A Guide To Ddos Protection: Choosing The Right Model
A Guide To Ddos Protection: Choosing The Right Model
DNS AMPLIFICATION
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
Until recently, security teams for organizations in many industries believed they didn’t need to worry about
DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that
businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly
compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally,
there are numerous DDoS tools and services that are easily accessible and easy to use, even for the
untechnical novice.
Modern denial-of-service attacks not only interrupt or bring down websites and applications, but also serve
to distract security operations teams from even larger threats. Attackers combine a variety of multi-vector
attacks—including volumetric floods, low-and-slow application-targeted techniques, and authentication-based
strategies—in hope of identifying weak spots in an organization’s defense.
Whether your organization has already been hit by a DDoS attack or you’ve witnessed a partner or another
organization struggle to mitigate one, planning is the key to survival. Building a DDoS-resistant architecture
can help your organization keep its critical applications available and mitigate network, application, and
volumetric attacks. With options such as on-premises protection, cloud-based scrubbing services, and hybrid
solutions, the question is not whether you should prepare for a DDoS attack, but which strategy best helps
your organization ensure service continuity and limit damage in the face of an attack.
1 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
2
DDoS IMPACTS ALL LAYERS OF THE
APPLICATION STACK
While the type of attack(s) you experience will not solely determine which model is right for you, it’s
important to understand that a DDoS attack can take many forms. And remember that vast swarms of bots
(botnets) are most often the delivery mechanism for the attacks. Recognizing bot activity on a
per-component level makes it easier to recognize attacks, no matter the type. TLS/SSL
• SSL FLOODS
It’s possible, too, that an attacker might employ several of these attack types in concert, which means that • SSL RENEGOTIATION ATTACKS
• SSL PROTOCOL MISUSE
organizations must develop a comprehensive—and flexible—DDoS protection strategy.
On the following pages, we’ll explore your options, beginning with the standard on-premises solution.
DNS
• DNS AMPLIFICATION
• DNS REFLECTION
• DNS NXDOMAIN ATTACKS
NETWORK
• TCP SYN FLOODS
• UDP & ICMP FLOODS
• FIN/RST FLOODS
• NETWORK PROTOCOL ABUSE
3
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
MODEL OPTION 1:
ON-PREMISES DDoS PROTECTION
The value of an on-premises solution is clear for many the instant response of your security devices followed and mitigated in your data center close to the application.
organizations. By deploying point products in your by reporting on the details of the attack. Your in-house Furthermore, many organizations—especially large
data centers, you can maintain direct control over your IT team can architect custom solutions that scale financial institutions—are reluctant to share their private
infrastructure, allowing you to update, change, add, or independently of each other. In addition, low-level DDoS keys with outside vendors, such as a cloud-scrubbing
remove any piece of it at any time. You also reap the attacks such as Slowloris, as well as exploits that target DDoS service.
benefit of immediate mitigation of an attack through your applications, are much more efficiently identified
3
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION
1 TBPS
to work with upstream cloud solutions—this is an
important point to consider as your organization’s
needs change. Having a vendor that can provide
seamless integration from on-premises defense
TODAY’S LARGE-SCALE DDOS ATTACKS
ARE to cloud scrubbing (when needed) helps you
EXCEEDING 1 TBPS IN TOTAL THROUGHPUT, streamline your network architecture, reduce time
WHICH EASILY OUTCLASSES ALL BUT THE
from attack detection to mitigation, and avoid
LARGEST ON-PREMISES ENTERPRISE DEFENSES.
manual steps that can introduce errors.
5
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
MODEL OPTION 2:
CLOUD-BASED MANAGED SERVICES
For some organizations, employing a cloud-based addition, you may not have the technical staff to deploy a centralized solution, no matter how many clouds you
scrubbing service and web application firewall (WAF) to and manage an on-premises DDoS protection solution. use. Whether operating in multiple clouds, an in-house
outsource (or simply upgrade) your DDoS protection is data center, or a combination of both, a cloud-scrubbing
According to the F5 State of Application Delivery 2018
the best strategy. If you’re managing “born in the cloud” service ingests your traffic; directs it to massive, globally
report, 87% of companies surveyed operate applications
applications, you many not operate a traditional data center
in multiple clouds.² Cloud-based DDoS solutions offer 2 https://interact.f5.com/2018_SOAD.html
where on-premises security devices could be placed. In
3
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION
dispersed scrubbing centers; blocks malicious traffic; your protection against application-level DDoS attacks. you are considering a cloud-scrubbing service, look for
and then delivers clean traffic to your on-premises or You’ll have a solution for the many variations of HTTP one that also offers a web application firewall option for
cloud data center(s). And for the attacks aimed at layer floods or heavy URL resource attacks, including complex application attacks so you can remove the chance of
7, application security experts provide continuously database queries that can quickly overwhelm your conflict between multiple vendors. Lastly, to effectively
updated WAF policies to ensure only legitimate traffic app. With the average salary of an application security protect an application with a managed WAF, your
reaches your application. engineer in the U.S. now up to $138,000 a year³, it’s provider will need to terminate TLS which will require
expensive to build a team that can be available during them to host your private key.
Cloud-based DDoS protection solves the problem that
nights, weekends, and holidays to fine-tune policies
no on-premises solution can: pipe-saturating DDoS
and stay on top of alerts. While this will round out your
33
events. Cloud-based DDoS protection services work
%
complete DDoS solution in the cloud, you’ll also get
to block attacks closest to the source of the attack,
many more benefits to your application security, such
ensuring that attack traffic never reaches your data
as defense against OWASP top 10 threats, credential
center(s) and application(s). In today’s world of massive
stuffing, and API protection just to name a few.
DDoS attacks generated from global IoT botnets, it
is imperative to block those attacks as close to the Managed cloud-based security services can often IN 2017, 33% OF ALL ORGANIZATIONS FACED AT LEAST
ONE DDoS ATTACK.⁴
origination point as possible. improve operational efficiency and decrease IT
overhead as they can be deployed in minutes. In
IF YOU’RE CONSIDERING A addition, the best services offer 24x7 attack support
from security experts, which can free your security
CLOUD-SCRUBBING SERVICE, team to focus on other issues. These services protect
LOOK FOR ONE THAT ALSO many customers, so the overall equipment cost is
OFFERS A WEB APPLICATION shared among a pool of customers. And because your
organization only pays for the services it uses, you often
FIREWALL OPTION. reap significant CapEx savings.
While the majority of the attacks seen today are However, if all your network traffic is being scrubbed—
volumetric attacks aimed at layers 3 and 4, the and you are bound by the terms of the service
application layer (layer 7), is seeing an increase in agreement you sign with the cloud-scrubbing service—
3
https://www.glassdoor.com/Salaries/applications-security-engineer-
attacks. A cloud-based managed WAF can augment there’s less flexibility in customizing your solution. If salary-SRCH_KO0,30.htm
4
https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-
attack-in-2017-double-that-of-2016/
7
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
MODEL OPTION 3
HYBRID DDoS PROTECTION STRATEGY
While both on-premises solutions and cloud-based loop between on-premises and cloud components, layer 3 and layer 4 attacks are mitigated at
the network
services offer protection from DDoS attacks, many which allows for fine-tuned mitigation as well as granular tier with robust firewalls and IP reputation database
organizations will want to consider the benefits of a hybrid reporting of attack details. integration. The application tier handles high-CPU
strategy that employs combined on-premises and cloud security functions such as SSL termination and web
Perhaps the strongest approach to hybrid DDoS
protection to stop all varieties of DDoS attacks. Once application firewall functionality. And a cloud-based tier
protection involves a multi-tiered architecture where
architected, a hybrid solution delivers a closed feedback protects against large volumetric attacks by filtering the
4
ONLY THE CLEAN TRAFFIC
IS ROUTED BACK TO THE
APPLICATION
traffic generated by the attacker while returning Completely outsourcing your DDoS protection
legitimate traffic to your data center. This true requirements to a cloud-based service
is the
hybrid solution delivers DDoS defense at all layers, simplest way to achieve a high degree of
protecting protocols (including those employing protection, while managing a hybrid solution does
SSL and TLS encryption) as well as stopping DDoS require some in-house technical resources. In
bursts, randomized HTTP floods, cache bypass, and addition, some businesses have spent considerable
other attacks that can disrupt application behavior. time and money architecting strong volumetric
solutions on-premises, which works well as long as
A hybrid approach to DDoS protection can also lead
your in-house devices aren’t overwhelmed by the
to cost savings and greater efficiency. Automatically
growing size of DDoS attacks. The last caveat about
shifting large attacks to the cloud requires fewer in-
a hybrid solution is that your organization may need
house technical resources, while boosting mitigation
to employ multiple incident managers to address
speed, which results in less downtime. There are
attacks on-premises and in the cloud.
also benefits to only engaging the cloud-scrubbing
service when you need it, instead of sending traffic
through it continuously. This “always-available”
architecture allows traffic to flow normally to your
data center(s), which reduces complexity, until
engagement of cloud-based protections is needed.
A true hybrid solution offers expedient cloud-
engagement to reroute traffic through the cloud-
scrubbing platforms. And, ideally, both parts of your A HYBRID APPROACH TO
hybrid solution can share a combined fabric that
controls whether attacks are handled on-premises
DDOS PROTECTION CAN ALSO
or in the cloud—thus enabling the optimal balance LEAD TO COST SAVINGS AND
for any given attack or series of attacks.
GREATER EFFICIENCY.
9
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
10
CHOOSING THE RIGHT MODEL: A GUIDE TO DDoS PROTECTION
Always-on, always-connected apps can help power and transform your business–
but they can also act as gateways to data beyond the protections of your firewalls.
With most attacks happening at the app level, protecting the capabilities that drive
your business means protecting the apps that make them happen.
US Headquarters: 401 Elliott Ave W, Seattle, WA 98119 | 888-882-4447 // Americas: [email protected] // Asia-Pacific: [email protected] // Europe/Middle East/Africa: [email protected] // Japan: [email protected]
©2017 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of the irrespective owners with no endorsement or affiliation, expressed or implied, claimed by F5. EBOOK-SEC-197489895 | 2.18