actually buying the most up to date TLS certificates with the option of ECC, RSA or DSA encryption. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. Target: Sensitive Data, Service Availability Through: XSS, SQL Injection, CSRF, DDOS, etc. Heartbleed: https://baike.baidu.com/item/Heartbleed/13580882 2014年4月9日,Heartbleed(意为“心脏出血”)的重大安全漏洞被曝光,一位安全行业人士在知乎上透露,他在某著名电商网站上用这个漏洞尝试读取数据,在读取200次后,获得了40多个用户名、7个密码,用这些密码,他成功地登录了该网站。[2]  Heartbleed能让攻击者从服务器内存中读取包括用户名、密码和信用卡号等隐私信息在内的数据,已经波及大量互联网公司。[4]  受影响的服务器数量可能多达几十万。其中已被确认受影响的网站包括 Imgur、OKCupid、Eventbrite 以及 FBI 网站等,不过 Google 未受影响 。[6]  Github2014年4月9日发布了一个受影响网站的列表,在这个列表上发现了诸多知名互联网企业,例如雅虎、Stackoverflow.com、Outbrain.com、OKCupid.com、Steamcommunity.com、 Slate.com和 Entrepreneur.com等。其中很多网站都表示他们已经解决了这个问题。[10]  OpenSSL“心脏出血”漏洞的严重性远比想象的严重,一些用户没有考虑到手机上大量应用也需要账号登陆,其登陆服务也有很多是OpenSSL搭建的,因此用户在这阶段用手机登陆过网银或进行过网购,则需要在漏洞得到修补后,更改自己的密码。
  5. OWASP: 开放式Web应用程序安全项目(OWASP,Open Web Application Security Project)是一个组织,它提供有关计算机和互联网应用程序的公正、实际、有成本效益的信息。其目的是协助个人、企业和机构来发现和使用可信赖软件。 The OWASP Top 10 - 2017 is based primarily on 40+ data submissions from firms that specialize in application security and an industry survey that was completed by over 500 individuals. This data spans vulnerabilities gathered from hundreds of organizations and over 100,000 real-world applications and APIs. The Top 10 items are selected and prioritized according to this prevalence data, in combination with consensus estimates of exploitability, detectability, and impact. A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web application security weaknesses. The Top 10 provides basic techniques to protect against these high risk problem areas, and provides guidance on where to go from here.
  6. Cc flood story:绿盟的反ddos设备叫做 collapasar,黑客挑战,叫做challenge collapasar Slowloris 2009年 Rsnake提出,以极低的速度发http请求,但这些请求的header都是畸形的,server会一直保持资源,认为http hearder还没有结束,直到并发的资源数量太多
  7. Payment card industry (PCI) compliance is adherence to a set of specificsecurity standards that were developed to protect card information during and after a financial transaction. PCI compliance is required by all cardbrands. There are six main requirements for PCI compliance. A web application firewall (WAF) is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. Prevent website scraping, crawlers, and BOTs Mitigate DDOS (HTTP/HTTPS floods) While proxies generally protect clients, WAFs protect servers. A WAF is deployed to protect a specific web application or set of web applications. A WAF can be considered a reverse proxy. WAFs may come in the form of an appliance, server plugin, or filter, and may be customized to an application. The effort to perform this customization can be significant and needs to be maintained as the application is modified.
  8. Alibaba Cloud Web Application Firewall (WAF) is a service based on distributed architecture. It can filter massive malicious accesses in real time to avoid leakage of your website assets, enhance system security and your website's availability. It supports multiple access control modes based on IP, UA, Referer, and URL for users to customize the protection policy.
  9. Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the webpage. XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing.
  10. Big Data & Threat Intelligence We have analyzed and know the attribute of 4.2 billion IPs worldwide, like location, owner, from home/company or IDC/cloud, proxy/crawler or not, etc. 400 million IPs information of China is more accurate by Taobao’s address database. Accurate Access Block The WAF can add more than one million IPs to blacklist, and it can block the client IP if it comes from IDC or cloud easily. The WAF also can block the request base on URL, cookie, user agent, etc., and the white list is available. Crawler Protection The WAF has crawler reputation database, it also can identify the crawler behavior by behavior analysis technology and block the IP some time. Human-bot Identification Anti-fraud feature in WAF is for human-bot identification.
  11. The Anti-fraud service, which is based on Alibaba big data capability and industry leading risk management engine, to address the threat of fraud in key business areas such as corporate accounts, activities and transactions, and reduce corporate financial loss.
  12. 1.Change it to a new image for ‘slide verification’, not to use customer real picture
  13. SOC: security operation center