0% found this document useful (0 votes)
51 views11 pages

A Guide To Ddos Protection: Choosing The Right Model

The document discusses different models for DDoS protection, including on-premises solutions. On-premises protection maintains direct control over infrastructure but is vulnerable to large attacks overwhelming bandwidth capacity. Consideration of attack types and a comprehensive strategy are recommended to ensure service continuity during attacks.

Uploaded by

riya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views11 pages

A Guide To Ddos Protection: Choosing The Right Model

The document discusses different models for DDoS protection, including on-premises solutions. On-premises protection maintains direct control over infrastructure but is vulnerable to large attacks overwhelming bandwidth capacity. Consideration of attack types and a comprehensive strategy are recommended to ensure service continuity during attacks.

Uploaded by

riya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

HTTP CACHE BYPASS FLOOD

THINK APP SECURITY FIRST

CHOOSING THE RIGHT MODEL


A GUIDE TO DDoS PROTECTION

DNS AMPLIFICATION
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

INTRODUCTION RECENT DATA INDICATES THAT


BUSINESSES OF ALL SIZES IN
NEARLY EVERY INDUSTRY RUN
By thinking proactively about DDoS defense, organizations can build THE RISK OF A DDoS ATTACK.
a comprehensive strategy to mitigate attacks.

Until recently, security teams for organizations in many industries believed they didn’t need to worry about
DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that
businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly
compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally,
there are numerous DDoS tools and services that are easily accessible and easy to use, even for the
untechnical novice.

Modern denial-of-service attacks not only interrupt or bring down websites and applications, but also serve
to distract security operations teams from even larger threats. Attackers combine a variety of multi-vector
attacks—including volumetric floods, low-and-slow application-targeted techniques, and authentication-based
strategies—in hope of identifying weak spots in an organization’s defense.

Whether your organization has already been hit by a DDoS attack or you’ve witnessed a partner or another
organization struggle to mitigate one, planning is the key to survival. Building a DDoS-resistant architecture
can help your organization keep its critical applications available and mitigate network, application, and
volumetric attacks. With options such as on-premises protection, cloud-based scrubbing services, and hybrid
solutions, the question is not whether you should prepare for a DDoS attack, but which strategy best helps
your organization ensure service continuity and limit damage in the face of an attack.

1 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

2
DDoS IMPACTS ALL LAYERS OF THE
APPLICATION STACK

A BRIEF OVERVIEW OF APP SERVICES

DDoS ATTACKS TYPES


• HEAVY (RESOURCE-INTENSIVE) URL ATTACKS
• SLOWLORIS (LOW-AND-SLOW) ATTACKS
• GET FLOODS
• HTTP CACHE BYPASS FLOODS
Before considering which DDoS protection strategy makes the most sense for your organization, consider
the various types of DDoS attacks, which constantly change as attackers become more and more
sophisticated. It helps to picture the components that make up the threat surface of an application and ACCESS/IDENTITY
then match them to individual attack types. • ACCOUNT LOCKOUT FLOODS

While the type of attack(s) you experience will not solely determine which model is right for you, it’s
important to understand that a DDoS attack can take many forms. And remember that vast swarms of bots
(botnets) are most often the delivery mechanism for the attacks. Recognizing bot activity on a
per-component level makes it easier to recognize attacks, no matter the type. TLS/SSL
• SSL FLOODS
It’s possible, too, that an attacker might employ several of these attack types in concert, which means that • SSL RENEGOTIATION ATTACKS
• SSL PROTOCOL MISUSE
organizations must develop a comprehensive—and flexible—DDoS protection strategy.

On the following pages, we’ll explore your options, beginning with the standard on-premises solution.
DNS
• DNS AMPLIFICATION
• DNS REFLECTION
• DNS NXDOMAIN ATTACKS

NETWORK
• TCP SYN FLOODS
• UDP & ICMP FLOODS
• FIN/RST FLOODS
• NETWORK PROTOCOL ABUSE

3
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

MODEL OPTION 1:
ON-PREMISES DDoS PROTECTION

The value of an on-premises solution is clear for many the instant response of your security devices followed and mitigated in your data center close to the application.
organizations. By deploying point products in your by reporting on the details of the attack. Your in-house Furthermore, many organizations—especially large
data centers, you can maintain direct control over your IT team can architect custom solutions that scale financial institutions—are reluctant to share their private
infrastructure, allowing you to update, change, add, or independently of each other. In addition, low-level DDoS keys with outside vendors, such as a cloud-scrubbing
remove any piece of it at any time. You also reap the attacks such as Slowloris, as well as exploits that target DDoS service.
benefit of immediate mitigation of an attack through your applications, are much more efficiently identified

ON-PREMISES DDoS PROTECTION


Maintain direct control of DDoS mitigation by owned and
1 operated devices, but remain vulnerable to large attacks
HIGH-CAPACITY, DDoS that overwhelm bandwidth capacity.
PROTECTION DEVICE 2
WEB APPLICATION
FIREWALL

3
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION

• S UPPORTS MILLIONS OF • S TOPS HTTP FLOODS AND


SIMULTANEOUS CONNECTIONS TLS-BASED ATTACKS

• R EPELS FLOOD ATTACKS WHILE • TERMINATES TLS


ADMITTING LEGITIMATE TRAFFIC
• I DENTIFIES AND STOPS MALICIOUS
• AUTOMATICALLY BLOCKS LAYER 7 BOT TRAFFIC WITH
KNOWN BAD ACTORS (WITH IP BEHAVIORAL ANALYSIS
INTELLIGENCE INTEGRATION)
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

ON-PREMISES DDOS PROTECTION, CONT. IF YOUR ORGANIZATION GETS


TARGETED REPEATEDLY, YOU
WILL SAVE MONEY AND TIME
BY HAVING A FINE-TUNED
By keeping DDoS mitigation in house, you always which detracts from your security operations team’s
have optimal visibility and control over your ability to focus on other threats. Furthermore, some ON-PREMISES SOLUTION.
protection strategy. The bottom line is that if your of these individual solutions are not extensible and
organization gets targeted repeatedly, you will save provide value only when you are attacked, which
money and time by having an on-premises solution means that you’ve spent a large amount of money
that’s fine-tuned and ready to spring into action at for something you might use only once or twice (if
the first sign of an attack. you’re lucky).

Finally, not all on-premises solutions are designed

1 TBPS
to work with upstream cloud solutions—this is an
important point to consider as your organization’s
needs change. Having a vendor that can provide
seamless integration from on-premises defense

TODAY’S LARGE-SCALE DDOS ATTACKS
ARE to cloud scrubbing (when needed) helps you
EXCEEDING 1 TBPS IN TOTAL THROUGHPUT, streamline your network architecture, reduce time
WHICH EASILY OUTCLASSES ALL BUT THE
from attack detection to mitigation, and avoid
LARGEST ON-PREMISES ENTERPRISE DEFENSES.
manual steps that can introduce errors.

On-premises solutions do have some limitations.


For example, even the most robust on-premises
DDoS solution would be overwhelmed by the size
of some
of today’s large volumetric attacks. In
addition, while there are many point products on the
market, there are very few comprehensive DDoS
solutions, which means that organizations must
work with multiple vendors to develop a full-featured
solution. Managing several products from several
different vendors requires a lot of varying technical
knowledge and can be a time-consuming process,

5
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

MODEL OPTION 2:
CLOUD-BASED MANAGED SERVICES

For some organizations, employing a cloud-based addition, you may not have the technical staff to deploy a centralized solution, no matter how many clouds you
scrubbing service and web application firewall (WAF) to and manage an on-premises DDoS protection solution. use. Whether operating in multiple clouds, an in-house
outsource (or simply upgrade) your DDoS protection is data center, or a combination of both, a cloud-scrubbing
According to the F5 State of Application Delivery 2018
the best strategy. If you’re managing “born in the cloud” service ingests your traffic; directs it to massive, globally
report, 87% of companies surveyed operate applications
applications, you many not operate a traditional data center
in multiple clouds.² Cloud-based DDoS solutions offer 2 https://interact.f5.com/2018_SOAD.html
where on-premises security devices could be placed. In

CLOUD-BASED MANAGED SERVICES


All traffic flows through the cloud provider with 24x7
1
expert monitoring and mitigation.
CLOUD-SCRUBBING
SERVICE 2
CLOUD-BASED
MANAGED WAF

3
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION

• H IGH-VOLUME, CLOUD-BASED • S TOPS HTTP FLOODS AND


TRAFFIC SCRUBBING TLS-BASED ATTACKS

• R EAL-TIME VOLUMETRIC DDOS • I DENTIFIES AND STOPS MALICIOUS


ATTACK DETECTION AND LAYER 7 BOT TRAFFIC WITH
MITIGATION BEHAVIORAL ANALYSIS

• 24x7 EXPERT MONITORING • F LEXIBLE ACROSS HYBRID


AND SUPPORT ENVIRONMENTS

• 24x7 EXPERT MONITORING


AND SUPPORT
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

CLOUD-BASED MANAGED SERVICES, CONT.

dispersed scrubbing centers; blocks malicious traffic; your protection against application-level DDoS attacks. you are considering a cloud-scrubbing service, look for
and then delivers clean traffic to your on-premises or You’ll have a solution for the many variations of HTTP one that also offers a web application firewall option for
cloud data center(s). And for the attacks aimed at layer floods or heavy URL resource attacks, including complex application attacks so you can remove the chance of
7, application security experts provide continuously database queries that can quickly overwhelm your conflict between multiple vendors. Lastly, to effectively
updated WAF policies to ensure only legitimate traffic app. With the average salary of an application security protect an application with a managed WAF, your
reaches your application. engineer in the U.S. now up to $138,000 a year³, it’s provider will need to terminate TLS which will require
expensive to build a team that can be available during them to host your private key.
Cloud-based DDoS protection solves the problem that
nights, weekends, and holidays to fine-tune policies
no on-premises solution can: pipe-saturating DDoS
and stay on top of alerts. While this will round out your

33
events. Cloud-based DDoS protection services work

%
complete DDoS solution in the cloud, you’ll also get
to block attacks closest to the source of the attack,
many more benefits to your application security, such
ensuring that attack traffic never reaches your data
as defense against OWASP top 10 threats, credential
center(s) and application(s). In today’s world of massive
stuffing, and API protection just to name a few.
DDoS attacks generated from global IoT botnets, it
is imperative to block those attacks as close to the Managed cloud-based security services can often IN 2017, 33% OF ALL ORGANIZATIONS FACED AT LEAST
ONE DDoS ATTACK.⁴
origination point as possible. improve operational efficiency and decrease IT
overhead as they can be deployed in minutes. In
IF YOU’RE CONSIDERING A addition, the best services offer 24x7 attack support
from security experts, which can free your security
CLOUD-SCRUBBING SERVICE, team to focus on other issues. These services protect
LOOK FOR ONE THAT ALSO many customers, so the overall equipment cost is

OFFERS A WEB APPLICATION shared among a pool of customers. And because your
organization only pays for the services it uses, you often
FIREWALL OPTION. reap significant CapEx savings.

While the majority of the attacks seen today are However, if all your network traffic is being scrubbed—
volumetric attacks aimed at layers 3 and 4, the and you are bound by the terms of the service
application layer (layer 7), is seeing an increase in agreement you sign with the cloud-scrubbing service—
3 
https://www.glassdoor.com/Salaries/applications-security-engineer-
attacks. A cloud-based managed WAF can augment there’s less flexibility in customizing your solution. If salary-SRCH_KO0,30.htm
4 
https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-
attack-in-2017-double-that-of-2016/

7
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

MODEL OPTION 3
HYBRID DDoS PROTECTION STRATEGY
While both on-premises solutions and cloud-based loop between on-premises and cloud components, layer 3 and layer 4 attacks are mitigated at
the network
services offer protection from DDoS attacks, many which allows for fine-tuned mitigation as well as granular tier with robust firewalls and IP reputation database
organizations will want to consider the benefits of a hybrid reporting of attack details. integration. The application tier handles high-CPU
strategy that employs combined on-premises and cloud security functions such as SSL termination and web
Perhaps the strongest approach to hybrid DDoS
protection to stop all varieties of DDoS attacks. Once application firewall functionality. And a cloud-based tier
protection involves a multi-tiered architecture where
architected, a hybrid solution delivers a closed feedback protects against large volumetric attacks by filtering the

HYBRID DDoS PROTECTION


Retain control of mitigation timing and techniques, but
1 have on-demand help from a cloud provider for the
CLOUD-SCRUBBING large, bandwidth-consuming attacks.
SERVICE
2
ON-PREMISES DDOS
PROTECTION 3
WEB APPLICATION
FIREWALL

4
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION

• H IGH-VOLUME, CLOUD- • L AYER 3 AND 4 • S TOPS HTTP FLOODS AND


BASED TRAFFIC SCRUBBING PROTECTION TLS-BASED ATTACKS

• R EAL-TIME VOLUMETRIC • M ITIGATION OF LOW- • TERMINATES TLS


DDOS ATTACK DETECTION VOLUME ATTACKS
AND MITIGATION • I DENTIFIES AND STOPS
• IP REPUTATION DATABASE MALICIOUS LAYER 7 BOT TRAFFIC
• 24X7 EXPERT MONITORING WITH BEHAVIORAL ANALYSIS
AND SUPPORT
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

HYBRID DDOS PROTECTION STRATEGY, CONT.

traffic generated by the attacker while returning Completely outsourcing your DDoS protection
legitimate traffic to your data center. This true requirements to a cloud-based service
is the
hybrid solution delivers DDoS defense at all layers, simplest way to achieve a high degree of
protecting protocols (including those employing protection, while managing a hybrid solution does
SSL and TLS encryption) as well as stopping DDoS require some in-house technical resources. In
bursts, randomized HTTP floods, cache bypass, and addition, some businesses have spent considerable
other attacks that can disrupt application behavior. time and money architecting strong volumetric
solutions on-premises, which works well as long as
A hybrid approach to DDoS protection can also lead
your in-house devices aren’t overwhelmed by the
to cost savings and greater efficiency. Automatically
growing size of DDoS attacks. The last caveat about
shifting large attacks to the cloud requires fewer in-
a hybrid solution is that your organization may need
house technical resources, while boosting mitigation
to employ multiple incident managers to address
speed, which results in less downtime. There are
attacks on-premises and in the cloud.
also benefits to only engaging the cloud-scrubbing
service when you need it, instead of sending traffic
through it continuously. This “always-available”
architecture allows traffic to flow normally to your
data center(s), which reduces complexity, until
engagement of cloud-based protections is needed.
A true hybrid solution offers expedient cloud-
engagement to reroute traffic through the cloud-
scrubbing platforms. And, ideally, both parts of your A HYBRID APPROACH TO
hybrid solution can share a combined fabric that
controls whether attacks are handled on-premises
DDOS PROTECTION CAN ALSO
or in the cloud—thus enabling the optimal balance LEAD TO COST SAVINGS AND
for any given attack or series of attacks.
GREATER EFFICIENCY.

9
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

IS THERE AN IDEAL SOLUTION?


HAVING A SINGLE VENDOR
THAT PROVIDES CONSISTENT
PROTECTION SERVICES ACROSS In today’s climate of ever-evolving DDoS attacks, it’s increasingly
ALL MODELS CAN HELP MEET clear that every organization needs to consider and adopt a DDoS
YOUR NEEDS TODAY AND AS protection strategy.
THEY EVOLVE.
Integrated on-premises solutions offer tight control Whatever you decide, be proactive in your DDoS
and flexibility, but can be quickly overwhelmed defense. Ensure the continuity of your site and your
by a large volumetric attack. Managed cloud- services by putting your solution in place—before
based services deliver protection from those large you experience an attack.
attacks, but can be expensive if used for all traffic,
For more information about protecting your
all the time. By using a combination of on-premises
organization against DDoS attacks, visit
security devices and a cloud-based scrubbing
f5.com/security.
service to handle volumetric attacks, organizations
maintain control, while spinning up cloud-protection
services as needed to handle the largest volumetric
floods.

In choosing how to best protect your organization


from DDoS attacks, you should weigh the likelihood
of experiencing an attack against the ability of your
organization to effectively mitigate it. Having a
single vendor that provides consistent protection
services across all models to meet your needs today
and as they evolve can be a key advantage.

10
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION

THINK APP SECURITY FIRST

Always-on, always-connected apps can help power and transform your business–
but they can also act as gateways to data beyond the protections of your firewalls.
With most attacks happening at the app level, protecting the capabilities that drive
your business means protecting the apps that make them happen.

US Headquarters: 401 Elliott Ave W, Seattle, WA 98119 | 888-882-4447 // Americas: [email protected] // Asia-Pacific: [email protected] // Europe/Middle East/Africa: [email protected] // Japan: [email protected]
©2017 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of the irrespective owners with no endorsement or affiliation, expressed or implied, claimed by F5. EBOOK-SEC-197489895 | 2.18

You might also like