Visualizing Network Security Threats

19
Visualizing Network Security Threats Mohit Lad CEO, ThousandEyes

description

With applications moving to the cloud and networks becoming more distributed, network security is of critical business importance. From this presentation you will: • Gain an understanding of DDoS attacks and BGP routing • See visualizations of recent network attacks • Get tips to monitor your environment

Transcript of Visualizing Network Security Threats

Page 1: Visualizing Network Security Threats

Visualizing Network Security Threats

Mohit Lad CEO, ThousandEyes

Page 2: Visualizing Network Security Threats

2

Hijacker routes incoming or outgoing traffic to the

wrong network

Two Serious Network Security Threats

Attacker saturates network

links, hardware or servers to deny service

BGP Hijacks DDoS Attacks

Page 3: Visualizing Network Security Threats

BGP Attacks

Page 4: Visualizing Network Security Threats

4

A Primer on BGP Hijacks

AS 14340 Salesforce

AS 2914 NTT

AS 7018 AT&T

AS 3356 Level3

Border Router

Autonomous System

Salesforce advertises routes among BGP peers

to upstream ISPs

Salesforce.com advertises prefix 96.43.144.0/22

AT&T receives route advertisements to

Salesforce via Level3 and NTT

AS 4761 Indosat

Traffic Path

Page 5: Visualizing Network Security Threats

5

A Primer on BGP Hijacks

AS 14340 Salesforce

AS 2914 NTT

AS 7018 AT&T

AS 3356 Level3

AS 4761 Indosat

Indosat also advertises prefix 96.43.144.0/22, ‘hijacking’ Salesforce’s

routes

AT&T now directs Salesforce-destined traffic

to Indosat

Traffic Path

Page 6: Visualizing Network Security Threats

6

BGP Hijack: Normal Routes to PayPal

PayPal / Akamai prefix

Akamai Autonomous

System Comcast upstream

Page 7: Visualizing Network Security Threats

7

BGP Hijack: Routes Advertised from Indosat

PayPal / Akamai prefix

Correct Autonomous System

Hijacked Autonomous System

Locations with completely hijacked routes

Page 8: Visualizing Network Security Threats

8

BGP Hijack: PCCW Has No Routes to PayPal

PCCW Network only connected to Indosat

Not to Akamai / PayPal

Page 9: Visualizing Network Security Threats

9

BGP Hijack: Causing All Traffic to Drop

Traffic transiting PCCW has no routes

and terminates

Page 10: Visualizing Network Security Threats

DDoS Attacks

Page 11: Visualizing Network Security Threats

11

Why Monitor DDoS Attacks

Global Availability Mitigation Deployment

Mitigation Performance Vendor Collaboration

Page 12: Visualizing Network Security Threats

12

Network Topology of DDoS Attack and Mitigation

Chicago, IL

YourBank.com London

Tokyo

Atlanta

Portland, OR

Sydney On-premises appliance at network edge

Internet Enterprise

1

ISP filters traffic with a remote-triggered black hole 2

Cloud-based mitigation provider scrubs traffic 3

Scrubbing Center

Attackers flood your web service from around the world

Page 13: Visualizing Network Security Threats

13

DDoS Attack: Drop in Global Availability

Global availability issues

Problems at TCP connection and HTTP receive

phases

Availability dip to 0%

Page 14: Visualizing Network Security Threats

14

DDoS Attack: Increased Packet Loss and Latency

Loss, latency

and jitter

Loss during height of attack

Page 15: Visualizing Network Security Threats

15

DDoS Attack: Congested Nodes in Upstream ISPs

Nodes with >25% packet loss

Packet loss in upstream ISPs Verizon and

AT&T

HSBC bank website under

attack

High packet loss from all

testing points

Page 16: Visualizing Network Security Threats

16

DDoS Attack: Mitigation Effectiveness

Verisign DDoS mitigation networks in yellow

Page 17: Visualizing Network Security Threats

17

DDoS Attack: Mitigation Handoff Using BGP

New Autonomous System (VeriSign)

Prior Autonomous System (HSBC)

Withdrawn routes

New routes

HSBC prefix

Page 18: Visualizing Network Security Threats

18

•  Monitor critical external services –  ISPs, DNS providers

•  Proactively alert on network stress and faults –  Establish baselines and reduce alert fatigue

•  Record data for future forensics –  Preserve detailed outage and attack diagnostics

•  Establish a procedure to share data –  Trusted internal and vendor teams

Tips for Network Threat Monitoring

Page 19: Visualizing Network Security Threats

It’s time to see the entire picture. It’s time to see the entire picture.