detección y mitigación de amenazas con check point

81
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point Threat Control

Upload: nextel-sa

Post on 06-May-2015

1.582 views

Category:

Technology


3 download

DESCRIPTION

Presentación de Ignacio Berrozpe, de Check Point, durante la XV Jornada de Seguridad TI de Nextel S.A. en la Alhóndiga de Bilbao el jueves 27 de junio de 2013.

TRANSCRIPT

Page 1: Detección y mitigación de amenazas con Check Point

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.

Check Point Threat Control

Page 2: Detección y mitigación de amenazas con Check Point

2©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 Modern Malware: Risks and Challenges

Collaborative Security Intelligence: ThreatCloud™2

Anti-Bot Software Blade3

Unified Threat Prevention Solution5

Antivirus Software Blade4

Page 3: Detección y mitigación de amenazas con Check Point

3©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Today’s Threat Landscape

Organizations believe they have been the target of an APT attack159%

1 ESG APT Survey October 20112 Ponemon 2nd annual cost of cybercrime study Aug 2011

3 Kaspersky research labs 2011

4 Sophos Security Threat Report 2011

Experienced a Bot attack in the past year282%

Known attacks per day310 Million

A new malware is created4Every Second

With today’s multiple vectors of attacks Multi-layer Real-time Solution Needed

Page 4: Detección y mitigación de amenazas con Check Point

4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

ThreatCloud™ First Collaborative Networkto Fight Cybercrime

Check Point ThreatCloud™

Over 250 Million Addresses

Analyzed for Bot Discovery

Over 4.5 Million Malware

Signatures

Over 300,000 Malware-Infested

SitesUp-to-the-Minute

Security Intelligence

Page 5: Detección y mitigación de amenazas con Check Point

5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

ThreatCloud™ -Dynamically Updated Intelligence

Industry-best malware feeds

MalwareSites Signatures

Bot addresses

Collect attack information from

gateways

Global network of sensors to identify emerging threats

Check Point ThreatCloud™

SensorNET

Page 6: Detección y mitigación de amenazas con Check Point

6©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

The SensorNET System

SensorNET provides a global set of observation points in the network feeding threat observations back to a central analysis point.

Check Point’s position enables wide access to data points in the network.

Page 7: Detección y mitigación de amenazas con Check Point

7©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

SensorNET Collects Attack Information

Attack Name: Web Client Enforcement Violation; Protection name: Microsoft IE argument handling memory corruption vulnerability (MS08-045) Protection Type: signature; rule: 3; Destination: 81.0.0.41Source: N1.H291; proto: tcp; product: IPS SW blade; service: http; s_port: 5707;Severity: High; Confidence: High

The Attack

Sensitivecustomer data is

hidden

Probe identifies an attack

Attack information sent to ThreatCloud™

Page 8: Detección y mitigación de amenazas con Check Point

8©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

SensorNET Analyzes Attack Information

Analyzes threat landscape

Multiple attacks

Same IP address identified

Page 9: Detección y mitigación de amenazas con Check Point

9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

New protections sent to Check Point gateways

Identify Bot attackand Update Check Point gateways

Further analysis show IPs are bot C&C addresses

New bot C&C address protection sent to gateways

CheckPoint ThreatCloud™

Page 10: Detección y mitigación de amenazas con Check Point

10©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

ThreatCloud™ -Dynamically Updated Intelligence

Industry-best malware feeds

MalwareSites Signatures

Bot addresses

Collect attack information from

gateways

Global network of sensors to identify emerging threats

Check Point ThreatCloud™

SensorNET

Page 11: Detección y mitigación de amenazas con Check Point

11©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Collect Bot Attack Info From GWs

Run classifier

Expert analysis

Identify infection and send potential C&C

address to ThreatCloud

Analyze address in Check Point Labs

Add to ThreatCloud C&C address DB – protect ALL GWs

ThreatCloud™

Page 12: Detección y mitigación de amenazas con Check Point

12©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Collect Bot Attack Information From GWs

Map Cyber criminal network

• Gather bot security events from GWs• Analyze Bot DB data in Check Point Labs• Identify different resources (IPs) used

by the same botnet

Page 13: Detección y mitigación de amenazas con Check Point

13©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Collect Bot Attack Information From GWs

Identify Trends

• Gather bot security events from GWs• Analyze Bot DB data in Check Point Labs• Identify attack trends (geography)

Page 14: Detección y mitigación de amenazas con Check Point

14©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

ThreatCloud™ -Dynamically Updated Intelligence

Industry-best malware feeds

MalwareSites Signatures

Bot addresses

Collect attack information from

gateways

Global network of sensors to identify emerging threats

Check Point ThreatCloud™

SensorNET

Page 15: Detección y mitigación de amenazas con Check Point

15©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

ThreatCloud™ Model: High Performance with Extended Protection

Threat Database is kept in the cloud

Download updates to the gateway

Gateway consults the cloud

Malicious URLs

Real time signatures

C&C IP Addresses

Binary Signatures

Heuristic Engine

Traffic Anomaly Check

Security updates normalized to the ThreatCloud

Extended Protection

High Performance

Page 16: Detección y mitigación de amenazas con Check Point

16©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

First Integrated Anti-Bot Network Solution

Discover and stopBot outbreaks and APT attacks

Check Point Anti-Bot Software Blade –Now available!

16©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved |

Page 17: Detección y mitigación de amenazas con Check Point

17©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Botnet Operation: The Infection

Infection

Social engineering Exploiting vulnerability Drive-by downloads

Download Egg

Small payload Contains initial

activation sequence Egg downloaded

directly from infection source or source, such as Command & Control server

C&C Server

Page 18: Detección y mitigación de amenazas con Check Point

18©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Botnet Operation: Self -Defense

Self Defense

Stop Anti-Virus service

Change “hosts” file Disable Windows

Automatic Updates Reset system

restore points

Command

& Control

Server

Page 19: Detección y mitigación de amenazas con Check Point

19©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Botnet Operation: The Damages

Payload Pull

Command

& Control

Server

Spam Denial of Service Identity Theft Propagation Click fraud

Page 20: Detección y mitigación de amenazas con Check Point

20©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

PreventBot damage

Stop traffic toremote operators

DiscoverBot infections

Multi-tier discovery

Anti-Bot Software Blade

Extensiveforensics tools

InvestigateBot infections

DISCOVER and STOP Bot Attacks

Page 21: Detección y mitigación de amenazas con Check Point

21©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

ThreatSpect™ Engine

Reputation Detect Command & Control sites and drop zones Over 250 millions addresses in ThreatCloud™ Real time updates

Network Signatures

Over 2000 bots’ family unique communication patterns

Dozen of behavioral patterns

Suspicious Email Activity

Over 2 million outbreaks

ThreatSpect™ EngineMaximum security with multi-gig performance

Page 22: Detección y mitigación de amenazas con Check Point

22©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Anatomy of Discovering a Bot (ThreatSpect™ Engine)

ThreatCloud™

Reputation Enginein the cloud

Using smart caching to minimize number of queries to the cloud

Resource(IP/URL/DNS)

C&C

Page 23: Detección y mitigación de amenazas con Check Point

23©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Anatomy of Discovering a Bot (ThreatSpect™ Engine)

ThreatCloud™

Check for Signaturesin the gateway

Multi-connection communication patterns (unique per botnet family)

Bot behavioral patterns

Page 24: Detección y mitigación de amenazas con Check Point

24©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Anatomy of Discovering a Bot (ThreatSpect™ Engine)

ThreatCloud™

Check suspicious Email activity

Mail params (obfuscated)

Bot-based spam Outbound mail analysis to identify Spam sent from the organization

Mails normalized, parameters extracted

All customer data is obfuscated

Page 25: Detección y mitigación de amenazas con Check Point

25©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Bot Damage Prevention

Bot remoteoperator

Stop Traffic between Infected Hosts and Remote Operator

StopData Theft

Enable User Work Continuity

Performance Over 40Gbps*

Page 26: Detección y mitigación de amenazas con Check Point

26©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Enhanced NetworkAntivirus Software Blade

Up-to-the-minute protectionusing ThreatCloud™

26

Providing extended malware protection

Page 27: Detección y mitigación de amenazas con Check Point

27©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Antivirus Software Blade

Constantly updated

Security intelligence with ThreatCloud™

Prevent Access to

Malicious SitesOver 300,000 sites!

Stop Incoming Malware Attacks

R

75

.40

Sig

nat

ure

s [M

illio

n]

300xProtect with 300xmore signatures!

R75.20

4.5-

0-

Extended Protection using ThreatCloud™

Page 28: Detección y mitigación de amenazas con Check Point

28©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Antivirus Software Blade Architecture - Prevent Access to Malware-infested Resources

ThreatCloud™Check Connection – Reputation Engine: IP/DNS/URLs with

malware

Prevent connections to resources that contain malware

Prevent drive-by-downloads attacks

Hundred of thousands of addresses

Address Malwarecontaining site

Page 29: Detección y mitigación de amenazas con Check Point

29©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Antivirus Software Blade Architecture – Stop Incoming Malicious Files

ThreatCloud™

Check Signatures in the gateway

Files analyzed against a set of signatures downloaded in the gateway

Limited number of signatures compared to the cloud

Page 30: Detección y mitigación de amenazas con Check Point

30©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Antivirus Software Blade Architecture – Stop Incoming Malicious Files

ThreatCloud™

File uniqueidentifier (MD5)

File ismalicious

Check Signatures in the cloud

Real time update and availability of new malware signature

Granular signature database

Only MD5 Checksum is sent to the cloud – high performance

Page 31: Detección y mitigación de amenazas con Check Point

31©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Antivirus Software Blade Architecture – Stop Incoming Malicious Files

ThreatCloud™

Check for unknown malware –

Heuristic Engine in the gateway

4

Utilizes Sandbox to detect unknown ‘zero day’ infections

Check for archive files only

Buffers entire file

Easily configurable to ensure optimal user experience

Registry

OS files

Page 32: Detección y mitigación de amenazas con Check Point

32©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 Modern Malware: Risks and Challenges

Collaborative Security Intelligence: ThreatCloud™2

Anti-Bot Software Blade3

Unified Threat Prevention Solution5

Antivirus Software Blade4

Page 33: Detección y mitigación de amenazas con Check Point

33©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Unified Anti-Bot and AntivirusThreat Prevention

Antivirus + Anti-Bot

Unified Policy Settings

Unified Malware Analysis

Page 34: Detección y mitigación de amenazas con Check Point

34©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Policy Model – The Rule Base

Scope: contains network objects to be

protected by the rule in question

Action:Indicates which Profile

to activate

Page 35: Detección y mitigación de amenazas con Check Point

35©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Unified Malware Report

See the BIG malware picture

Page 36: Detección y mitigación de amenazas con Check Point

36©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

The Threat WikiSearch the ThreatCloud™ repository for a malware

Filter by Category or malware family

Learn more about a malware

Page 37: Detección y mitigación de amenazas con Check Point

37©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Check Point Multi-layer Threat Prevention

Keep Your Edge Against Advanced ThreatsKeep Your Edge Against Advanced Threats

Check Point Integrated Threat Prevention Solution Powered by ThreatCloud™

Antivirus Software Blade prevents incoming malware infectionsand access to malware containing sites

ThreatCloud™ provides security gateways with real-time security intelligence

IPS Software Blade Prevents Attacks using Known and Unknown Vulnerabilities

Anti-Bot Software Blade Detects bots and stops bot damage

Page 38: Detección y mitigación de amenazas con Check Point

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.

Closing the Gap: Threat Emulation

Page 39: Detección y mitigación de amenazas con Check Point

39©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 The contemporary world of exploits

2 Introduction to threat emulation

3 Check Point Threat Emulation Solution

4 Summary

Page 40: Detección y mitigación de amenazas con Check Point

40©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Exploits are here to stay

Number of critical exploits which allow the attacker to execute arbitrary code, published in 2011 alone

– 5 JRE exploits– 10 Chrome exploits– 26 Office exploits– 27 Internet Explorer exploits– 60 Firefox exploits– 48 Acrobat reader exploits– 56 Flash player exploits

On average, every 1.5 days– Previously unknown (and thus, unprotected against) exploit is published– Targeting software installed virtually on every PC

We have no reason to believe that the upcoming years will be different

Source: www.cvedetails.com

Anyone with decent technical capabilities who knows about the exploit before it is published, have a ‘zero-day’ attack which can be used in order to run arbitrary code on your network.

Page 41: Detección y mitigación de amenazas con Check Point

41©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Signature based tools are not enough

IPS/ Anti Virus work by – Looking into specific patterns– Enforce compliance of protocols to standards– Detect variations from the protocols

They are limited in protecting from:

Unknown (zero day) attacks

Attack variations / obfuscated attacks

An updated IPS is a very good tool against known attacks and some of the unknown attacks.

Not enough to protect from unknown attacks.

– We need a different approach!

Attack obfuscation is a commodity nowadays; for example, at styx-crypt.com you can create an obfuscated version of a

malicious PDF for 25$ per file, quantity discounts apply

Another example – the Zeus malware isn’t sold directly. A ‘Zeus Builder’ is sold,

allowing to generate another malware variant in a click

Page 42: Detección y mitigación de amenazas con Check Point

42©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

CVE-2008-2641 as an example

JavaScript vulnerability in Acrobat Reader

Heap Spray attack – Java Script code which ‘fills’ the heap with shell code, and allows arbitrary code execution when Acrobat ‘crashes into it’

How can you sign it?– There are infinite ways to implement the attack (using

recursion, loops, whiles, divisions to functions, etc.)– Writing code that understand code (without running it) is hard– PDF document can contain sections which are

encoded/compressed in various algorithms– Engines must be constantly updated to support new acrobat

features.

Actual code that performs get to fdf.p-.kkk.xgx78i6p6rlv0.

readnotify.com

Bottom line:

Signature based tools are not enough against advanced attacks

Page 43: Detección y mitigación de amenazas con Check Point

43©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Gartner, Aug 2011 - Strategies for Dealing With APT - Quotes

“Through year-end 2015, financially motivated attacks will continue to be the source of more than 70% of the most damaging cyberthreats”

“…these are not noisy, mass attacks that are easily handled by simple, signature-dependent security approaches.”

“Targeted attacks often use custom-created executables that are rarely detected by signature based techniques”

“Gartner estimates that, for the average enterprise, 4% to 8% of executables that pass through antivirus and other defenses are malicious”

Key Finding – “Simply adding more layers of defense does not necessarily increase security against targeted threats — security controls need to evolve”

Page 44: Detección y mitigación de amenazas con Check Point

44©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 The contemporary world of exploits

2 Introduction to threat emulation

3 Check Point Threat Emulation Solution

4 Summary

Page 45: Detección y mitigación de amenazas con Check Point

45©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Threat emulation – malicious attachment example

Email with malicious

attachment

Page 46: Detección y mitigación de amenazas con Check Point

46©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Threat emulation – malicious attachment example

Email with malicious

attachmentExtracting attachments

Emulation

During the emulation, the attachment is opened on several emulated machines – from XP to Windows 7, and the entire system activity is monitored for unexpected behavior. We monitor network activity, file system & registry changes, process activity and more.

Clean

Malware detected

We know what should happen on the machines when opening a legitimate document (‘White List’), thus we can safely consider any document which causes the machine to do something else as malicious.

Intercepted by Threat Emulation Blade

Page 47: Detección y mitigación de amenazas con Check Point

47©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Real detection of malware ‘Pdfjsc.XD’, leveraging CVE-2011-0609

Drops malware (‘rthdcpl.exe’)

Execute the dropped malware

Detected by threat emulation (alpha version)

Page 48: Detección y mitigación de amenazas con Check Point

48©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 The contemporary world of exploits

2 Introduction to threat emulation

3 Check Point Threat Emulation Solution

4 Summary

Page 49: Detección y mitigación de amenazas con Check Point

49©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Stop stealth malware

Detect malware based on what they do, regardless of signatures

Stop Unique exploitation

Attacks

Stop data exfiltration

Threat Emulation Software blade

DISCOVER and STOP advanced attacks

Detect unsigned zero-day and attack variants

A true ability to stop the advanced tools used for the cyber warfare

Page 50: Detección y mitigación de amenazas con Check Point

50©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

How would you like your threat emulation?

Dedicated appliance

For medium to large deployments

Existing gateway

Leveraging your existing investment, when your gateways

have enough horsepower

In the cloud

Same great capabilities without the need for local

emulation resources

It comes in different sizes and shapes

Page 51: Detección y mitigación de amenazas con Check Point

51©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Dedicated emulation gateway

Perimeter Firewall

Threat Emulation

Gateway

Data Center Firewall

DMZ

Reassembled docs

sent for emulation

Reassembled docs

sent for emulation

Small performance

impact

Page 52: Detección y mitigación de amenazas con Check Point

52©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Threat emulation is part of Check Point ThreatCloud

Check Point Threat Cloud - The Power of Collaboration

Previously unknown

attack detected by the Threat Emulation Engine

Real-time Updates

Attack Information Shared Across Organizations

Attack data

Page 53: Detección y mitigación de amenazas con Check Point

53©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Architecture

IPS AVAnti-Bot

Signature Scan by Threat prevention blades

Kernel

Reassembly ModuleCompose and reassembly

documents received

SecureXL (Multi-Core)

Policy / rulebase check

User Space

Emulation Module

ThreatCloud

Virtual Machines

• Run Emulation and check for bad behavior

• Run forensics checks

Open and Execute multiple docs in

multiple machines

Report to

ThreatCloud

Report to

SmartEvent

SmartEvent

Page 54: Detección y mitigación de amenazas con Check Point

54©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Threat Emulation Engine

High performance – supports up to 100,000 unique files per day

Support Check Point provided OS images and custom images

Emulation of documents and executable files

Deep inspection of the system – file system, API calls, network, registry, memory and more.

Anti-VM detection capabilities

Page 55: Detección y mitigación de amenazas con Check Point

55©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Pre-Emulation Static Filtering

Contemporary documents range from very simple to ultra complex

Usually, the risk factor of a document varies according to the number of advanced feature it utilize–E.g. JavaScript support in Acrobat reader

The pre-emulation static filtering process allows skipping documents which contains only safe features

– Filters are constantly updated

Filters ~70 – 80% of the documents

Page 56: Detección y mitigación de amenazas con Check Point

56©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Granular Policy

Anti Bot & Anti Virus Rule base now includes also Threat Emulation

Threat Emulation profile controls the emulation configuration:

Where to emulate – Locally, other gateway or cloud

How – which images to use, use static analysis, …

Threat Emulation allows you to define not only the inspected machines (via IPs of machines to scan),

but also scope according to email address.

Integrated with identity awareness to match the right profile according to the user identity

Page 57: Detección y mitigación de amenazas con Check Point

57©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Encrypted traffic support

Just because traffic is encrypted doesn’t mean the file transferred isn’t malicious

Integration with Check Point SSL Inspection– Visibility into encrypted web traffic

Integration with Microsoft Exchange– Allowing visibility to SMTP over TLS– Using a dedicated Agent

Page 58: Detección y mitigación de amenazas con Check Point

58©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Stop stealth malware

Detect malware based on what they do, regardless of signatures

Stop Unique exploitation

Attacks

Stop data exfiltration

Threat Emulation Software blade

DISCOVER and STOP advanced attacks

Detect unsigned zero-day and attack variants

A true ability to stop the advanced tools used for the cyber warfare

Page 59: Detección y mitigación de amenazas con Check Point

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.

The DDoS phenomenon

Increasing numbers of organizations are affected by massive amounts of traffic

Page 60: Detección y mitigación de amenazas con Check Point

60©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

What is an DoS Attack?

Denial-of-Service attack (DoS attack) an attempt to make a machine or network

resource unavailable to its intended users.

Distributed Denial-of-service attack (DDoS) is coordinated and simultaneously launched

from multiple sources

Page 61: Detección y mitigación de amenazas con Check Point

61©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DoS attackers can be segmented into three

categories:

Motivations behind (D)DoS attacks?

Hacktivists

Their motive, make social and political points Primarily through public IT disruption. “Use of legal and/or illegal digital tools in

pursuit of political ends".

Nation State Driven

Presumably sanctioned by governments. Reasons, disrupting governmental operations. Stealing national secrets.

Financially Motivated Attackers

DoS attacks are merely a diversion The actual objective is to steal information Lately instances of DoS "ransom attacks"

Page 62: Detección y mitigación de amenazas con Check Point

62©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Cybercrime Trends for 2012

SQLInjections

44%

APTs

35%

Botnet

33%

DDoS

32%

Ponemon Institute, May 2012

32%

DDoS

65% of Businesses Experienced Attacks

Average $214,000 of Damage Per Attack

Page 63: Detección y mitigación de amenazas con Check Point

63©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DDoS ‘as a Service’

Pay per hour, no expertise needed!

Page 64: Detección y mitigación de amenazas con Check Point

64©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Victims of Recent DDoS Attacks

“DDos-attacker är nästan omöjliga att värja sig

emot” — SVD “Overload attacks are almost impossible

to protect against.” — SVT

Page 65: Detección y mitigación de amenazas con Check Point

65©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DDoS Attack Examples

Volumetric Attacks – Fill the pipe

DNS Amplification Attacks– Using critical applications

as attack source

SYN Attacks– Simple way to use

resources

Application Attack – Renegotiate SSL Key– Slow HTTP Post– DNS Query flood

Page 66: Detección y mitigación de amenazas con Check Point

66©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Volumetric Attacks

Victim

Mixture of Valid Traffic

and Spoofed Traffic

LimitedPipe

AttackTarget

Page 67: Detección y mitigación de amenazas con Check Point

67©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DNS Amplification Attack Example

Simple DNS Request Able to amplify DNS

request to victim

AttackTarget

OpenDNS Server

Attacker

Victim

Page 68: Detección y mitigación de amenazas con Check Point

68©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

SYN Attacks

Utilize State Table on Firewalls and Servers

Spoofed Traffic,Random Sources

AttackTarget

RandomSYN Packets

Victim

Page 69: Detección y mitigación de amenazas con Check Point

69©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Application Layer DDoS Attacks

Exploit application weakness with Low&Slow attacks

Undetectable by threshold ‒ or volume-based solutions

New Application Attacks Are Stealthier…

Utilize relatively low volume and fewer connections

Used in conjunction with volume-based attacks

Page 70: Detección y mitigación de amenazas con Check Point

70©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Real World of Real Attacks

US Banking attacks – Volumetric

– Application

– Continues and Dynamic

DNSSEC Attack Example– Ability to execute DDoS

Amplification attack via US Gov

Application low and slow attack– Lets hold those HTTP connections open forever

– Very hard to find

Page 71: Detección y mitigación de amenazas con Check Point

71©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DDoS and Traditional Security

Attackers Take Advantage of Traditional Security

Firewalls track state of network connections (Can be bottleneck)

Firewalls allow legitimate traffic (e.g. port 80 to web server)

IPS allows legitimate request (e.g. get http/1.0\r\n)

Application Control allows legitimate services (DNS or HTTP)

Page 72: Detección y mitigación de amenazas con Check Point

72©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Traditional Firewalls Not Sufficient

Not Designed for Network and Application DDoS Protection

Basic rate based flood protection affects all traffic (Real users and attack traffic)

Lacks Comprehensive Layer 7 DDoS protection

– Poor detection of sneaky attacks

– No filters to block attacks and allow real traffic

– Administrators cannot create custom signatures

Page 73: Detección y mitigación de amenazas con Check Point

73©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Network Flood

Server Flood

ApplicationLow & Slow

Attacks

Layers Work Together

Protection Layers Flow

Allowed Traffic

Page 74: Detección y mitigación de amenazas con Check Point

74©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Decision Engine

Slide 74

Rate-invariant anomaly axis

Attack area

Suspicious area

Normal adapted area

Attack Degree = 5 (Normal- Suspect)

Abnormal rate of Syn packets

Normal TCP flags ratio

Flash crowd

Rate-based anomaly axis

Y-axisX-axis

Z-axisA

tta

ck

De

gre

e a

xis

Adaptive Detection Engine

Page 75: Detección y mitigación de amenazas con Check Point

75©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Attack Degree = 10 (Attack)

Abnormal high rate of SYN packets

SYN flood

Rate-invariant anomaly axis Rate-based anomaly axis

Y-axisX-axis

Z-axisA

tta

ck

De

gre

e a

xis

Attack area

Suspicious area

Normal adapted area

Abnormal TCP flags ratio

Slide 75

Adaptive Detection Engine

Page 76: Detección y mitigación de amenazas con Check Point

76©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Check Point DDoS Protector™

Customized multi-layered DDoS protection

Protects against attacks within seconds

Integrated security management and expert support

Page 77: Detección y mitigación de amenazas con Check Point

77©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

+

Where to Protect Against DDoS

On-Premise Deployment

DDoS Protector Appliance

Cloud base service

DDoS Protector in the cloud

Scenarios: 1 2

Page 78: Detección y mitigación de amenazas con Check Point

78©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Flexible Deployment Options

Ready to Protect in Minutes

Fits to Existing Network Topology

Optional Learning Mode Deployment

Low Maintenance and Support

Page 79: Detección y mitigación de amenazas con Check Point

79©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Emergency Response and Support

Emergency Response

Team

Help from security experts when under DoS attacks

Leverage experience gathered from real-life attacks

Check Point Customer Support

World-class support infrastructure Always-on support 7x24 Flexible service options

Page 80: Detección y mitigación de amenazas con Check Point

80©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Integrated with Check Point

Security Management

Customized multi-layered

DDoS protection

Ready to protect

in minutes

Blocks DDoS Attacks Within Seconds

Summary

Page 81: Detección y mitigación de amenazas con Check Point

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.

Thank You