5 ways to fight a ddos attack

45
Credit Union - DDoS (Distributed Denial of Service) Attacks? Virtual Education Session May 2nd | 4 – 4:45pm Moderator: Kristine Wilson Presenters: Bill Murphy and James Crifasi Live Tweet from the event! @TheRedZoneCIO

Upload: bill-murphy-ceo-redzone-technologies-transforming-it-security

Post on 05-Dec-2014

1.572 views

Category:

Technology


1 download

DESCRIPTION

The Credit Union National Association (CUNA) issued a statement on Friday, April 26th, 2013 that a possible widespread Distributed Denial of Service (DDoS) attack may take place on Tuesday, May 7th, 2013. Despite the numerous warnings, CUNA has offered little advice on how to manage the situation and mitigate an attack. Realizing the severity of the situation, RedZone has put together 5 practical ways to mitigate against a DDoS happening to you that was presented via GoToWebinar on Wednesday, May 1st, 2013. The types of attacks we reviewed were: 1. Pure network attack against the credit union 2. Pure network attack against the ISP router 3. Content DDoS 4. DNS DDoS 5. Random Botnet attack We also answered the following questions: • What does it mean? • What are your Zero day protection options? • What to check on your security products? • How to enable Global IP protection? • How do I detect fraud communication in advance? • What are some vendor product options?

TRANSCRIPT

Page 1: 5 Ways To Fight A DDoS Attack

Credit Union - DDoS (Distributed Denial of Service) Attacks?

Virtual Education Session May 2nd | 4 – 4:45pm

Moderator: Kristine WilsonPresenters: Bill Murphy and James Crifasi

Live Tweet from the event! @TheRedZoneCIO

Page 2: 5 Ways To Fight A DDoS Attack

Schedule of Events

Learn 5 Practical Things A Credit Union Can Do To Prevent An Attack

4:00p – 4:30p Presentation (If Lucky)

4:30p – 4:45p Q&A

Live Tweet from the event! @TheRedZoneCIO

Page 3: 5 Ways To Fight A DDoS Attack

President and Founder • RedZone Technologies• ThunderDG• MA DR Solutions• Beyond Limits Magazine

Keep In Touch With Bill:@TheRedZoneCIOCIO Executive Series [email protected]

About Bill Murphy

Live Tweet from the event! @TheRedZoneCIO

Page 4: 5 Ways To Fight A DDoS Attack

About James Crifasi

Live Tweet from the event! @TheRedZoneCIO

• CTO of RedZone Technologies• Co-Founder ThunderDG• Co-Founder MA DR

• University of Maryland Graduate | B.A. Criminology & Criminal Justice | B.S. Computer Science – Algorithmic Theory & AI | M.S. Interdisciplinary Management

• Keep In Touch With James: [email protected]

Page 5: 5 Ways To Fight A DDoS Attack

Assessment: IT Architecture and Design

Integration: Security| Disaster Recovery| Infrastructure

Managed Service Programs

Cloud Brokerage

Live Tweet from the event! @TheRedZoneCIO

Page 6: 5 Ways To Fight A DDoS Attack

Agenda – Types of attacks To Be Reviewed

1.       Pure network attack against the credit union

2.       Pure network attack against the ISP router

3.       Content DDoS

4.       DNS DDoS

5.       Random Botnet attack

Live Tweet from the event! @TheRedZoneCIO

Page 7: 5 Ways To Fight A DDoS Attack

Agenda – Questions To Be Answered

• What does it mean?

• What are your zero-day protection options?

• What to check on your security products?

• How to enable global IP protection?

• How do I address potential fraud communication in advance?

• What are some vendor solutions?

Live Tweet from the event! @TheRedZoneCIO

Page 8: 5 Ways To Fight A DDoS Attack

Set The Stage

Live Tweet from the event! @TheRedZoneCIO

Page 9: 5 Ways To Fight A DDoS Attack

Insidious Plots

.

Live Tweet from the event! @TheRedZoneCIO

Page 10: 5 Ways To Fight A DDoS Attack

.

Live Tweet from the event! @TheRedZoneCIO

Insidious Plots

Source: InformationWeek.com

Page 11: 5 Ways To Fight A DDoS Attack

.

Live Tweet from the event! @TheRedZoneCIO

Insidious Plots

Source: DarkReading.com

Page 12: 5 Ways To Fight A DDoS Attack

Insidious Plots

.

Live Tweet from the event! @TheRedZoneCIO

Source: RSA

Page 13: 5 Ways To Fight A DDoS Attack

What Do They Want?

Live Tweet from the event! @TheRedZoneCIO

“Their tactics have been succeeding. They will be back for more because they are getting what they want.”

- Avivah Litan, a Gartner analyst who tracks DDoS.

CU Times1. Primary objective appears to be to create uncertainties

about the reliability and dependability of the United States’ financial system and knock many big banks off line – mission accomplished.

2. Headlines

Page 14: 5 Ways To Fight A DDoS Attack

What Do They Want?

.

Live Tweet from the event! @TheRedZoneCIO

Source: RSA

Page 15: 5 Ways To Fight A DDoS Attack

What Does It Mean?

• Being down• Unable to update members on situation• Greater risk of attacks on members (Phishing)

Live Tweet from the event! @TheRedZoneCIO

Source: Tosh.ComedyCentral.com

Page 16: 5 Ways To Fight A DDoS Attack

Our Philosophy – Be Proactive

.

Live Tweet from the event! @TheRedZoneCIOSource: Google Images

Page 17: 5 Ways To Fight A DDoS Attack

Whack-A-Mole? Reactive!

Live Tweet from the event! @TheRedZoneCIOSource: Google Images

Page 18: 5 Ways To Fight A DDoS Attack

Security When Under The Gun

.

Live Tweet from the event! @TheRedZoneCIOSource: Google Images

Page 19: 5 Ways To Fight A DDoS Attack

Our Approach When Time Is Of the Essence

.

Live Tweet from the event! @TheRedZoneCIO

• Review critical network components

• Communication with members

• Let board know there are no guarantees

Page 20: 5 Ways To Fight A DDoS Attack

How Can a Credit Union prepare and respond during an attack?

An attack can be from hours to days…

Three Phases Are Needed1. Pre-Attack Phase –

• Readying for an attack • Securing mitigation solutions, deploying appropriate security

systems, etc.2. During the Attack Phase

• Assemble the required manpower and expertise• Considering that you may only experience a few attacks per year

3. Post-Attack Phase • Conducting forensics, drawing conclusions and improving for the next

attack• Search for additional competencies externally - from security experts,

vertical alliances, or government services. • On-demand service Live Tweet from the event!

@TheRedZoneCIO

Page 21: 5 Ways To Fight A DDoS Attack

Our Approach When Not Under GunLogic | Assessment | Portfolio Investment

Live Tweet from the event! @TheRedZoneCIO

• Review Security Portfolio• Develop 24 month investment roadmap• Identify Gaps• Remediate Gaps

• Let Board know there are no guarantees

**Don’t make it easy for them (attackers)

Page 22: 5 Ways To Fight A DDoS Attack

Security Scoreboard

Live Tweet from the event! @TheRedZoneCIOSource: RedZone Technologies

Page 23: 5 Ways To Fight A DDoS Attack

Client Integrity

Intelligent Perimeters

Identity Access Control

Enterprise Single Sign On

Provisioning/ Deprovisioning

Authentication

Authorization & Roles

Directory - Foundation

Multi-year Security, Identity and Privacy Strategy(SIP)

ComplianceRequirements

PC firewallsUSB Mgmt

Laptop MgmtEmail Encryption

FirewallsUTM devices

IDP/IDSSPAM Filters

VPNsSSL/VPNWeb Mail

Two factor Authentication

BiometricsKey fob (two factor)

Secure Password Management and

Building access Mgmt through anAppliance or

Application rewriting

Single Directory with process and system ‘tie-

ins’Federation

Strategic Creation of Roles based on job

function, not individualized on a per

user basis.

Microsoft AD, Novell, Open LDAP, etc

M O N I T O R

LOGGNG

R E P O R T I N G

Live Tweet from the event! @TheRedZoneCIOSource: RedZone Technologies

Page 24: 5 Ways To Fight A DDoS Attack

PURE POWER IS BIG ENABLER

Live Tweet from the event! @TheRedZoneCIO

• Attacks reach 40+ gigabits/second

• Attacker only needs 2,000+ servers

• Targets have to invest substantial resources to defend

• Reflective DNS attacks still major “weapon”

• Tactics have adapted to counter measures

• Attacks are more intelligent and deadly

Source: RSA

Page 25: 5 Ways To Fight A DDoS Attack

Pure Network Attack Against the Credit Union

Live Tweet from the event! @TheRedZoneCIO

THE CUServer (Any)

Source: RSA

Page 26: 5 Ways To Fight A DDoS Attack

Pure Network Attack Against the ISP Router

Live Tweet from the event! @TheRedZoneCIO

The droidguy.com

ISP Router

CU Security Gear

Source: RSA

Page 27: 5 Ways To Fight A DDoS Attack

Content DDoS

Live Tweet from the event! @TheRedZoneCIO

Normal: ask for one file and wait for answer

DDoS: ask for hundreds of files and ignore answer

EXAMPLE 1

EXAMPLE 2

Source: RSA

Page 28: 5 Ways To Fight A DDoS Attack

Content DDoS

Live Tweet from the event! @TheRedZoneCIO

One example of content DDoS is using the servers SSL certificate against it.

Source: Radware

Page 29: 5 Ways To Fight A DDoS Attack

DNS DDoS (Amplification)

Live Tweet from the event! @TheRedZoneCIO

CU MembersSource: RSA

Page 30: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIO

Random Botnet

Credit Union

Source: RSA

Page 31: 5 Ways To Fight A DDoS Attack

What To Check

• Firewall – Basic DDoS Network Protection

• Load Balancers – Network DDoS Protection

• ISP Router – does it answer to the internet? (do you let people ping?)

• Where is your DNS hosted? i.e. On a single server, with the ISP, self hosted behind security (best), secure cloud hosted (best)

• IDS/IPS and Security Services at the edge of your network

       

Live Tweet from the event! @TheRedZoneCIO

Page 32: 5 Ways To Fight A DDoS Attack

What To Check

Live Tweet from the event! @TheRedZoneCIOUlrich RSA

Defense

• Block DNS responses from servers that don’t need to see them

• Only answer queries for which server is authoritative

• Limit access to recursive name servers to internal users

Offense

• Attacker uses queries for which server is authoritative

• Attacker compromises servers with substantial bandwidth

• Use of “ANY” queries• Use of EDN0

Page 33: 5 Ways To Fight A DDoS Attack

Vendor Options

Live Tweet from the event! @TheRedZoneCIO

Page 34: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIOSource: Blue Coat

Page 35: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIOSource: RSA

Page 36: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIO

The Dell SonicWALL Threats Research Team discovered a new Trojan spreading through drive-by downloads from malicious links.

The Neglemir Trojan was found reporting to a Botnet infrastructure and performing DDOS (Distributed Denial of Service) attacks on selected targets in China.

During our analysis, we found it targeting various servers belonging to China Telecom as well as websites selling tools for The Legend of Mir, an online multiplayer roleplaying game.

• Web Application Firewalling – Content DDoS• NSA UTM protection – Network DDoS• Spam Filtering – Phishing Relevance

Source: Dell

Page 37: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIO

A new malware threat for the Mac, called “Pintsized,” attempts to set up a secure connection for a remote hacker to connect through and grab private information.

This backdoor Trojan can be used to conduct distributed denial of service (DDoS) attacks, or it can be used to install additional Trojans or other forms of malicious software. The Trojan stays hidden by disguising itself as a file that is used for networked printers in Mac OS X.

This tactic conceals the Trojan and makes a monitor think that a printer is seeking access to the network, thus evading traditional signature-based detection systems. http://alrt.co/15ekmXW

Takeaway: Distributed denial-of-service attacks (DDOS) can be minimized or even completely mitigated by a properly planned Web security infrastructure consisting of global DNS as well as Web application firewalls.

• Web Security Monitor• Threat Manager

Source: AlertLogic

Page 38: 5 Ways To Fight A DDoS Attack

In Summary - Plan

Live Tweet from the event! @TheRedZoneCIOSource: Google Images

Page 39: 5 Ways To Fight A DDoS Attack

Upcoming Events

Live Tweet from the event! @TheRedZoneCIO

BYOD | MDM | Mobile Policy Management | Compliance | Advanced Threats (APTs) | Security Portfolio Investment RiskIn this symposium learning event, Credit Union IT Chiefs will learn to Go Hunting for Malware & Crimeware. We will cover 15 major areas of an IT Security and Infrastructure Best Practices program. Some highlights of the learning and education will be:• Centralized deployment of applications and data• BYOD, MDM and Mobility• Perform Compliance functions with ease.• Increase Security effectiveness, management, and auditing on a tight

budget• Advanced Threat Education on APTsWednesday, June 12th from 11:30am to 5:00pmEggspectations in Columbia

Page 40: 5 Ways To Fight A DDoS Attack

Security Scoreboard

Live Tweet from the event! @TheRedZoneCIOSource: RedZone Technologies

Page 41: 5 Ways To Fight A DDoS Attack

Live Tweet from the event! @TheRedZoneCIO

Pyramid of Networking Success – Assessment Foundation

BONESIP Addressing, Routers, and Switches

MUSCLESNOS Services (DHCP, WINS, and DNS)

BRAINThe Windows Domain

Active Directory

Security Edge to Core

NOSNetworking

AndName Resolution

Foundation Network Services

Desktop and ServerManagement

Compliance, Risk Mgmt, Monitoring, WAN QoS,

Reporting

Data Protection, Backup and Recovery

Source: RedZone Technologies

Page 42: 5 Ways To Fight A DDoS Attack

RZ Assessment

• RedZone will assess your risk

• Examine a number of factors

• Score you based on those factors (RZ Scoreboard)

• Better to be proactive and assess now to find potential weaknesses than to be reactive after you’ve already been hacked

       Live Tweet from the event! @TheRedZoneCIO

Page 43: 5 Ways To Fight A DDoS Attack

Security Scoreboard

Live Tweet from the event! @TheRedZoneCIOSource: RedZone Technologies

Page 44: 5 Ways To Fight A DDoS Attack

Summary

• Review zero-day protection options? Check your current vendors or vendors on following page

• What are your BotNet IP options? Check your current vendors or vendors on following page

• How to enable Global IP Filter protection? Check your current vendors or vendors on following page

• How do I alert fraud communication in advance?

• What are some vendor product options for advanced content security?

Live Tweet from the event! @TheRedZoneCIO

Page 45: 5 Ways To Fight A DDoS Attack

Q&A

Live Tweet from the event! @TheRedZoneCIO