SlideShare a Scribd company logo
1 of 67
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Adrian Newby, CTO, CrownPeak
David Grampa, Founder, TypeFrag.com
Andrew Kiggins, AWS Solutions Architect
Jeffrey Lyon, AWS Operations Manager
November 29, 2016
SEC310
Mitigating DDoS Attacks on AWS
Five Vectors and Four Use Cases
In this session, you will learn about …
Five DDoS Attack Vectors
1. UDP reflection attacks
2. UDP floods
3. TCP SYN floods
4. Web application layer attacks
5. DNS query floods
Four AWS Use Cases
1. Common web application
2. Highly-resilient web application
3. Video game development
4. Voice communication
DDoS attacks
DDoS attacks can …
• Target networks with large volumes of traffic
• Target systems with large volumes of connections
• Target services with large volumes of requests
Vector #1: UDP Reflection Attacks
• Attacker sends spoofed request to UDP service
• Spoofed IP is that of the victim
• Asymmetric: UDP service responds with large payload
Network Traffic | System Connections | Service Requests
20:07:45.918266 IP 192.0.2.2.1900 > server.example.com.http: UDP, length 274
20:07:45.918271 IP 198.51.100.3.1900 > server.example.com.http: UDP, length 320
20:07:45.918275 IP 203.0.113.7.1900 > server.example.com.http: UDP, length 307
20:07:45.918279 IP 192.0.2.5.1900 > server.example.com.http: UDP, length 326
20:07:45.918283 IP 198.51.100.12.1900 > server.example.com.http: UDP, length 300
20:07:45.918287 IP 203.0.113.58.1900 > server.example.com.http: UDP, length 307
20:07:45.918291 IP 192.0.2.33.1900 > server.example.com.http: UDP, length 302
20:07:45.918294 IP 198.51.100.113.1900 > server.example.com.http: UDP, length 323
20:07:45.918301 IP 203.0.113.90.1900 > server.example.com.http: UDP, length 268
Vector #1: UDP Reflection Attacks
Clear signature
Many requests from suspicious
source port
Large packet size
Flood of traffic is easy to
generate
UDP protocol
Clear indicator of suspicious activity if
destination does not use UDP
Network Traffic | System Connections | Service Requests
20:07:45.918266 IP 192.0.2.2.51523 > server.example.com.http: UDP, length 1024
20:07:45.918271 IP 198.51.100.3.23769 > server.example.com.http: UDP, length 1024
20:07:45.918275 IP 203.0.113.7.4655 > server.example.com.http: UDP, length 1024
20:07:45.918279 IP 192.0.2.5.13002 > server.example.com.http: UDP, length 1024
20:07:45.918283 IP 198.51.100.12.52670 > server.example.com.http: UDP, length 1024
20:07:45.918287 IP 203.0.113.58.21266 > server.example.com.http: UDP, length 1024
20:07:45.918291 IP 192.0.2.33.7940 > server.example.com.http: UDP, length 1024
20:07:45.918294 IP 198.51.100.113.35950 > server.example.com.http: UDP, length 1024
20:07:45.918301 IP 203.0.113.90.62370 > server.example.com.http: UDP, length 1024
Vector #2: UDP floods
Ambiguous
Source port may be difficult to
distinguish
Packet size
Defined by attacker
UDP protocol
Clear indicator of suspicious activity if
destination does not use UDP
Network Traffic | System Connections | Service Requests
Vector #3: TCP SYN Floods
• Flood of many connections targeting a system
• Very small packets
• Connections are left half-open, state table exhaustion
Network Traffic | System Connections | Service Requests
tcp 0 0 192.0.2.1:80 91.64.4.146:64979 SYN_RECV -
tcp 0 0 192.0.2.1:80 84.24.103.112:4005 SYN_RECV -
tcp 0 0 192.0.2.1:80 79.223.69.239:61510 SYN_RECV -
tcp 0 0 192.0.2.1:80 67.86.135.44:43312 SYN_RECV -
tcp 0 0 192.0.2.1:80 86.88.67.226:50600 SYN_RECV -
tcp 0 0 192.0.2.1:80 173.20.137.110:3813 SYN_RECV -
tcp 0 0 192.0.2.1:80 84.58.10.121:4878 SYN_RECV -
tcp 0 0 192.0.2.1:80 91.37.40.151:2408 SYN_RECV -
tcp 0 0 192.0.2.1:80 173.20.137.110:3441 SYN_RECV -
Vector #3: TCP SYN Floods
Half-open connections
We sent SYN-ACK, ACK never received
TCP protocol
Many connections destined to HTTP service
Network Traffic | System Connections | Service Requests
Vector #4: Web Application Layer Attacks
• Malicious web requests that look like real users
• Impact availability or scrape site content
• Mitigate using a WAF
• Block abusive IP’s, user agents, etc.
• Rate-based blacklisting
Network Traffic | System Connections | Service Requests
Vector #5: DNS Query Floods
• Many legitimate DNS queries can exhaust host capacity
• Random queries can “cache bust” recursive DNS (eg.
ezspobmzlanungyp.www.example.com)
• Authoritative DNS compelled to respond
Network Traffic | System Connections | Service Requests
DDoS Mitigation on AWS
Conventional DDoS Mitigation
Conventional data center
DDoS attack
Users DDoS mitigation service
DDoS Mitigation on AWS
• Built into the AWS global
infrastructure
• Fast mitigation without external
routing
• Protection of availability, latency, and
throughput
DDoS Attacks and Mitigation
• “BlackWatch” systems protect AWS, mitigate large
volume attacks
• Methods:
• Allow only traffic valid for the service
• SYN proxy/cookies when high levels of SYN==1 detected
• Suspicion-based traffic shaping
Suspicion-Based Traffic Shaping
• Prioritize reliable traffic
• Deprioritize spikes of traffic:
• Abnormal sources (networks, geos)
• Abnormal ports and protocols
• Abnormal packet or request characteristics
• Leverage AWS scale, minimize false positives
Suspicion-Based Traffic Shaping
Protecting Web Applications
Common Web Application
ALB security group
Amazon
EC2
instances
Application
Load Balancer
Public subnet
Web application
security group
Private subnet
DDoS
attack
Users
ALB Scaling and Mitigation
ALB security group
Application
Load
Balancer
Public subnet
DDoS
attack
Users
Application
Load
Balancer
Application
Load
Balancer
Application
Load
Balancer
BlackWatch
DDoS
mitigation
Transit Diversity and Redundancy
Internet
exchange
Internet
exchange
Internet
exchange
us-east-1
DDoS-resilient web
application
Highly Resilient Web Application
Amazon
Route 53
ALB security group
Amazon
EC2
instances
Application
Load Balancer
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAF
Amazon
API Gateway
DDoS
attack
Users
Mitigate closer to the source
Internet
exchange
Tokyo Singapore Hong Kong Dublin London Milan
Internet
exchange
Internet
exchange
Internet
exchange
Internet
exchange
Internet
exchange
us-east-1
BlackWatch
DDoS
mitigation
DDoS attack
DDoS resilient web
services
Globally Distributed Capacity
Case Study:
Crownpeak / BNY Mellon
Introduction to Crownpeak
• Crownpeak has pioneered the SaaS model for web
content management systems since 2001
• We provide a full digital experience management suite,
delivered entirely using Amazon Web Services
• We are headquartered in Los Angeles, CA, with offices
in Denver, CO, and London, UK
Introduction to the Case Study
• Bank of New York Mellon at a
glance:
• $29.5 trillion assets under custody
and/or administration
• $1.7 trillion assets under
management
• 100+ markets worldwide
• Many websites managed and
hosted by Crownpeak
• Committed to best-in-class cyber
defense and threat protection
Baseline Architecture
Amazon
Route 53
ELB security group
Amazon
EC2
instances
ELB load
balancer
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
DDoS
attack
Users
Hardened Architecture
Amazon
Route 53
ELB security group
Amazon
EC2
instances
Elastic Load
Balancing
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAFDDoS
attack
Users
AWS
Lambda
Amazon
S3
DDoS Testing
Test Description
HTTP GET baseline Basic load test to establish thresholds at which
mitigation devices activate
WILD HULK DDoS Obfuscation of source client, reference forgery,
stickiness, URL transformation
WAF overload Parallel SQL injection and vulnerability scans
Metric Ave / Peak
Concurrent attack vectors 200
Requests sent 200 K/second (ave), 1 M+/second (peak)
Data volume returned 35-40 Gb/second (ave), 52 Gb/second (peak)
Data volume sent 2.5-3.5 Gb/second (ave), 4.4 Gb/second (peak)
Test Results
How Far Can You Push These Technologies?
Conclusions and Final Recommendations
• Amazon CloudFront, AWS WAF are a highly effective
defense against the most sophisticated Layer 7 attacks
• Best practices for best defense:
Eliminates many common attacks
Invest time in limiting query
string and header forwarding
Shields the origin from redirect floods
Deploy HTTP->HTTPS
redirect at the edge
Many DDoS toolkits fail TLS handshake
Implement an SNI-based
infrastructure
DDoS-Resilient Architecture on
Amazon EC2
VPC Flow Logs, Security Groups, Network ACLs Primer
VPC public subnet VPC private subnet
10.200.0.0/16
10.200.150.0/2410.200.99.0/24
Route
table
Route
table
Flow
logs
Instance
Instance
Application
Security
Group
WebServer
Security
Group
Ingress Rule
0.0.0.0/0 : 80
Egress Rule
0.0.0.0/0 : ANY
ApplicationSecurityGroup:8443
Ingress Rule
WebServerSecurityGroup: ANY
Egress Rule
0.0.0.0/0 : ANY
Works like a firewall
Internet
gateway
NAT
gateway
VPC Flow Logs, Security Groups, Network ACLs Primer
Internet
gateway
VPC public subnet VPC private subnet
10.200.0.0/16
10.200.150.0/2410.200.99.0/24
Route
table
Route
table
Instance
Application
Security
Group
WebServer
Security
Group
NAT
gateway
Flow
logs
Instance
Works like NetFlow
srcIP, dstIP, srcPort, dstPort, protocol, accept/reject
VPC Flow Logs, Security Groups, Network ACLs Primer
Internet
gateway
VPC public subnet VPC private subnet
10.200.0.0/16
Route
table
NAT
gateway
Route
table
Flow
logs Application
Security
Group
WebServer
Security
Group
10.200.150.0/2410.200.99.0/24
Instance
Instance
Works like router ACLs
Amazon EC2 for Game Developers
• Web portals
• Game servers
• Matching servers
• Relay servers
Web Portal = The Usual Suspects
Amazon
Route 53
ELB security group
Amazon
EC2
instances
ELB / ALB
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAF
Amazon
API Gateway
DDoS
attack
Users
Game Servers, Match Servers, Relays
• UDP vs TCP
• Latency
• Scaling
Options
• Reduce your attackable surface area
• Filter unwanted traffic
• DNS protection
• Protect API endpoint
• Restrict access
• Scale to absorb
• Size appropriately
• Reduce blast radius
• Move the target
Reduce the Blast Radius
Security group
Subnet
Players
Instance
Players
Players
Players
DDoS
attack
Security group
Security group Security group
Reduce the Blast Radius
Security group
Subnet
Players
Instance
Players
Players
Players
Players
DDoS
attack
Instance
Instance
Instance
Instance
Security group
Restrict Access – Security Groups
Subnet
Players
Players
Players
Players
Players
DDoS
attack
Instance
Security group
Restrict Access – Host-Based
Subnet
Players
Players
Players
Players
Players
DDoS
attack
Instance
Security group
Security group
Security group Security group
Move the Target
• Use elastic IP
addresses
• Don’t use
contiguous IP
addresses
Instance
Elastic IP
SubnetPlayers
Players
DDoS
attack
Instance
Elastic IP
Instance
TeamSpeak3 on EC2
• TeamSpeak3 is voice communication software
• Popular with online computer gamers
• Common DDoS target
TeamSpeak3 on EC2
Resiliency
1. Leverage AWS global infrastructure
2. Minimize attack surface
3. Reduce blast radius
4. Automatically mitigate attacks
5. Analyze and learn from attacks
Attack Surface
Amazon
Route 53
Users
Instance
Subnet
One network ACL per VPC subnet
One VPC subnet per instance
Elastic IP
NetworkACL
Attack Surface
Blast Radius
Amazon
Route 53
Users
AZ #1 AZ #2 AZ #3
Blast Radius
Amazon
Route 53
Users
AZ #1 AZ #2 AZ #3
Attack
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
DDoS attack begins
CloudWatch AWS Lambda
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1 DDoS attack detected
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1
2
Elastic IP address changed
Elastic IP
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1
2
Elastic IP
3
Route 53 DNS updated
Attack Mitigation
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
DDoS attack mitigated
Demo: Attack Mitigation with EIP Swapping
Results
Before After
50 attacks per month
2000 users affected per attack
15 minutes per attack
5 attacks per month
200 users affected per attack
90 seconds per attack
1,500,000
user minutes
1,500
user minutes
Attack Analysis
Amazon S3
Amazon
CloudFront
Amazon
SimpleDB
Amazon S3
Amazon API
Gateway
Amazon
Lambda
VPC
Flow Logs
Single-page app REST-based API
User
Attack Analysis
DDoS Mitigation Support
Need Help?
Step 1
Click “Create Case”
Step 2
Select “Distributed Denial of Service
(DDoS)”
Step 3
Select the category and severity and write a
subject and description
Step 4
Talk to a DDoS expert
AWS Best Practices for DDoS Resiliency
• Types of DDoS attacks
• Mitigation techniques
• Attack surface reduction
• Operational techniques
Download from
https://aws.amazon.com/security
AWS Best Practices for DDoS Resiliency
June 2016
Thank you!
Learn more about DDoS mitigation on AWS
at https://aws.amazon.com/security
Remember to complete
your evaluations!
Remember to complete
your evaluations!

More Related Content

What's hot

Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Cloud security and compliance ppt
Cloud security and compliance pptCloud security and compliance ppt
Cloud security and compliance pptKrupa Rajani
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
AZ-900 Azure Fundamentals.pdf
AZ-900 Azure Fundamentals.pdfAZ-900 Azure Fundamentals.pdf
AZ-900 Azure Fundamentals.pdfssuser5813861
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsDhananjay Aloorkar
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAmazon Web Services
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldAmazon Web Services
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...Amazon Web Services
 
Automatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterAutomatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterHungWei Chiu
 

What's hot (20)

Cloud security
Cloud securityCloud security
Cloud security
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud security and compliance ppt
Cloud security and compliance pptCloud security and compliance ppt
Cloud security and compliance ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
AZ-900 Azure Fundamentals.pdf
AZ-900 Azure Fundamentals.pdfAZ-900 Azure Fundamentals.pdf
AZ-900 Azure Fundamentals.pdf
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWS
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
AWS Elastic Compute Cloud (EC2)
AWS Elastic Compute Cloud (EC2) AWS Elastic Compute Cloud (EC2)
AWS Elastic Compute Cloud (EC2)
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...
Using AWS for Backup and Restore (backup in the cloud, backup to the cloud, a...
 
Automatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes ClusterAutomatically Renew Certificated In Your Kubernetes Cluster
Automatically Renew Certificated In Your Kubernetes Cluster
 
Azure Hub spoke v1.0
Azure Hub spoke v1.0Azure Hub spoke v1.0
Azure Hub spoke v1.0
 

Viewers also liked

Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAmazon Web Services
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...Amazon Web Services
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...Amazon Web Services
 
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...Amazon Web Services
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...Amazon Web Services
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...Amazon Web Services
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...Amazon Web Services
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...Amazon Web Services
 
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...Amazon Web Services
 
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)Amazon Web Services
 
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceNEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceAmazon Web Services
 
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...Amazon Web Services
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)Kayo Iio
 
モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方Junpei Nakada
 

Viewers also liked (20)

DDoS Resiliency
DDoS ResiliencyDDoS Resiliency
DDoS Resiliency
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
 
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
 
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
 
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
 
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceNEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
 
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)
 
モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方
 

Similar to AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases (SEC310)

SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Amazon Web Services
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
Advanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAdvanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAmazon Web Services
 
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Amazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
 
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Amazon Web Services
 
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Amazon Web Services
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...Amazon Web Services
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...Amazon Web Services
 
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Amazon Web Services
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxAmazon Web Services
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...Amazon Web Services
 
XCloudLabs- AWS Overview
XCloudLabs- AWS Overview XCloudLabs- AWS Overview
XCloudLabs- AWS Overview sangam biradar
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovSergey Fedorov
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewMarketingArrowECS_CZ
 
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013Amazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 

Similar to AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases (SEC310) (20)

SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Advanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAdvanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application Defense
 
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
 
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
 
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
 
XCloudLabs- AWS Overview
XCloudLabs- AWS Overview XCloudLabs- AWS Overview
XCloudLabs- AWS Overview
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases (SEC310)

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Adrian Newby, CTO, CrownPeak David Grampa, Founder, TypeFrag.com Andrew Kiggins, AWS Solutions Architect Jeffrey Lyon, AWS Operations Manager November 29, 2016 SEC310 Mitigating DDoS Attacks on AWS Five Vectors and Four Use Cases
  • 2. In this session, you will learn about … Five DDoS Attack Vectors 1. UDP reflection attacks 2. UDP floods 3. TCP SYN floods 4. Web application layer attacks 5. DNS query floods Four AWS Use Cases 1. Common web application 2. Highly-resilient web application 3. Video game development 4. Voice communication
  • 4. DDoS attacks can … • Target networks with large volumes of traffic • Target systems with large volumes of connections • Target services with large volumes of requests
  • 5. Vector #1: UDP Reflection Attacks • Attacker sends spoofed request to UDP service • Spoofed IP is that of the victim • Asymmetric: UDP service responds with large payload Network Traffic | System Connections | Service Requests
  • 6. 20:07:45.918266 IP 192.0.2.2.1900 > server.example.com.http: UDP, length 274 20:07:45.918271 IP 198.51.100.3.1900 > server.example.com.http: UDP, length 320 20:07:45.918275 IP 203.0.113.7.1900 > server.example.com.http: UDP, length 307 20:07:45.918279 IP 192.0.2.5.1900 > server.example.com.http: UDP, length 326 20:07:45.918283 IP 198.51.100.12.1900 > server.example.com.http: UDP, length 300 20:07:45.918287 IP 203.0.113.58.1900 > server.example.com.http: UDP, length 307 20:07:45.918291 IP 192.0.2.33.1900 > server.example.com.http: UDP, length 302 20:07:45.918294 IP 198.51.100.113.1900 > server.example.com.http: UDP, length 323 20:07:45.918301 IP 203.0.113.90.1900 > server.example.com.http: UDP, length 268 Vector #1: UDP Reflection Attacks Clear signature Many requests from suspicious source port Large packet size Flood of traffic is easy to generate UDP protocol Clear indicator of suspicious activity if destination does not use UDP Network Traffic | System Connections | Service Requests
  • 7. 20:07:45.918266 IP 192.0.2.2.51523 > server.example.com.http: UDP, length 1024 20:07:45.918271 IP 198.51.100.3.23769 > server.example.com.http: UDP, length 1024 20:07:45.918275 IP 203.0.113.7.4655 > server.example.com.http: UDP, length 1024 20:07:45.918279 IP 192.0.2.5.13002 > server.example.com.http: UDP, length 1024 20:07:45.918283 IP 198.51.100.12.52670 > server.example.com.http: UDP, length 1024 20:07:45.918287 IP 203.0.113.58.21266 > server.example.com.http: UDP, length 1024 20:07:45.918291 IP 192.0.2.33.7940 > server.example.com.http: UDP, length 1024 20:07:45.918294 IP 198.51.100.113.35950 > server.example.com.http: UDP, length 1024 20:07:45.918301 IP 203.0.113.90.62370 > server.example.com.http: UDP, length 1024 Vector #2: UDP floods Ambiguous Source port may be difficult to distinguish Packet size Defined by attacker UDP protocol Clear indicator of suspicious activity if destination does not use UDP Network Traffic | System Connections | Service Requests
  • 8. Vector #3: TCP SYN Floods • Flood of many connections targeting a system • Very small packets • Connections are left half-open, state table exhaustion Network Traffic | System Connections | Service Requests
  • 9. tcp 0 0 192.0.2.1:80 91.64.4.146:64979 SYN_RECV - tcp 0 0 192.0.2.1:80 84.24.103.112:4005 SYN_RECV - tcp 0 0 192.0.2.1:80 79.223.69.239:61510 SYN_RECV - tcp 0 0 192.0.2.1:80 67.86.135.44:43312 SYN_RECV - tcp 0 0 192.0.2.1:80 86.88.67.226:50600 SYN_RECV - tcp 0 0 192.0.2.1:80 173.20.137.110:3813 SYN_RECV - tcp 0 0 192.0.2.1:80 84.58.10.121:4878 SYN_RECV - tcp 0 0 192.0.2.1:80 91.37.40.151:2408 SYN_RECV - tcp 0 0 192.0.2.1:80 173.20.137.110:3441 SYN_RECV - Vector #3: TCP SYN Floods Half-open connections We sent SYN-ACK, ACK never received TCP protocol Many connections destined to HTTP service Network Traffic | System Connections | Service Requests
  • 10. Vector #4: Web Application Layer Attacks • Malicious web requests that look like real users • Impact availability or scrape site content • Mitigate using a WAF • Block abusive IP’s, user agents, etc. • Rate-based blacklisting Network Traffic | System Connections | Service Requests
  • 11. Vector #5: DNS Query Floods • Many legitimate DNS queries can exhaust host capacity • Random queries can “cache bust” recursive DNS (eg. ezspobmzlanungyp.www.example.com) • Authoritative DNS compelled to respond Network Traffic | System Connections | Service Requests
  • 13. Conventional DDoS Mitigation Conventional data center DDoS attack Users DDoS mitigation service
  • 14. DDoS Mitigation on AWS • Built into the AWS global infrastructure • Fast mitigation without external routing • Protection of availability, latency, and throughput
  • 15. DDoS Attacks and Mitigation • “BlackWatch” systems protect AWS, mitigate large volume attacks • Methods: • Allow only traffic valid for the service • SYN proxy/cookies when high levels of SYN==1 detected • Suspicion-based traffic shaping
  • 16. Suspicion-Based Traffic Shaping • Prioritize reliable traffic • Deprioritize spikes of traffic: • Abnormal sources (networks, geos) • Abnormal ports and protocols • Abnormal packet or request characteristics • Leverage AWS scale, minimize false positives
  • 19. Common Web Application ALB security group Amazon EC2 instances Application Load Balancer Public subnet Web application security group Private subnet DDoS attack Users
  • 20. ALB Scaling and Mitigation ALB security group Application Load Balancer Public subnet DDoS attack Users Application Load Balancer Application Load Balancer Application Load Balancer BlackWatch DDoS mitigation
  • 21. Transit Diversity and Redundancy Internet exchange Internet exchange Internet exchange us-east-1 DDoS-resilient web application
  • 22. Highly Resilient Web Application Amazon Route 53 ALB security group Amazon EC2 instances Application Load Balancer Amazon CloudFront Public subnet Web application security group Private subnet AWS WAF Amazon API Gateway DDoS attack Users
  • 23. Mitigate closer to the source Internet exchange Tokyo Singapore Hong Kong Dublin London Milan Internet exchange Internet exchange Internet exchange Internet exchange Internet exchange us-east-1 BlackWatch DDoS mitigation DDoS attack DDoS resilient web services
  • 26. Introduction to Crownpeak • Crownpeak has pioneered the SaaS model for web content management systems since 2001 • We provide a full digital experience management suite, delivered entirely using Amazon Web Services • We are headquartered in Los Angeles, CA, with offices in Denver, CO, and London, UK
  • 27. Introduction to the Case Study • Bank of New York Mellon at a glance: • $29.5 trillion assets under custody and/or administration • $1.7 trillion assets under management • 100+ markets worldwide • Many websites managed and hosted by Crownpeak • Committed to best-in-class cyber defense and threat protection
  • 28. Baseline Architecture Amazon Route 53 ELB security group Amazon EC2 instances ELB load balancer Amazon CloudFront Public subnet Web application security group Private subnet DDoS attack Users
  • 29. Hardened Architecture Amazon Route 53 ELB security group Amazon EC2 instances Elastic Load Balancing Amazon CloudFront Public subnet Web application security group Private subnet AWS WAFDDoS attack Users AWS Lambda Amazon S3
  • 30. DDoS Testing Test Description HTTP GET baseline Basic load test to establish thresholds at which mitigation devices activate WILD HULK DDoS Obfuscation of source client, reference forgery, stickiness, URL transformation WAF overload Parallel SQL injection and vulnerability scans Metric Ave / Peak Concurrent attack vectors 200 Requests sent 200 K/second (ave), 1 M+/second (peak) Data volume returned 35-40 Gb/second (ave), 52 Gb/second (peak) Data volume sent 2.5-3.5 Gb/second (ave), 4.4 Gb/second (peak)
  • 32. How Far Can You Push These Technologies?
  • 33. Conclusions and Final Recommendations • Amazon CloudFront, AWS WAF are a highly effective defense against the most sophisticated Layer 7 attacks • Best practices for best defense: Eliminates many common attacks Invest time in limiting query string and header forwarding Shields the origin from redirect floods Deploy HTTP->HTTPS redirect at the edge Many DDoS toolkits fail TLS handshake Implement an SNI-based infrastructure
  • 35. VPC Flow Logs, Security Groups, Network ACLs Primer VPC public subnet VPC private subnet 10.200.0.0/16 10.200.150.0/2410.200.99.0/24 Route table Route table Flow logs Instance Instance Application Security Group WebServer Security Group Ingress Rule 0.0.0.0/0 : 80 Egress Rule 0.0.0.0/0 : ANY ApplicationSecurityGroup:8443 Ingress Rule WebServerSecurityGroup: ANY Egress Rule 0.0.0.0/0 : ANY Works like a firewall Internet gateway NAT gateway
  • 36. VPC Flow Logs, Security Groups, Network ACLs Primer Internet gateway VPC public subnet VPC private subnet 10.200.0.0/16 10.200.150.0/2410.200.99.0/24 Route table Route table Instance Application Security Group WebServer Security Group NAT gateway Flow logs Instance Works like NetFlow srcIP, dstIP, srcPort, dstPort, protocol, accept/reject
  • 37. VPC Flow Logs, Security Groups, Network ACLs Primer Internet gateway VPC public subnet VPC private subnet 10.200.0.0/16 Route table NAT gateway Route table Flow logs Application Security Group WebServer Security Group 10.200.150.0/2410.200.99.0/24 Instance Instance Works like router ACLs
  • 38. Amazon EC2 for Game Developers • Web portals • Game servers • Matching servers • Relay servers
  • 39. Web Portal = The Usual Suspects Amazon Route 53 ELB security group Amazon EC2 instances ELB / ALB Amazon CloudFront Public subnet Web application security group Private subnet AWS WAF Amazon API Gateway DDoS attack Users
  • 40. Game Servers, Match Servers, Relays • UDP vs TCP • Latency • Scaling
  • 41. Options • Reduce your attackable surface area • Filter unwanted traffic • DNS protection • Protect API endpoint • Restrict access • Scale to absorb • Size appropriately • Reduce blast radius • Move the target
  • 42. Reduce the Blast Radius Security group Subnet Players Instance Players Players Players DDoS attack
  • 43. Security group Security group Security group Reduce the Blast Radius Security group Subnet Players Instance Players Players Players Players DDoS attack Instance Instance Instance Instance Security group
  • 44. Restrict Access – Security Groups Subnet Players Players Players Players Players DDoS attack Instance Security group
  • 45. Restrict Access – Host-Based Subnet Players Players Players Players Players DDoS attack Instance Security group
  • 46. Security group Security group Security group Move the Target • Use elastic IP addresses • Don’t use contiguous IP addresses Instance Elastic IP SubnetPlayers Players DDoS attack Instance Elastic IP Instance
  • 47. TeamSpeak3 on EC2 • TeamSpeak3 is voice communication software • Popular with online computer gamers • Common DDoS target
  • 49. Resiliency 1. Leverage AWS global infrastructure 2. Minimize attack surface 3. Reduce blast radius 4. Automatically mitigate attacks 5. Analyze and learn from attacks
  • 50. Attack Surface Amazon Route 53 Users Instance Subnet One network ACL per VPC subnet One VPC subnet per instance Elastic IP NetworkACL
  • 53. Blast Radius Amazon Route 53 Users AZ #1 AZ #2 AZ #3 Attack
  • 56. Attack Mitigation Attack Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda 1 2 Elastic IP address changed Elastic IP
  • 57. Attack Mitigation Attack Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda 1 2 Elastic IP 3 Route 53 DNS updated
  • 58. Attack Mitigation Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda DDoS attack mitigated
  • 59. Demo: Attack Mitigation with EIP Swapping
  • 60. Results Before After 50 attacks per month 2000 users affected per attack 15 minutes per attack 5 attacks per month 200 users affected per attack 90 seconds per attack 1,500,000 user minutes 1,500 user minutes
  • 61. Attack Analysis Amazon S3 Amazon CloudFront Amazon SimpleDB Amazon S3 Amazon API Gateway Amazon Lambda VPC Flow Logs Single-page app REST-based API User
  • 64. Need Help? Step 1 Click “Create Case” Step 2 Select “Distributed Denial of Service (DDoS)” Step 3 Select the category and severity and write a subject and description Step 4 Talk to a DDoS expert
  • 65. AWS Best Practices for DDoS Resiliency • Types of DDoS attacks • Mitigation techniques • Attack surface reduction • Operational techniques Download from https://aws.amazon.com/security AWS Best Practices for DDoS Resiliency June 2016
  • 66. Thank you! Learn more about DDoS mitigation on AWS at https://aws.amazon.com/security
  • 67. Remember to complete your evaluations! Remember to complete your evaluations!