SlideShare una empresa de Scribd logo
1 de 23
Headlines You May Have Seen




                              © 2010 Akamai
Headlines You DID NOT See



              Independence Day
              Attacks Paralyze the U.S.


             Government and Financial
             Websites Attacked and Taken
             Down: Stocks Show Concerns



       President Delays Trip Due to
       Cyber Attacks

                 POWERING A BETTER INTERNET   © 2010 Akamai
IT Risk In a Complex World




                             © 2010 Akamai
What’s At Risk?
                           Reputation & Brand




     Dollars & Revenue                 Mission & Trust




NSA's Guide: Defense in Depth - A practical strategy for achieving
 Information Assurance in today’s highly networked environments
                                                           © 2010 Akamai
Weathering Storms in the Cloud: Analyzing
Massive DDoS Attacks to Prepare for the Future
                                R. H. Powell IV
                                Senior Service Line Manager
                                August 10, 2010
Agenda


Weathering Storms in the Cloud

• Is the Threat Worth Considering?
• Data Collection & Considerations
• Observations from the Wild
 • July 4th DDoS Case Study
• How Do you Analyze This
• Future Expectations & Innovation
                                 © 2010 Akamai
State of Internet Security Today

• 95% of corporate Web applications have
  severe vulnerabilities.1
• 34 million computers in the U.S. alone may now
  be part of a botnet.2
• Cybercrime costs businesses $1 trillion a year.3
• In 2008, a Web page was infected every
  4.5 seconds.4
• Attack traffic observed from 198 countries in
  Q1 ‘10, up 291% from 68 countries in Q1 ‘09.5
       1   WASC   2   Georgia Tech Information Security   3   McAfee   4   Sophos   5   Akamai

                                                                                                 © 2010 Akamai
Targets of Opportunity


                             4000
                                                                                                      3,462
Volume of Vulnerabilities




                                                                                           2,750
                             3000

                                                                  2,029
                                                    1,875
                             2000



                             1000



                                 0
                                                    2007          2008                     2007       2008
                                                (Non-Web Application                       (Web Application
                                                   Vulnerabilities)                         Vulnerabilities)

                            Source: Symantec Internet Security Threat Report, April 2009




                                                                                                               © 2010 Akamai
Peak Attack Traffic per year


                                                                         49
                     250
                      50
                     225
                      45
                                                                  40            >200
                     200
                      40
                     175
                      35
Attack Size - Gbps




                     150
                      30
                     125
                      25                                    24
                     100
                      20
                                                   17
                     15
                     75
                     10
                     50
                                         10
                      25
                       5
                                   2.5
                      0
                           1.2

                           2002   2003   2004     2005    2006   2007   2008    2009
                                              (Arbor Networks)          (Akamai Technologies)




                                                                                       © 2010 Akamai
Where Does the Data Come From?



          Primary                  Auxiliary
           Data                      Data
          Sources                   Source
 Akamai Distributed Agents

                             Publicly Available Reports
 Akamai Customer
 Production Traffic Logs




                                                     © 2010 Akamai
Top Attack Countries (Akamai Agents)




                                       © 2010 Akamai
Top Attack Regions (Akamai Agents)


Europe 44% Overall      Europe 50% of Mobile




                                        © 2010 Akamai
A Note On Mobile Connectivity


         Global                     %>1             %>2 %>5 %>
         Mobile                     Mbps            Mbps Mbps 10
                                                              Mbps
        Providers
Average Connection Speed                32%1          13%1    --       --
Maximum Connection Speed                   --         76%1   30%1   6%1


    The GSM Association reports that global Mobile Broadband
 connections roughly doubled during 2009 to 200 million. By the
   end of 2010, they estimate this will reach 342 million global
 connections, with 120 million in Europe, 116 million in the Asia
        Pacific region, and 58 million in North America. 2

                       1   Akamai   2   GSM Association

                                                                    © 2010 Akamai
July 4 2009 DDoS Attack
    Observed Attack Profile
                                        Type of Attack – Brute Force DDoS
                                        • The largest coordinated DDoS cyber attack against
                                          US Government Websites
                                        • HTTP Resource Drain attack
                                        • Sourced primarily from compromised Korean
                                          computers
                                        Intensity of Attack
                                        • 1,000,000+ hits per second and ~200 Gbps
                                          aggregate attack traffic (US Gov Only)
                                        • One website received 8 years of traffic in a day
                                        All Traffic Logged for Akamai Customers
                                            • 64 Billion Log Lines
                                            • 13 TB of uncompressed log data (400+
                                               Gigs of Compressed logs)
“Between the volume of the requests and their frustrating nature, a Web site with few servers or limited
bandwidth can quickly be taken down. Others with greater physical and financial resources can take the
punishment. That may explain why high-volume Web sites such as those belonging to the White
House, the Pentagon and the New York Stock Exchange were able to withstand such attacks with barely a
hiccup, while the Federal Trade Commission's and the Transportation Department's were knocked
offline." - Paul Wagenseil, Fox News                                                          © 2010 Akamai
July 4, 2009 DDoS Attack


                                                                           Times Above
     Customer – PROTECTED                            Peak Traffic          Previous Peak Traffic
     U.S. Government Customer 1                      124 Gbps              598x
     U.S. Government Customer 2                      32 Gbps               369x
     U.S. Government Customer 3                      9 Gbps                39x
     U.S. Government Customer 4                      9 Gbps                19x
     U.S. Government Customer 5                      2 Gbps                9x
     U.S. Government Customer 6                      1.9 Gbps              6x
     New U.S. Government Customer                    0.7 Gbps              SITE DOWN
                                                                           before Akamai

“Between the volume of the requests and their frustrating nature, a Web site with few servers or limited
bandwidth can quickly be taken down. Others with greater physical and financial resources can take the
punishment. That may explain why high-volume Web sites such as those belonging to the White
House, the Pentagon and the New York Stock Exchange were able to withstand such attacks with barely a
hiccup, while the Federal Trade Commission's and the Transportation Department's were knocked
offline." - Paul Wagenseil, Fox News                                                          © 2010 Akamai
Akamai Analysis of Log Data
Top Attacking IP Address Over Time

     •   July   4th   – Attacks focused on two sites
     •   July   5th   – Attacks spread to include 5 other sites. Even traffic spread.
     •   July   5th   (late) – Attack shifts bulk of attack to 2 new sites
     •   July   7th   (late) – Attack Ends




All Targeted US Government Websites (not using Akamai) Went Down!
                                                             © 2010 Akamai
Unique Hostile IPs Over Time
         # Unique Hostile IP's Per 30 Minute Block
120000
          97,882 Unique IP’s in 30 mins
100000                                      Spike 1

 80000

 60000                                                 Spike 3
                                     Spike 2
 40000                                                                  # IP's

 20000
                                 Few common attackers between spikes:
                                 (Only 4,284 IP’s Shared Across all Spikes)
     0
           5.1.0




           7.8.0

           8.6.0

           9.4.0


         10.13.0

         11.11.0
         11.22.0

         12.20.0
          2.23.5
          3.10.5
          4.13.0

          5.12.0
          5.23.0
          6.10.0
          6.21.0

          7.19.0

          8.17.0

          9.15.0
          10.2.0

          11.0.0


          12.9.0

          13.7.0
           Much Larger Then Any Public Estimates                     © 2010 Akamai
Crunching The Data




                     © 2010 Akamai
Future Outlook and Innovation




                                © 2010 Akamai
Thank you
Akamai Architecture
          Operational View – OV-1
                                            Akamai Network
 Data Center                                65,000+ Servers
                                            1500+ Locations
                          Web
                                            950+ Networks
                         Servers            70+ Countries

                                     Fire
                                                                       Edge Servers
Database                             Wall                                                              Compression
                                                             Network
                                                             Storage
                           Load
                          Balancer
 Transaction                                                                      WAF
   Server
                                                                                           EDNS

                                                                                        Internet
  Directory/                                    Akamai
 Policy Server
                                               Site Shield


                                                                                                    Edge Servers
                                                               Network
 Legacy     App           DNS                                  Storage
Systems    Servers       Server




                                                                                        End Users
                  Back-Up Site or
                  Load Balanced
                 Multi-Data Center

Security             Availability           Scalability       Visibility         Resource Savings   Performance
                                                                                                        © 2010 Akamai
Broad adoption across verticals
If you’re on-line you’re using Akamai


Retail & Travel
• Over 400 Global Retailers
• 50 of the top 50 U.S. Retailers
• Over 125 Global Online Travel Sites



Media & Entertainment
• 30 of the top 30 M&E companies




Finance
• 9 of top 15 Global Banks


Technology
•The top five anti-virus companies


                                        © 2010 Akamai
US Government Customers
12 of 15 Cabinet Agencies




                            © 2010 Akamai

Más contenido relacionado

Destacado

Work Life Home Care
Work Life Home CareWork Life Home Care
Work Life Home Carensachs
 
Greg Linch - Publish2 contest
Greg Linch - Publish2 contestGreg Linch - Publish2 contest
Greg Linch - Publish2 contestGreg Linch
 
Openid technight 20110909_fujie
Openid technight 20110909_fujieOpenid technight 20110909_fujie
Openid technight 20110909_fujieNaohiro Fujie
 
GDA 2015 presentation: Data and programming as part of your journalistic core...
GDA 2015 presentation: Data and programming as part of your journalistic core...GDA 2015 presentation: Data and programming as part of your journalistic core...
GDA 2015 presentation: Data and programming as part of your journalistic core...Greg Linch
 
Chemistry Jeopardy
Chemistry JeopardyChemistry Jeopardy
Chemistry Jeopardyginaarnold
 
2007 AFRC-JFRC Flare Tip Analysis Using CFD
2007 AFRC-JFRC Flare Tip Analysis Using CFD2007 AFRC-JFRC Flare Tip Analysis Using CFD
2007 AFRC-JFRC Flare Tip Analysis Using CFDJoseph Smith
 
Collision Course: US vs. Europe & International Law
Collision Course: US vs. Europe & International LawCollision Course: US vs. Europe & International Law
Collision Course: US vs. Europe & International Lawpopp_elizabeth
 
Work Experience from Fugro and Svitzer
Work Experience from Fugro and SvitzerWork Experience from Fugro and Svitzer
Work Experience from Fugro and Svitzerlondal
 
'Knowledge Transfer 2.0'
'Knowledge Transfer 2.0''Knowledge Transfer 2.0'
'Knowledge Transfer 2.0'JISC BCE
 
淺談 Domain name 網域名稱姓名學 by Ben Lin
淺談 Domain name 網域名稱姓名學 by Ben Lin淺談 Domain name 網域名稱姓名學 by Ben Lin
淺談 Domain name 網域名稱姓名學 by Ben Lin悠識學院
 
Linux Ubuntu Wallpapers
Linux Ubuntu WallpapersLinux Ubuntu Wallpapers
Linux Ubuntu Wallpapersfondas vakalis
 
E Biz Cluster Sept 19 M&A
E Biz Cluster Sept 19 M&AE Biz Cluster Sept 19 M&A
E Biz Cluster Sept 19 M&Amwrjh
 
feliz navidad 2008/2009
feliz navidad 2008/2009feliz navidad 2008/2009
feliz navidad 2008/2009arqueomaria
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionMichelle Bruno
 
ALCTS 2014 Presentation
ALCTS 2014 PresentationALCTS 2014 Presentation
ALCTS 2014 Presentationandreadisd
 

Destacado (20)

Work Life Home Care
Work Life Home CareWork Life Home Care
Work Life Home Care
 
Greg Linch - Publish2 contest
Greg Linch - Publish2 contestGreg Linch - Publish2 contest
Greg Linch - Publish2 contest
 
Openid technight 20110909_fujie
Openid technight 20110909_fujieOpenid technight 20110909_fujie
Openid technight 20110909_fujie
 
GDA 2015 presentation: Data and programming as part of your journalistic core...
GDA 2015 presentation: Data and programming as part of your journalistic core...GDA 2015 presentation: Data and programming as part of your journalistic core...
GDA 2015 presentation: Data and programming as part of your journalistic core...
 
Chemistry Jeopardy
Chemistry JeopardyChemistry Jeopardy
Chemistry Jeopardy
 
2007 AFRC-JFRC Flare Tip Analysis Using CFD
2007 AFRC-JFRC Flare Tip Analysis Using CFD2007 AFRC-JFRC Flare Tip Analysis Using CFD
2007 AFRC-JFRC Flare Tip Analysis Using CFD
 
Collision Course: US vs. Europe & International Law
Collision Course: US vs. Europe & International LawCollision Course: US vs. Europe & International Law
Collision Course: US vs. Europe & International Law
 
Evil Woman
Evil WomanEvil Woman
Evil Woman
 
Dinozauri
DinozauriDinozauri
Dinozauri
 
Work Experience from Fugro and Svitzer
Work Experience from Fugro and SvitzerWork Experience from Fugro and Svitzer
Work Experience from Fugro and Svitzer
 
Pp6
Pp6Pp6
Pp6
 
'Knowledge Transfer 2.0'
'Knowledge Transfer 2.0''Knowledge Transfer 2.0'
'Knowledge Transfer 2.0'
 
淺談 Domain name 網域名稱姓名學 by Ben Lin
淺談 Domain name 網域名稱姓名學 by Ben Lin淺談 Domain name 網域名稱姓名學 by Ben Lin
淺談 Domain name 網域名稱姓名學 by Ben Lin
 
Linux Ubuntu Wallpapers
Linux Ubuntu WallpapersLinux Ubuntu Wallpapers
Linux Ubuntu Wallpapers
 
E Biz Cluster Sept 19 M&A
E Biz Cluster Sept 19 M&AE Biz Cluster Sept 19 M&A
E Biz Cluster Sept 19 M&A
 
feliz navidad 2008/2009
feliz navidad 2008/2009feliz navidad 2008/2009
feliz navidad 2008/2009
 
Access For All
Access For AllAccess For All
Access For All
 
Understanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to SelectionUnderstanding Mobile Apps for Events: From Strategy to Selection
Understanding Mobile Apps for Events: From Strategy to Selection
 
Examen Facil
Examen FacilExamen Facil
Examen Facil
 
ALCTS 2014 Presentation
ALCTS 2014 PresentationALCTS 2014 Presentation
ALCTS 2014 Presentation
 

Similar a Metricon5 powell - ddos analytics

Internet 2020: The Future Connection
Internet 2020: The Future ConnectionInternet 2020: The Future Connection
Internet 2020: The Future ConnectionChristine Nolan
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Handelsblatt. Akamai CEO keynote. 2012
Handelsblatt. Akamai CEO keynote. 2012Handelsblatt. Akamai CEO keynote. 2012
Handelsblatt. Akamai CEO keynote. 2012Liz Bradley
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Andris Soroka
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Liz Bradley
 
Quelle stratégie pour EMC en 2015 ? Repensons l'IT
Quelle stratégie pour EMC en 2015 ? Repensons l'ITQuelle stratégie pour EMC en 2015 ? Repensons l'IT
Quelle stratégie pour EMC en 2015 ? Repensons l'ITRSD
 
Presentation big data
Presentation   big dataPresentation   big data
Presentation big dataxKinAnx
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Tucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTina Jiang
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiPROIDEA
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITInnoTech
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper Networks
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Akamai CEO keynote EnerNOC 2011
Akamai CEO keynote EnerNOC 2011Akamai CEO keynote EnerNOC 2011
Akamai CEO keynote EnerNOC 2011Liz Bradley
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimatednoellefaris
 

Similar a Metricon5 powell - ddos analytics (20)

Internet 2020: The Future Connection
Internet 2020: The Future ConnectionInternet 2020: The Future Connection
Internet 2020: The Future Connection
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Handelsblatt. Akamai CEO keynote. 2012
Handelsblatt. Akamai CEO keynote. 2012Handelsblatt. Akamai CEO keynote. 2012
Handelsblatt. Akamai CEO keynote. 2012
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010
 
Akamai partner training by Malcolm Rowe
Akamai partner training by Malcolm RoweAkamai partner training by Malcolm Rowe
Akamai partner training by Malcolm Rowe
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
Quelle stratégie pour EMC en 2015 ? Repensons l'IT
Quelle stratégie pour EMC en 2015 ? Repensons l'ITQuelle stratégie pour EMC en 2015 ? Repensons l'IT
Quelle stratégie pour EMC en 2015 ? Repensons l'IT
 
Presentation big data
Presentation   big dataPresentation   big data
Presentation big data
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Tucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTucci emc world 2011 fina lb
Tucci emc world 2011 fina lb
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand IT
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press Conference
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Akamai CEO keynote EnerNOC 2011
Akamai CEO keynote EnerNOC 2011Akamai CEO keynote EnerNOC 2011
Akamai CEO keynote EnerNOC 2011
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Metricon5 powell - ddos analytics

  • 1. Headlines You May Have Seen © 2010 Akamai
  • 2. Headlines You DID NOT See Independence Day Attacks Paralyze the U.S. Government and Financial Websites Attacked and Taken Down: Stocks Show Concerns President Delays Trip Due to Cyber Attacks POWERING A BETTER INTERNET © 2010 Akamai
  • 3. IT Risk In a Complex World © 2010 Akamai
  • 4. What’s At Risk? Reputation & Brand Dollars & Revenue Mission & Trust NSA's Guide: Defense in Depth - A practical strategy for achieving Information Assurance in today’s highly networked environments © 2010 Akamai
  • 5. Weathering Storms in the Cloud: Analyzing Massive DDoS Attacks to Prepare for the Future R. H. Powell IV Senior Service Line Manager August 10, 2010
  • 6. Agenda Weathering Storms in the Cloud • Is the Threat Worth Considering? • Data Collection & Considerations • Observations from the Wild • July 4th DDoS Case Study • How Do you Analyze This • Future Expectations & Innovation © 2010 Akamai
  • 7. State of Internet Security Today • 95% of corporate Web applications have severe vulnerabilities.1 • 34 million computers in the U.S. alone may now be part of a botnet.2 • Cybercrime costs businesses $1 trillion a year.3 • In 2008, a Web page was infected every 4.5 seconds.4 • Attack traffic observed from 198 countries in Q1 ‘10, up 291% from 68 countries in Q1 ‘09.5 1 WASC 2 Georgia Tech Information Security 3 McAfee 4 Sophos 5 Akamai © 2010 Akamai
  • 8. Targets of Opportunity 4000 3,462 Volume of Vulnerabilities 2,750 3000 2,029 1,875 2000 1000 0 2007 2008 2007 2008 (Non-Web Application (Web Application Vulnerabilities) Vulnerabilities) Source: Symantec Internet Security Threat Report, April 2009 © 2010 Akamai
  • 9. Peak Attack Traffic per year 49 250 50 225 45 40 >200 200 40 175 35 Attack Size - Gbps 150 30 125 25 24 100 20 17 15 75 10 50 10 25 5 2.5 0 1.2 2002 2003 2004 2005 2006 2007 2008 2009 (Arbor Networks) (Akamai Technologies) © 2010 Akamai
  • 10. Where Does the Data Come From? Primary Auxiliary Data Data Sources Source Akamai Distributed Agents Publicly Available Reports Akamai Customer Production Traffic Logs © 2010 Akamai
  • 11. Top Attack Countries (Akamai Agents) © 2010 Akamai
  • 12. Top Attack Regions (Akamai Agents) Europe 44% Overall Europe 50% of Mobile © 2010 Akamai
  • 13. A Note On Mobile Connectivity Global %>1 %>2 %>5 %> Mobile Mbps Mbps Mbps 10 Mbps Providers Average Connection Speed 32%1 13%1 -- -- Maximum Connection Speed -- 76%1 30%1 6%1 The GSM Association reports that global Mobile Broadband connections roughly doubled during 2009 to 200 million. By the end of 2010, they estimate this will reach 342 million global connections, with 120 million in Europe, 116 million in the Asia Pacific region, and 58 million in North America. 2 1 Akamai 2 GSM Association © 2010 Akamai
  • 14. July 4 2009 DDoS Attack Observed Attack Profile Type of Attack – Brute Force DDoS • The largest coordinated DDoS cyber attack against US Government Websites • HTTP Resource Drain attack • Sourced primarily from compromised Korean computers Intensity of Attack • 1,000,000+ hits per second and ~200 Gbps aggregate attack traffic (US Gov Only) • One website received 8 years of traffic in a day All Traffic Logged for Akamai Customers • 64 Billion Log Lines • 13 TB of uncompressed log data (400+ Gigs of Compressed logs) “Between the volume of the requests and their frustrating nature, a Web site with few servers or limited bandwidth can quickly be taken down. Others with greater physical and financial resources can take the punishment. That may explain why high-volume Web sites such as those belonging to the White House, the Pentagon and the New York Stock Exchange were able to withstand such attacks with barely a hiccup, while the Federal Trade Commission's and the Transportation Department's were knocked offline." - Paul Wagenseil, Fox News © 2010 Akamai
  • 15. July 4, 2009 DDoS Attack Times Above Customer – PROTECTED Peak Traffic Previous Peak Traffic U.S. Government Customer 1 124 Gbps 598x U.S. Government Customer 2 32 Gbps 369x U.S. Government Customer 3 9 Gbps 39x U.S. Government Customer 4 9 Gbps 19x U.S. Government Customer 5 2 Gbps 9x U.S. Government Customer 6 1.9 Gbps 6x New U.S. Government Customer 0.7 Gbps SITE DOWN before Akamai “Between the volume of the requests and their frustrating nature, a Web site with few servers or limited bandwidth can quickly be taken down. Others with greater physical and financial resources can take the punishment. That may explain why high-volume Web sites such as those belonging to the White House, the Pentagon and the New York Stock Exchange were able to withstand such attacks with barely a hiccup, while the Federal Trade Commission's and the Transportation Department's were knocked offline." - Paul Wagenseil, Fox News © 2010 Akamai
  • 16. Akamai Analysis of Log Data Top Attacking IP Address Over Time • July 4th – Attacks focused on two sites • July 5th – Attacks spread to include 5 other sites. Even traffic spread. • July 5th (late) – Attack shifts bulk of attack to 2 new sites • July 7th (late) – Attack Ends All Targeted US Government Websites (not using Akamai) Went Down! © 2010 Akamai
  • 17. Unique Hostile IPs Over Time # Unique Hostile IP's Per 30 Minute Block 120000 97,882 Unique IP’s in 30 mins 100000 Spike 1 80000 60000 Spike 3 Spike 2 40000 # IP's 20000 Few common attackers between spikes: (Only 4,284 IP’s Shared Across all Spikes) 0 5.1.0 7.8.0 8.6.0 9.4.0 10.13.0 11.11.0 11.22.0 12.20.0 2.23.5 3.10.5 4.13.0 5.12.0 5.23.0 6.10.0 6.21.0 7.19.0 8.17.0 9.15.0 10.2.0 11.0.0 12.9.0 13.7.0 Much Larger Then Any Public Estimates © 2010 Akamai
  • 18. Crunching The Data © 2010 Akamai
  • 19. Future Outlook and Innovation © 2010 Akamai
  • 21. Akamai Architecture Operational View – OV-1 Akamai Network Data Center 65,000+ Servers 1500+ Locations Web 950+ Networks Servers 70+ Countries Fire Edge Servers Database Wall Compression Network Storage Load Balancer Transaction WAF Server EDNS Internet Directory/ Akamai Policy Server Site Shield Edge Servers Network Legacy App DNS Storage Systems Servers Server End Users Back-Up Site or Load Balanced Multi-Data Center Security Availability Scalability Visibility Resource Savings Performance © 2010 Akamai
  • 22. Broad adoption across verticals If you’re on-line you’re using Akamai Retail & Travel • Over 400 Global Retailers • 50 of the top 50 U.S. Retailers • Over 125 Global Online Travel Sites Media & Entertainment • 30 of the top 30 M&E companies Finance • 9 of top 15 Global Banks Technology •The top five anti-virus companies © 2010 Akamai
  • 23. US Government Customers 12 of 15 Cabinet Agencies © 2010 Akamai

Notas del editor

  1. In the past few years we have seen major cyber attacks on national infrastructures … 2007 on Estonia Government’s communications attacked by a Russian Youth Group attacks peaked at 2000 hps & ~80mbs and in 2008 attacks against Georgia’s IT infrastructure some peaking at ~800mbs. These were big news … this was the first time government communications were impacted by cyber assaults. This year it is difficult to pick up the paper without noticing attacks …. on Swedish Government websites, or commercial services like twitter, facebook or Google.
  2. As you all know, IT Infrastructure Risks can come in many different formsNatural Disaster, hurricanes….earthquakes, tsunami…Flash crowds resulting from Geopolitcal events, major product or software releasesOR Malicious and Intentional Attacks (Kinetic, or non-kinetic Malware, Viruses, DoS attacks, etc.)…THESE RISKS ARE REAL, AND THEY ARE NOT GOING AWAY
  3. Reputation & Brand – Extremely valuable even in the public sectorDollars and Revenue – Internal Revenue Service or the US Postal Services Army Air Force Exchange Service …. outages can be tied to dollars Mission and Customer Trust – Most common with my customers is the ability to reliably make information available to the public. Through secure extranets and public sites. Your Ability to SleepSignificant factors in your success! And although the fundamentals for securing your infrastructure remain the same, the distributed nature of the current threat requires a mitigation that is also distributed. …. and the threat continues to increase.
  4. I will spend some time reviewing some of the risks to public facing sites and infrastructure, the challenges involved with mitigating those risks and then do a, deep dive into the July 4th DDoS attack against the US public Sector and finish up with a few of the lessons learned from that attack.
  5. In a March 2009 Forster Study 74% of the companies surveyed have been subject to DDOS in the last 12 monthsMany think Bot networks made up of zombie computers are the greatest threat to IT infrastructure. Yankee Group study of Tier 1 ISPs (Partridge, 2007), DDoS attacks ranked first on a list of security threats, with botnets a close second.Forster reports that companies can experiences loses of $190k to $19m /hour of down time.Gartner, reports that considers DDoS protection a cost of doing business for any organization that leverages the Internet. This past May 2 of the worlds largest botnets run by organized crime showed uncharacteristic cooperation.
  6. Volume based attack traffic is still growing despite the fact that many more application specific attacks are also being launched.
  7. Akamai has about 65,000+ servers deployed around the world.About 200 hundred of those servers, and growing as appropriate, are setup as agents that do not broadcast any services but sit and listen on all ports and log connections. These are Akamai Agents, and any inbound traffic represents traffic that should not be made to these servers and is either scanning, probing, trying to exploit, or DDoS’ing these IP’s. In addition, Akamai partners with, and co-locates in about 900 ISP’s around the world. Many of these ISP’s share information such as BGB feeds which provide us useful internet network information to correlate with other observations we see in the wild.In the other ~65 servers we deliver live production customer traffic, and we collect logs from those servers and process them constantly. Customer traffic currently averages about 2.2 Million hits per second across a 24 hour period.42 Billion request per day which equates to 84+ Billion logs lines in an average day.
  8. Type of Attack – Brute Force DDoSThe largest coordinated DDoS cyber attack against US Government WebsitesHTTP Resource Drain attackSourced primarily from compromised Korean computers Intensity of Attack1,000,000+ hits per second and ~200 Gbps aggregate attack traffic (US Gov Only)One website received 8 years of traffic in a dayAll Traffic Logged for Akamai Customers64 Billion Log Lines13 TB of uncompressed log data (400+ Gigs of Compressed logs)
  9. You Cannot Block Fast EnoughMany or Few Computers? One of our questions when analyzing this attack was “Is this attack coming from a lot of Zombied computers, or is it coming from some Superfarm of data centers built specifically for the attack”Public Estimates ranged from 20-60k, but it turns out it was ~308k (5 times more), much larger than estimatesThree waves of attackIP’s Overlapping very little between wavesRecruited 50-75k Zombies / day before the malware was prevented from spreading more from compromised computers Traditional Methods of Blocking an attack of this power directed at your infrastructure will not work.Firewalls at Max, and other services impacted.