SlideShare a Scribd company logo
1 of 27
Live webinar
Monitoring and
mitigating DDoS
attacks with
precision and speed
Wed, June 3, 2020
9 AM PST
Jim Frey
Alliances
Kentik
Vivek Ganti
Product Marketing
Cloudflare
We are helping
build a better
Internet.
Cloudflare’s Global Anycast Network 27M
Internet properties
37 Tbps
Network capacity
200
Cities and 95+ countries
50B
Cyber threats blocked each day
in Q4’19
99%
Of the Internet-connected
population in the developed
world is located within 100
milliseconds of our network
Note: Data as of June 28, 2019.
3
Every Product Runs On Every Server In Every
Datacenter Around The World
4
Provider of the leading network
intelligence platform trusted by digital
enterprises and service providers
FOUNDED
2014
CUSTOMERS
250+
HQ
San Francisco
TEAM MEMBERS
90+
Kentik Network Intelligence:
Conquering Complexity to Ensure Reliable Networks
● Proactive Anomaly
Detection
● DDoS Defense
● Automated triggering
for corrective actions
● Rapid Troubleshooting
workflows
User Experience
● Capacity Planning
● Cost Analysis
● Peering and
Interconnection
Network Cost
● Visualizing Hybrid,
Multi-cloud activity and
dependencies
● Usage Policy
compliance
● Traffic Engineering
Network Optimization
What Is A DDoS Attack?
What Is A DDoS Attack?
● A malicious attempt to disrupt normal traffic of a targeted server, service or
network by overwhelming the target or its surrounding infrastructure with a flood
of Internet traffic
● Achieve effectiveness by utilizing multiple compromised computer systems as
sources of attack traffic
● Exploited machines can include computers and other networked resources such
as IoT devices
8
Cloudflare blocks 45,000,000,000 attacks per day*
Cost of DDoS Attacks
● Gartner: The average cost of
downtime is estimated at
$5,600 per minute.
● Attacks are commonly used as
a way to distract security teams
during an attempted breach.
● Even after 3 years, breached
companies underperformed the
market by -13.27%
10
Source: https://www.comparitech.com/blog/information-security/data-breach-share-price-analysis/
Global Attack Trends
(Q1 2020)
The rise of smaller, shorter attacks in Q1
12
What this means for you
15
● Attacks are cheap
● Every attack hurts!
● A crisis is, unfortunately, sometimes a
malevolent opportunity
Cloudflare + Kentik
Cloudflare Magic Transit: DDoS mitigation for entire networks
Cloudflare Data Center
200 Cities in 95 countries
35 Tbps DDoS mitigation capacity
DDoS protection
Near-instant TTM
Network firewall
Granular Allow/Deny rules
for IP ranges
Customer Data Center
LAYER 3 - IP
(MAGIC TRANSIT)
17
Legit Client
Attacker
BGP announcements
from every single
Cloudflare data center
L3/ 4 attack
traffic
Customer data center
Egress (over the internet)
All L3/ L4-7 services delivered from every Cloudflare
data center (no need for traffic diversion)
Smart routing over the
Cloudflare network
Ingress to customer data center
(over Anycast GRE/ PNI)
Legit traffic
Magic Transit: attacks are detected and mitigated
at a Cloudflare data center closest to the source of
origin
How Kentik Detects and Mitigates DDoS Attacks
●Multi-dimensional
monitoring
●Intelligent and
adaptive
baselining
●Alert notification
integrations with
existing tools
●For “on-demand”
mitigation:
Automation
activation follow
attack detection
Flow Data
BGP Data
Network Metadata
KENTIK PLATFORM
Alert Notifications
Anomaly Alerting
Internet Legitimate
Traffic
Attack
Traffic Mitigation Integration
Cloud/On-premises
Native RTBH/
Flowspec Mitigation
Your Network
Edge Routers
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
Peace Time
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
DDoS Attack Commences
Attackers
Attack Traffic
!
API Call
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
Mitigation activated
Attackers
Attack Traffic
!
Advertise New Route
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
Mitigation begins
Attackers
Attack Traffic
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
Attack Ends
Retract Route
Cloudflare + Kentik: How it works
Kentik Platform
Users &
Subscribers Internet
Service Provider
Cloudflare Magic
Transit
Your
Internet
Edge
Router
Legitimate Traffic
Return to Peace Time
For a limited time:
Replace your legacy provider with Cloudflare Magic Transit and pay
nothing until your existing contract expires*
● Get Magic Transit service at no charge until the expiration of your
current contract with your current provider for up to 12 months
● We will aim to beat the price you are paying your legacy provider,
for the paid period
● For more information, go to www.cloudflare.com/lp/better
*Terms and conditions apply
Network DDoS Protection You’ll Love. We’ll Prove It.
Thank you
email:
vivek@cloudflare.com
jfrey@kentik.com

More Related Content

What's hot

What's hot (20)

Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
Why Stream Video with Cloudflare?
Why Stream Video with Cloudflare?Why Stream Video with Cloudflare?
Why Stream Video with Cloudflare?
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 

Similar to Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks

A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
Raleigh ISSA
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
Harry Gunns
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 

Similar to Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks (20)

Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaCisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security Enforcement
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 

More from Cloudflare

More from Cloudflare (7)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策
 
Webinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseWebinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in Japanese
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks

  • 1. Live webinar Monitoring and mitigating DDoS attacks with precision and speed Wed, June 3, 2020 9 AM PST Jim Frey Alliances Kentik Vivek Ganti Product Marketing Cloudflare
  • 2. We are helping build a better Internet.
  • 3. Cloudflare’s Global Anycast Network 27M Internet properties 37 Tbps Network capacity 200 Cities and 95+ countries 50B Cyber threats blocked each day in Q4’19 99% Of the Internet-connected population in the developed world is located within 100 milliseconds of our network Note: Data as of June 28, 2019. 3
  • 4. Every Product Runs On Every Server In Every Datacenter Around The World 4
  • 5. Provider of the leading network intelligence platform trusted by digital enterprises and service providers FOUNDED 2014 CUSTOMERS 250+ HQ San Francisco TEAM MEMBERS 90+
  • 6. Kentik Network Intelligence: Conquering Complexity to Ensure Reliable Networks ● Proactive Anomaly Detection ● DDoS Defense ● Automated triggering for corrective actions ● Rapid Troubleshooting workflows User Experience ● Capacity Planning ● Cost Analysis ● Peering and Interconnection Network Cost ● Visualizing Hybrid, Multi-cloud activity and dependencies ● Usage Policy compliance ● Traffic Engineering Network Optimization
  • 7. What Is A DDoS Attack?
  • 8. What Is A DDoS Attack? ● A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic ● Achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic ● Exploited machines can include computers and other networked resources such as IoT devices 8
  • 10. Cost of DDoS Attacks ● Gartner: The average cost of downtime is estimated at $5,600 per minute. ● Attacks are commonly used as a way to distract security teams during an attempted breach. ● Even after 3 years, breached companies underperformed the market by -13.27% 10 Source: https://www.comparitech.com/blog/information-security/data-breach-share-price-analysis/
  • 12. The rise of smaller, shorter attacks in Q1 12
  • 13.
  • 14.
  • 15. What this means for you 15 ● Attacks are cheap ● Every attack hurts! ● A crisis is, unfortunately, sometimes a malevolent opportunity
  • 17. Cloudflare Magic Transit: DDoS mitigation for entire networks Cloudflare Data Center 200 Cities in 95 countries 35 Tbps DDoS mitigation capacity DDoS protection Near-instant TTM Network firewall Granular Allow/Deny rules for IP ranges Customer Data Center LAYER 3 - IP (MAGIC TRANSIT) 17
  • 18. Legit Client Attacker BGP announcements from every single Cloudflare data center L3/ 4 attack traffic Customer data center Egress (over the internet) All L3/ L4-7 services delivered from every Cloudflare data center (no need for traffic diversion) Smart routing over the Cloudflare network Ingress to customer data center (over Anycast GRE/ PNI) Legit traffic Magic Transit: attacks are detected and mitigated at a Cloudflare data center closest to the source of origin
  • 19. How Kentik Detects and Mitigates DDoS Attacks ●Multi-dimensional monitoring ●Intelligent and adaptive baselining ●Alert notification integrations with existing tools ●For “on-demand” mitigation: Automation activation follow attack detection Flow Data BGP Data Network Metadata KENTIK PLATFORM Alert Notifications Anomaly Alerting Internet Legitimate Traffic Attack Traffic Mitigation Integration Cloud/On-premises Native RTBH/ Flowspec Mitigation Your Network Edge Routers
  • 20. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic Peace Time
  • 21. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic DDoS Attack Commences Attackers Attack Traffic ! API Call
  • 22. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic Mitigation activated Attackers Attack Traffic ! Advertise New Route
  • 23. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic Mitigation begins Attackers Attack Traffic
  • 24. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic Attack Ends Retract Route
  • 25. Cloudflare + Kentik: How it works Kentik Platform Users & Subscribers Internet Service Provider Cloudflare Magic Transit Your Internet Edge Router Legitimate Traffic Return to Peace Time
  • 26. For a limited time: Replace your legacy provider with Cloudflare Magic Transit and pay nothing until your existing contract expires* ● Get Magic Transit service at no charge until the expiration of your current contract with your current provider for up to 12 months ● We will aim to beat the price you are paying your legacy provider, for the paid period ● For more information, go to www.cloudflare.com/lp/better *Terms and conditions apply Network DDoS Protection You’ll Love. We’ll Prove It.