Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.







Security Group
security
group
NACL NACL
VPC Flow Log VPC Flow Log








VPC Flow
Log
Cloud
Trail
AWS
Lambda
Security ISVSecurity ISV








* Source : Arbor Networks
• UDP (NTP) Amplification Flood• SYN Flood Attack [TCP]
Architecture for UDP Flood / SYN Flood
security group security group
•
•
1)
•



•


security
group security group
Private IP Address
•


•











•



•



attacker
transit
attacker
attacker
transit
AWS
region
AWS
edge
AWS
edge
AWS
edgetransit
transit
Route 53
CloudFront
transit
Attacker
AWS
Region
AWS
edge
AWS
edge
AWS
edge
client
client
AWS
edge
•


•


•
•





•
•








•



AWS Support options
Enterprise Business Developer Basic
Customer service 24x7x365
Support forums
Documentation, white pape...
•



•

•


•


•

•


•
© 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기
Prochain SlideShare
Chargement dans…5
×

Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기

1 098 vues

Publié le

2015년 9월 2일에 열린 아마존 웹서비스의 게임 개발 컨퍼런스 Gaming on AWS에서 발표된 김용우 솔루션즈 아키텍트의 강연 '네트워크 공격에 유연한 AWS 아키텍처 알아보기'의 발표자료입니다.

Publié dans : Technologie
  • Soyez le premier à commenter

Gaming on AWS - 5. 네트워크 공격에 유연한 AWS 아키텍처 알아보기

  1. 1.       
  2. 2. Security Group security group NACL NACL VPC Flow Log VPC Flow Log
  3. 3.     
  4. 4.   
  5. 5. VPC Flow Log Cloud Trail AWS Lambda
  6. 6. Security ISVSecurity ISV
  7. 7.         * Source : Arbor Networks
  8. 8. • UDP (NTP) Amplification Flood• SYN Flood Attack [TCP]
  9. 9. Architecture for UDP Flood / SYN Flood security group security group
  10. 10. • •
  11. 11. 1) •    •  
  12. 12. security group security group Private IP Address
  13. 13. •   •   
  14. 14.        
  15. 15. •    •   
  16. 16. attacker transit attacker attacker
  17. 17. transit AWS region AWS edge AWS edge AWS edgetransit transit Route 53 CloudFront
  18. 18. transit Attacker AWS Region AWS edge AWS edge AWS edge client client AWS edge
  19. 19. •   •  
  20. 20. • •     
  21. 21. • •       
  22. 22.  •   
  23. 23. AWS Support options Enterprise Business Developer Basic Customer service 24x7x365 Support forums Documentation, white papers, best practice guides AWS Trusted Advisor Full Checks Full Checks Basic Checks Basic Checks Access to technical support Phone, chat, email, live screen sharing, TAM (24/7) Phone, chat, email, live screen sharing (24/7) Email (local business hours) Support for Health Checks Primary case handling Sr. Cloud Support Engineer Cloud Support Engineer Cloud Support Associate Technical Customer Service Associate Users who can create Technical Support cases Unlimited (IAM supported) Unlimited (IAM supported) 1 (account credentials only) Response time <15 minutes* <1 hour* <12 hours* Architecture support Application architecture Use case guidance Building blocks Best practice guidance Client-side diagnostic tools AWS Support API Third-party software support Infrastructure event management Available at Additional cost AWS Concierge Direct access to Technical Account Manager (TAM) Prioritized case routing Management business reviews * Times are based on initial contact. Every reasonable effort will be made to respond within these targets.
  24. 24. •    •  •   •   •  •   •
  25. 25. © 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

×