SlideShare una empresa de Scribd logo
1 de 29
DDoS? You shall not pass!
PLNOG 17 KRAKÓW, 26.09.2016
Artur Kane
Technology Evangelist
Our beginnings
Our beginnings
First 10GE
monitoring board
in academic
environment
2004
Functional prototype of HW accelerated
multigigabit (4x1GE, 1x10GE) NetFlow probe
Final recommendation – monitor EU
networks by the Flowmon (NetFlow) probe
2005/6
Our beginnings
600+ customers on 5 continents
100+ employees, HQ in CZ
Rapidly growing - organically
Recognized/awarded
by Gartner and
Deloitte, technology
partnership
Technology leader
in next generation
network, security and
application monitoring
Who we are today
Verticals ISP, banking/finance/utilities. From SMB to ENT and GOV customers
600+ customers in 30+ countries
Technology leader – 100G
Next Generation Network Traffic &
Performance Monitoring (NetFlow/IPFIX)
• Provides visibility – “eyes” into the network traffic
• Saves time and money for network administrators
• Enables quick troubleshooting and ticket resolution
• Delivers a substantial reduction in network
implementation, operation and management costs
Value proposition - visibility
Next Generation Network Security -
Behavior Analysis & Anomaly Detection
• Detects and alerts on abnormal behaviors
• Reports anomalies and advanced persistent threats
• Detect intrusions and attacks not visible
by standard signature based tools
Paul E. Proctor,
VP at Gartner:
“NBA is about
higher visibility in
the behavior of
your network to
cover gaps left by
signature based
mechanism.”
Value proposition - security
Out of path Detection and Mitigation
of volumetric DoS/DDoS attacks
• Average cost of one minute downtime is $22.000
• Average downtime is 54 minutes per attack
• Protect your business & customers satisfaction
Value proposition – DDoS protection
Technology landscape
Network Traffic
Monitoring
Network Statistics
Collection & Analysis
Advanced Analysis of
Network Statistics
Flowmon Probes
• Stand-alone passive sources of
network statistics (NetFlow / IPFIX )
Flowmon Collector
• Storing, visualization and analysis of
network statistics
Flowmon Modules
• Anomaly detection, traffic capture,
Application Performance Monitoring,
DDoS attacks detection and mitigation
The solution
All-in-one package
• data generation, collection, analytics, reporting, detection capabilities,
troubleshooting on infrastructure, application, database level – as an
all-in-one device
Neat integration
• use the whole potential of your past investments into network/security
instruments
Massive performance
• first 100G NetFlow/IPFIX probes in the world, the most robust NetFlow
collector
Ultimate scalability
• proven in deployments in organizations from 50 to 50 million users
Transparent licensing
• perpetual and subscription licensing per appliance, only limitations is a
performance of the given device
Smashing user-friendliness
• agentless, non-intrusive, easy and quick deployment, intuitive, straight-
forward GUI, great time-to-value
Outstanding cost efficiency
• best price/performance ration in the industry, low operational costs
How are we better?
DDoS Defender
Average cost of one minute downtime is
$22.000
Average downtime is 54 minutes per attack
Protect your business & customers satisfaction
Facts about DDoS
In-line detection and mitigation fits enterprises
• Limited number of uplinks
• L7 attacks coverage
• Reasonable price/performance ratio
ISP/telco/datacenter need out-of-path mitigation
• Focus on covering volumetric attacks
• To many uplinks and throughput
Solution?
Flow-based volumetric DDoS detection combined with out of
path mitigation
Protection strategies
DDoS detection and mitigation
• Focused on volumetric attacks
• Uses flow data from any sources (routers, probes, …)
• Predicts traffic volume using baseline/static methods
• Provides attack characteristics and notifications
Multi-tenant environment to protect various customers, network
segments, services, etc.
Universal deployment scenarios
Flowmon DDoS Defender
Standalone
Out-of-band elimination of
DDoS attack
(PBR, BGP)
Scrubbing Center
DDoS Defender overview
Uses various types of flow specification used for dynamic
signature of the attack
Provides specific action for traffic corresponding to the attack
characteristics
Flowmon DDoS Defender 3.0 supports following attributes to
create dynamic signature:
• Destination Prefix
• Source Prefix
• IP Protocol
• Destination port
• ICMP type
• ICMP code
BGP Flowspec
Detection performed over protected segments
• Segments defined by network subnets
For each segment, a set of baselines is learned from monitored
traffic. The attack is detected if the current traffic exceeds defined
threshold.
Baseline is learned for:
• TCP traffic with specific flags
• UDP traffic
• ICMP traffic
Attack detection
Alerting
• E-mail, Syslog, SNMP trap
Routing diversion
• PBR (Policy Based Routing)
• BGP (Border Gateway Protocol),
• BGP Flowspec
• RTBH (Remotely-Triggered Black Hole)
User-defined scripting
Automatic mitigation
• With out-of-band mitigation devices
• With services of Scrubbing center
Response to attack
Internet
Service Provider Core
Flow Data Collection
Learning Baselines
Attack
Anomaly Detection
Mitigation
Enforcement
Scrubbing center
Attack path Clean path
Traffic Diversion via
BGP Route Injection
Dynamic Protection
Policy Deployment
incl. Baselines and
attack characteristics
Protected Object 1
e.g. Data Center,
Organization,
Service etc…
Protected Object 2
Out-of-band
Internet
Service Provider Core
Flow Data Collection
Learning Baselines
Attack
Anomaly Detection
Mitigation
Enforcement
Protected Object 1
e.g. Data Center,
Organization,
Service etc…
Protected Object 2
Sending specific Route
advertisement via BGP
FlowSpec
Dynamic signature:
Dst IP: 1.1.1.1/32
Dst Port: 135
Protocol IP: 17 (UDP)
Discard
Dropped traffic for
Dst IP: 1.1.1.1/32
Dst Port: 135
Protocol IP: 17 (UDP)
BGP Flowspec
Customers
Multitenant DDoS protection for ISPs,
DCs, Cloud providers against volumetric
attacks
Fast detection - up to 1 min
SDN compatible
Affordable pricing
Comprehensive solution including NPMD,
NBA, APM and full packet capture
Summary
Flowmon DDoS Defender 3.0
Live demo – DDoS mitigation
Q&A
Flowmon Networks a.s.
U Vodárny 2965/2
616 00 Brno, Czech Republic
www.flowmon.com
Artur Kane
artur.kane@flowmon.com
+420 734 754 449

Más contenido relacionado

La actualidad más candente

Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBSDNRG ITB
 
Simplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationSimplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationCisco Enterprise Networks
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)SDNRG ITB
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinarpmohapat
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessNapier University
 
Realising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVRealising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVNapier University
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 

La actualidad más candente (20)

Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
Simplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationSimplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN Application
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
V P N
V P NV P N
V P N
 
Sdn nfv-day-2016
Sdn nfv-day-2016Sdn nfv-day-2016
Sdn nfv-day-2016
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile EraThe Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Corsa Giga Filter
Corsa Giga FilterCorsa Giga Filter
Corsa Giga Filter
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your business
 
Realising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVRealising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFV
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 

Destacado

PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PROIDEA
 
PLNOG 17 - Stefan Meinders - Slow is the new Down
PLNOG 17 - Stefan Meinders - Slow is the new DownPLNOG 17 - Stefan Meinders - Slow is the new Down
PLNOG 17 - Stefan Meinders - Slow is the new DownPROIDEA
 
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i Widoczność
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i WidocznośćPLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i Widoczność
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i WidocznośćPROIDEA
 
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PROIDEA
 
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...PROIDEA
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPROIDEA
 
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...PROIDEA
 
PLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXPPLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXPPROIDEA
 
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...PROIDEA
 
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...PROIDEA
 
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PROIDEA
 
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...PROIDEA
 
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDN
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDNPLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDN
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDNPROIDEA
 
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...PROIDEA
 
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWSPLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWSPROIDEA
 
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFX
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFXPLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFX
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFXPROIDEA
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
 
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PROIDEA
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PROIDEA
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PROIDEA
 

Destacado (20)

PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...
 
PLNOG 17 - Stefan Meinders - Slow is the new Down
PLNOG 17 - Stefan Meinders - Slow is the new DownPLNOG 17 - Stefan Meinders - Slow is the new Down
PLNOG 17 - Stefan Meinders - Slow is the new Down
 
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i Widoczność
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i WidocznośćPLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i Widoczność
PLNOG 17 - Alexis Dacquay - 100 G, Skalowalność i Widoczność
 
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
 
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
 
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...
 
PLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXPPLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXP
 
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...
PLNOG 17 - Piotr Jabłoński - Jak zwiększyć bezpieczeństwo w Data Center? Demo...
 
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...
PLNOG 17 - Dawid Królica, Piotr Szołkowski - ExtremeCloud czyli infrastruktur...
 
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?
 
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...
 
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDN
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDNPLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDN
PLNOG 17 - Dariusz Mazur - BGP z perespektywy Akamai CDN
 
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...
 
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWSPLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
 
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFX
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFXPLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFX
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFX
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
 
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...
 

Similar a PLNOG 17 - Artur Kane - DDoS? You shall not pass!

Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutionsNUVX
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Mustafa Kuğu
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPROIDEA
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PROIDEA
 

Similar a PLNOG 17 - Artur Kane - DDoS? You shall not pass! (20)

Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
 

Último

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

PLNOG 17 - Artur Kane - DDoS? You shall not pass!

  • 1. DDoS? You shall not pass! PLNOG 17 KRAKÓW, 26.09.2016 Artur Kane Technology Evangelist
  • 3. Our beginnings First 10GE monitoring board in academic environment 2004
  • 4. Functional prototype of HW accelerated multigigabit (4x1GE, 1x10GE) NetFlow probe Final recommendation – monitor EU networks by the Flowmon (NetFlow) probe 2005/6 Our beginnings
  • 5. 600+ customers on 5 continents 100+ employees, HQ in CZ Rapidly growing - organically Recognized/awarded by Gartner and Deloitte, technology partnership Technology leader in next generation network, security and application monitoring Who we are today
  • 6. Verticals ISP, banking/finance/utilities. From SMB to ENT and GOV customers 600+ customers in 30+ countries
  • 8. Next Generation Network Traffic & Performance Monitoring (NetFlow/IPFIX) • Provides visibility – “eyes” into the network traffic • Saves time and money for network administrators • Enables quick troubleshooting and ticket resolution • Delivers a substantial reduction in network implementation, operation and management costs Value proposition - visibility
  • 9. Next Generation Network Security - Behavior Analysis & Anomaly Detection • Detects and alerts on abnormal behaviors • Reports anomalies and advanced persistent threats • Detect intrusions and attacks not visible by standard signature based tools Paul E. Proctor, VP at Gartner: “NBA is about higher visibility in the behavior of your network to cover gaps left by signature based mechanism.” Value proposition - security
  • 10. Out of path Detection and Mitigation of volumetric DoS/DDoS attacks • Average cost of one minute downtime is $22.000 • Average downtime is 54 minutes per attack • Protect your business & customers satisfaction Value proposition – DDoS protection
  • 12. Network Traffic Monitoring Network Statistics Collection & Analysis Advanced Analysis of Network Statistics Flowmon Probes • Stand-alone passive sources of network statistics (NetFlow / IPFIX ) Flowmon Collector • Storing, visualization and analysis of network statistics Flowmon Modules • Anomaly detection, traffic capture, Application Performance Monitoring, DDoS attacks detection and mitigation The solution
  • 13. All-in-one package • data generation, collection, analytics, reporting, detection capabilities, troubleshooting on infrastructure, application, database level – as an all-in-one device Neat integration • use the whole potential of your past investments into network/security instruments Massive performance • first 100G NetFlow/IPFIX probes in the world, the most robust NetFlow collector Ultimate scalability • proven in deployments in organizations from 50 to 50 million users Transparent licensing • perpetual and subscription licensing per appliance, only limitations is a performance of the given device Smashing user-friendliness • agentless, non-intrusive, easy and quick deployment, intuitive, straight- forward GUI, great time-to-value Outstanding cost efficiency • best price/performance ration in the industry, low operational costs How are we better?
  • 15. Average cost of one minute downtime is $22.000 Average downtime is 54 minutes per attack Protect your business & customers satisfaction Facts about DDoS
  • 16. In-line detection and mitigation fits enterprises • Limited number of uplinks • L7 attacks coverage • Reasonable price/performance ratio ISP/telco/datacenter need out-of-path mitigation • Focus on covering volumetric attacks • To many uplinks and throughput Solution? Flow-based volumetric DDoS detection combined with out of path mitigation Protection strategies
  • 17. DDoS detection and mitigation • Focused on volumetric attacks • Uses flow data from any sources (routers, probes, …) • Predicts traffic volume using baseline/static methods • Provides attack characteristics and notifications Multi-tenant environment to protect various customers, network segments, services, etc. Universal deployment scenarios Flowmon DDoS Defender Standalone Out-of-band elimination of DDoS attack (PBR, BGP) Scrubbing Center DDoS Defender overview
  • 18. Uses various types of flow specification used for dynamic signature of the attack Provides specific action for traffic corresponding to the attack characteristics Flowmon DDoS Defender 3.0 supports following attributes to create dynamic signature: • Destination Prefix • Source Prefix • IP Protocol • Destination port • ICMP type • ICMP code BGP Flowspec
  • 19. Detection performed over protected segments • Segments defined by network subnets For each segment, a set of baselines is learned from monitored traffic. The attack is detected if the current traffic exceeds defined threshold. Baseline is learned for: • TCP traffic with specific flags • UDP traffic • ICMP traffic Attack detection
  • 20. Alerting • E-mail, Syslog, SNMP trap Routing diversion • PBR (Policy Based Routing) • BGP (Border Gateway Protocol), • BGP Flowspec • RTBH (Remotely-Triggered Black Hole) User-defined scripting Automatic mitigation • With out-of-band mitigation devices • With services of Scrubbing center Response to attack
  • 21. Internet Service Provider Core Flow Data Collection Learning Baselines Attack Anomaly Detection Mitigation Enforcement Scrubbing center Attack path Clean path Traffic Diversion via BGP Route Injection Dynamic Protection Policy Deployment incl. Baselines and attack characteristics Protected Object 1 e.g. Data Center, Organization, Service etc… Protected Object 2 Out-of-band
  • 22. Internet Service Provider Core Flow Data Collection Learning Baselines Attack Anomaly Detection Mitigation Enforcement Protected Object 1 e.g. Data Center, Organization, Service etc… Protected Object 2 Sending specific Route advertisement via BGP FlowSpec Dynamic signature: Dst IP: 1.1.1.1/32 Dst Port: 135 Protocol IP: 17 (UDP) Discard Dropped traffic for Dst IP: 1.1.1.1/32 Dst Port: 135 Protocol IP: 17 (UDP) BGP Flowspec
  • 24. Multitenant DDoS protection for ISPs, DCs, Cloud providers against volumetric attacks Fast detection - up to 1 min SDN compatible Affordable pricing Comprehensive solution including NPMD, NBA, APM and full packet capture Summary
  • 25. Flowmon DDoS Defender 3.0 Live demo – DDoS mitigation
  • 26.
  • 27.
  • 28. Q&A
  • 29. Flowmon Networks a.s. U Vodárny 2965/2 616 00 Brno, Czech Republic www.flowmon.com Artur Kane artur.kane@flowmon.com +420 734 754 449

Notas del editor

  1. Our target customers are organizations with more than 100 computers. We bring values for their IT security and network departments. We provide next generation traffic and performance monitoring based on NetFlow statistics for network engineers which enable them to get full traffic visibility, save time, work more effectively and save money on network operation.
  2. In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.
  3. In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.
  4. In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.