SlideShare a Scribd company logo
1 of 62
Surviving a DDoS Attack:
Securing CDN traffic at CloudFlare
Martin J. Levy, Network Strategy
CloudFlare, Inc.
MSK-IX Moscow Russia
December 4, 2014
24 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DDoS Attacks are
becoming massive,
and easier to initiate
Today:
34 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Major Attacks against
CloudFlare Customers
Mar 2013
309
Gbps
Feb 2014
400
Gbps
Feb 2012
65 Gbps
Next?
???
Gbps
44 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare
54 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare network locations
• Global: Deployed into 28 data centers in 20 countries
• Secure: Built into every layer and every protocol
• Robust: Every node can perform any task. Anycast HTTP routing
• Reliable: Built-in redundancy, load balancing, and high-availability
64 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare works at the network level
74 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare works globally
84 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare sample customers
Nearly two million websites
94 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Chronology
of the major attacks
104 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
March 2013
114 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Spamhaus attack
124 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Monday, March 18th thru 21st
“Annoyance” attacks, 10-80Gbps
134 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Wednesday, March 20th
~75Gbps attack
“Instant on”
144 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Then, it got real …
154 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Sunday, March 24th thru 25th
Peaks of the attack reached 309Gbps
“Instant on”
164 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
February 2014
174 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Monday, February 10th, 2014
400Gbps, Globally Distributed Attacks
184 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
194 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Evolving Landscape
204 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
The Evolving Landscape of DDoS Attacks
DNS amplification
Up to 300 Gbps
NTP reflection
Up to 400+ Gbps
(35% up from DNS amplification)
DNS infrastructure
100s Gbps
HTTP Application
100s Gbps
Sophistication
ATTACK TYPE TREND
• Volumetric Layer 3 / 4
• DNS Infrastructure
• HTTPS application
• Origin: 100s of countries
More sophisticated DDoS mitigation and larger surface area to
block volumetric attacks has forced hackers to change tactics.
New DNS infrastructure and HTTP layer 7 attack signatures that
mimic human-like behavior are increasing in frequency.
20142013
214 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Layer 7 Attacks
224 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Layer 7 Attack methodology
Exhausts CPU
Attackers use millions of
compromised machines to launch
a sophisticated attack that mimics
real users and overloads the slow
points in your web property.
A highly advanced attack that
mimics real users is detected and
blocked by CloudFlare before it
can overload the slow parts of
web server software.
234 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DNS Infrastructure Attacks
Layer 7 – Malicious Payload
• Request sent to exploit vulnerability on server
• WAF on CloudFlare blocks 1.2 billion request per day
• Shellshock
• 10 to 15 attacks per second during the first week
• Top countries: France (80%), US (7%), Netherlands (7%)
244 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
254 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Breaking Down the Attacks
264 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
DDoS mechanics
274 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
IP Spoofing
Attacker
Network Device
1.2.3.4
Hi, I’m 1.2.3.4,
and I need some info
Here’s your info
213.4.99.70
Target Website
284 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
IP Spoofing
http://spoofer.cmand.org/
25.5% of networks allow spoofing
294 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Attack #1 – Spamhaus Attack:
309Gbps
UDP DNS
304 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Getting to 309Gbps
10 Mbps 30,900X 309,000 Mbps=
314 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
An easier way: DNS
Amplification
Attacker
Open DNS Resolver
Target Website
64 Bytes
3,363 Bytes
~50x
324 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
How easy is it to
create a DNS query packet?
334 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
64 bytes becomes 3,363 bytes
$ dig ANY isc.org @63.21*.**.** +edns=0 +notcp +bufsize=4096
64 byte query
Sorryforthesmallprint
;; ANSWER SECTION:
isc.org. 7147 IN SOA ns-int.isc.org. hostmaster.isc.org. 2013073000 7200 3600 24796800 3600
isc.org. 7147 IN NS ns.isc.afilias-nst.info.
isc.org. 7147 IN NS ord.sns-pb.isc.org.
isc.org. 7147 IN NS ams.sns-pb.isc.org.
isc.org. 7147 IN NS sfba.sns-pb.isc.org.
isc.org. 7 IN A 149.20.64.69
isc.org. 7147 IN MX 10 mx.pao1.isc.org.
isc.org. 7147 IN TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all"
isc.org. 7147 IN TXT "$Id: isc.org,v 1.1835 2013-07-24 00:15:22 dmahoney Exp $"
isc.org. 7 IN AAAA 2001:4f8:0:2::69
isc.org. 7147 IN NAPTR 20 0 "S" "SIP+D2U" "" _sip._udp.isc.org.
isc.org. 3547 IN NSEC _adsp._domainkey.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF
isc.org. 7147 IN DNSKEY 256 3 5 BQEAAAABwuHz9Cem0BJ0JQTO7C/a3McR6hMaufljs1dfG/inaJpYv7vH XTrAOm/MeKp+/x6eT4QLru0KoZkvZJnqTI8JyaFTw2OM/ItBfh/hL2lm Cft2O7n3MfeqYtvjPnY7dWghYW4sVfH7VVEGm958o9nfi79532Qeklxh x8pXWdeAaRU=
isc.org. 7147 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGr hhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+ u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz
Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bB yBNsO70aEFTd
isc.org. 7147 IN SPF "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all"
isc.org. 7147 IN RRSIG SPF 5 2 7200 20130828233259 20130729233259 50012 isc.org. XDoOYzkTHEV1W1V4TT50SsqXn4cxNhPvEuz3iFjq/oskLY9UOaK4GYDO GqHAjwNT0B6pUakKTQ3GvBjUBufPcEauCOl7L7kb8/cC6zYifUCoW0pS moiQxmyqfrPDTzyVA894myUONGgMmB6QW68HGPVvc6HzGWx9bOmjvFyX uOs=
isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 12892 isc.org. COfF8fU6a8TBUG97SI/X+u2eKv7/mw+ixD3IWBnr3d3cWZmzF1sV8bWT YbuJebwnJMgN5OfB9PLsN+4QT617OjBe1dUF2M9jZeBiWsSsvvrdHnHM P8KwX6eayByDUoFsYe9VAH6C94XmOVXTQ7h7Cr0ytaVSXUytqFZV+DGn
v3kqSi50V3YkFNPAJDqqs0treWjwV/SPlqWVqEAoU/KMZMtYpCEMbHVP 8nbRP3jj/10WLccPtjHhiw4Ka9Sk4o+b7BMYCgXGXlhaap21SUqkytHt 8RJdVxxd5Cj7Bi+O4LXODlS4bAZEDG7UoHR27MzXtvMZogsNyyNUKHSs FtUvBg==
isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 50012 isc.org. Mbr/QqJPoIuf3K5jCuABUIG0/zSHQ8iWZpqvHx7olVBEmTxhi3/vW+IE DW6VCE1EpZclSIlMMRZUnbBnVSpe0rZ13BxoLlRQqvsbC3jD15Se41WB DscD0S63C0GLqI9IhSyVugtlpqhA3CaluSqtABHbAktPP05Rm00tST2Y A5Q=
isc.org. 3547 IN RRSIG NSEC 5 2 3600 20130828233259 20130729233259 50012 isc.org. V7G42xY7TY9wF1vsBlRFuJ2ror/QjftLoRrDCMfqFW6kb5ZswjKt5zho 4o2sIrylTqad68O+lMxrDcg+7c2D8Hdh84SC0DEkjunBXkGBtLtaJvO5 zMn+d/OgUY5O7wtkerybJwZeiHcFxIkMRIcvsPKJYZWKCdaaCWibne7c w1s=
isc.org. 7147 IN RRSIG NAPTR 5 2 7200 20130828233259 20130729233259 50012 isc.org. gWDvD0KACaYgsCgtRS4iKkHBBidfJfqS4drUf4kuPX2Etl9fj1YrqOQK QFB5kBrzJLKh1IF4YpV+KYVUF82l3AtpsohpUH5Uyc3yD3r1CUDVyVvc T9qUrIuRpZLInD2kBLmDaG76MRz4Fz+NAkdXmwxZJhgTrfMLy+Uw/Ktk H7w=
isc.org. 7 IN RRSIG AAAA 5 2 60 20130828233259 20130729233259 50012 isc.org. dfzIo0VGT0MptTaPoua3tFwDxSpeuOg127QedlqLGTxKGN1ppV/bd6R0 WktMagZY9rSqmjfXNPlF3Q+7YeTpMssQhHqjE/tDoj9q9r8RXuBLJ1+a VRq3+xMbxb5EXAyQVZw24LIuloqNprXePRUGCXNINSWd7VZEIDNqhu9C g7U=
isc.org. 7147 IN RRSIG TXT 5 2 7200 20130828233259 20130729233259 50012 isc.org. WtB3SYzcOKpNbOtBlnmtsI0DCbDB4Kiv/HBY24PTZyWF/3tI8l+wZ+/p MfJ/SblbAzT67DO5RfxlOhr8UlRKVa70oqinQp5+rqiS67lv1hGO6ArO k+J0jLTis9Uz32653dgAxlgjEdWDKAg4F12TaHirAXxyI8fos5WNl/h4 GLo=
isc.org. 7147 IN RRSIG MX 5 2 7200 20130828233259 20130729233259 50012 isc.org. BSXC42oV6MCF0dX2icyxnvyijhy569BJCoanm5VrIIuiNeTeo261FQJx 7ofFCWa4fKOoa+EZ0qloNPfDiczStr8MmK8Lznu6+8IRfdmcG/kURuSi JdvDa0swxjmCm9aYu2nhoyHs+jqbJ+9+fneI0iDUX1fiM+9G2K9BjLru NxU=
isc.org. 7 IN RRSIG A 5 2 60 20130828233259 20130729233259 50012 isc.org. Gmb8tt8d7kxx4HsA8L6IdFYGGSJCA8PTWexUP3CBLna39e4a6gVzjoNd dEI7B5mySAujZBEXNx3dSagpjiTJYfMML8AY0uO0tgyjqaTyzwPPV5lW xQKVC092BPJx9IeKw+DC57f3m9LOaHJlMIh7wYFn8jxqeg1lSwJN0e35 Qvc=
isc.org. 7147 IN RRSIG NS 5 2 7200 20130828233259 20130729233259 50012 isc.org. RBvXLeTH0726iKvElmBZYUE+AWG3s2YRxKxuCnrhg7o9qIQGKXvEXrb3 wJeC/74KY2FW+RRz4F0QxODnPm+frpWIPbCpRf0SUFDQ82opQDwAb2CM 0D9N95y1t9hYfSeHEsEEk2yWgLymd9/S24XCmwuVVZ7ZeYQmVEVkF7Jt V3A=
isc.org. 7147 IN RRSIG SOA 5 2 7200 20130828233259 20130729233259 50012 isc.org. iiDnH6tvmap0h2cdULI8Ihme+zbtQ2+D3ycKRqBc9TRfA0poNaaZ97aF 15EIKyIpjiVybkP2DNLm5nkpNsgA+Ur+YQ6pr0hZKzbDkBllBIW4C0LV DsjzPX3qLPH4G3x/20M+TeGe4uzPB5ImPuw0VxB8g8ZP5znvdiZG6qen jas=
;; AUTHORITY SECTION:
isc.org. 7147 IN NS ns.isc.afilias-nst.info.
isc.org. 7147 IN NS ord.sns-pb.isc.org.
isc.org. 7147 IN NS ams.sns-pb.isc.org.
isc.org. 7147 IN NS sfba.sns-pb.isc.org.
;; ADDITIONAL SECTION:
ns.isc.afilias-nst.info. 56648 IN A 199.254.63.254
ns.isc.afilias-nst.info. 56652 IN AAAA 2001:500:2c::254
ord.sns-pb.isc.org. 31018 IN AAAA 2001:500:71::30
ord.sns-pb.isc.org. 31018 IN A 199.6.0.30
ams.sns-pb.isc.org. 31018 IN AAAA 2001:500:60::30
ams.sns-pb.isc.org. 31018 IN A 199.6.1.30
sfba.sns-pb.isc.org. 31018 IN AAAA 2001:4f8:0:2::19
sfba.sns-pb.isc.org. 31018 IN A 149.20.64.3
mx.pao1.isc.org. 3547 IN AAAA 2001:4f8:0:2::2b
mx.pao1.isc.org. 3547 IN A 149.20.64.53
_sip._udp.isc.org. 7147 IN SRV 0 1 5060 asterisk.isc.org.
3,363 byte response
344 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
300Gbps+ of DDoS attack traffic
1 laptop
+ 5-7 compromised servers
+ 3 networks which allow spoofing
+ 9Gbps of DNS requests to
+ 0.1% of all open resolvers
----------------------------------------
= 300Gbps of DDoS traffic
354 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Attack #2 – The NTP Attack:
400Gbps
UDP NTP
364 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Tweets report attack issues
374 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
An EVEN easier way: NTP
Amplification
Attacker
NTP Server with
MONLIST
Target Website
64 Bytes
13,184 Bytes
~206x
1 laptop
+ 1 compromised server
+ 1 network which allowed spoofing
+ 1.94Gbps of MONLIST to
----------------------------------------------------
= 400Gbps+ of DDoS attack traffic
384 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
400Gbps+ of DDoS attack traffic
394 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
What’s Next?
~206x
650x
~50x
8xDNS
EDNS
NTP
SNMP
→
→
→
→
404 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Something extra …
Largest Attack in History
• Hong Kong
• Peaked at ~500Gbps
• 7 days
• Reflection attack (DNS, NTP)
• DNS flood - 250 million DNS
requests per second
• HTTP(S) attack
414 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
424 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Protecting your network
434 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
28 Million Open DNS Resolvers
http://OpenResolverProject.org/
Lock your DNS server (recursive & authoritative) down
444 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
28 Million Open DNS Resolvers
http://team-cymru.org/
Confirm that the resolver is a closed resolver
options {
recursion no;
additional-from-cache no;
};
UNIX bind configuration examples
acl "trusted" {
10.42.0.0/16;
192.0.2.0/24;
192.0.6.0/24;
};
options {
recursion no;
additional-from-cache no;
allow-query { none; };
};
view "trusted" in {
match-clients { trusted; };
allow-query { trusted; };
recursion yes;
additional-from-cache yes;
};
454 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
http://OpenNTPProject.org/
Turn off MONLIST on your NTP servers
464 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
474 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
NTP Amplification Attacks
http://team-cymru.org/
“noquery” is required to disable MONLIST
# by default act only as a basic NTP client
restrict -4 default nomodify nopeer noquery notrap
restrict -6 default nomodify nopeer noquery notrap
# allow NTP messages from the loopback address, useful for debugging
restrict 127.0.0.1
restrict -6 ::1
# server(s) we time sync to
server 192.0.2.1
server 2001:db8::1
server time.example.net
UNIX ntpd configuration example
484 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Prevent IP Spoofing (network hygiene)
• BCP38 / RFC2827 (ingress filtering) – May, 2000:
• http://bcp38.info/
• http://www.ietf.org/rfc/bcp/bcp38.txt
• http://www.ietf.org/rfc/rfc2827.txt
• BCP84 / RFC3704 (for multihomed) – March, 2004:
• http://www.ietf.org/rfc/bcp/bcp84.txt
• http://www.ietf.org/rfc/rfc3704.txt
… and yet still an issue today!
494 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Securing CDN traffic at
CloudFlare
504 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare security
514 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
CloudFlare – a global network
Attack traffic is global and hence a global edge is valuable
524 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Anycast Dilutes Attacks
300Gbps of attack traffic
/ 28 locations
----------------------------------------------------
= ~10.7Gbps average per location
Reality is that some locations are much larger
than others. However every location is vital.
534 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Anycast Dilutes Attacks
544 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Solution: Hide Origin IPs
• Use separate IPs for HTTP, DNS, SMTP, etc
• Public DNS should route to your EDGE’s public IPs
• Keep actual/origin web device IPs protected
554 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Filter traffic by IP and protocol
• No UDP packets should be able to hit your HTTP
server
• UDP is IP protocol 17 vs. TCP for HTTP is IP protocol 6
• No HTTP packets should be able to hit your SMTP
server
• HTTP is TCP port 80 & 443 vs. SMTP is port 25 & 587
564 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Filter traffic by IP and protocol
http://team-cymru.org/
Allow only HTTP& HTTPS via TCP protocol to a specific IP
!
hostname router-www
!
interface ethernet0
ip access-group 102 in
!
access-list 102 permit tcp any host 10.0.0.100 eq 80
access-list 102 permit tcp any host 10.0.0.100 eq 443
access-list 102 deny all
!
Simple Cisco filter configuration example
574 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Protect your infrastructure
• Internal switches, routers, and other devices should be
locked down from any external access
• All traffic should flow through EDGE devices which
handle attacks
• CloudFlare Web Application Firewall (WAF) service
584 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Build relationships upstream
• Understand what your data center and bandwidth
providers do about DDoS
• Know who to call when trouble strikes
• Share your IP/Protocol architecture with them
594 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Communicate about attacks
604 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Summary
614 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Summary
• Volumetric DDoS evolving (NTP came and went)
• Larger botnets / Cloud services user in botnets
• DNS flood on the rise / Application-level on the rise
• Politically motivated attacks
• First, make sure you’re not part of the problem …
• Second, practice good protocol hygiene …
• Third, implement infrastructure ACLs …
• Fourth, know your upstreams
624 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
Questions?
Martin J. Levy, Network Strategy
@mahtin
@cloudflare
http://www.cloudflare.com/
AS13335

More Related Content

What's hot

Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to AnsibleKnoldus Inc.
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Google Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneGoogle Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneIdan Tohami
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container securityJohn Kinsella
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices SecurityAditi Anand
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
DNSSEC Validation Tutorial
DNSSEC Validation TutorialDNSSEC Validation Tutorial
DNSSEC Validation TutorialAPNIC
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standardarnaudlh
 
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless OverviewOpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless OverviewMaría Angélica Bracho
 
Kubernetes Architecture
 Kubernetes Architecture Kubernetes Architecture
Kubernetes ArchitectureKnoldus Inc.
 

What's hot (20)

Introduction to Ansible
Introduction to AnsibleIntroduction to Ansible
Introduction to Ansible
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Google Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneGoogle Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZone
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
Introducing Vault
Introducing VaultIntroducing Vault
Introducing Vault
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices Security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Terraform
TerraformTerraform
Terraform
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Red Team P1.pdf
Red Team P1.pdfRed Team P1.pdf
Red Team P1.pdf
 
DNSSEC Validation Tutorial
DNSSEC Validation TutorialDNSSEC Validation Tutorial
DNSSEC Validation Tutorial
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
 
Terraform
TerraformTerraform
Terraform
 
Terraform on Azure
Terraform on AzureTerraform on Azure
Terraform on Azure
 
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless OverviewOpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
 
Ansible
AnsibleAnsible
Ansible
 
Kubernetes Architecture
 Kubernetes Architecture Kubernetes Architecture
Kubernetes Architecture
 

Viewers also liked

Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSRunning a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSCloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksCloudflare
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youCloudflare
 
Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Cloudflare
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityZero Science Lab
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Cloudflare
 
Running Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without ParachuteRunning Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without ParachuteCloudflare
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Cloudflare
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 PolandCloudflare
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudflare
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012Cloudflare
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Cloudflare
 

Viewers also liked (19)

Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSRunning a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for you
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
 
Running Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without ParachuteRunning Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware Without Parachute
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014
 
Go Containers
Go ContainersGo Containers
Go Containers
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
 
SortaSQL
SortaSQLSortaSQL
SortaSQL
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
 

Similar to Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Ruo Ando
 
LF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft AzureLF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft AzureLF_DPDK
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17Tom Arnfeld
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldSam Pickles
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and RiskSukbum Hong
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...Cohesive Networks
 
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-broDefcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-broPriyanka Aash
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxFernando564134
 
SANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation TimelineSANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation Timelinegiacomo83m
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Krunal Jain
 
Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Shawn Ismail
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS SecurityThousandEyes
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Corley S.r.l.
 

Similar to Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare (20)

Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
 
LF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft AzureLF_DPDK17_DPDK on Microsoft Azure
LF_DPDK17_DPDK on Microsoft Azure
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17How Cloudflare analyzes -1m dns queries per second @ Percona E17
How Cloudflare analyzes -1m dns queries per second @ Percona E17
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShield
 
What's New in Docker 1.12?
What's New in Docker 1.12?What's New in Docker 1.12?
What's New in Docker 1.12?
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-broDefcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
 
SANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation TimelineSANS Holiday Hack 2013 – Investigation Timeline
SANS Holiday Hack 2013 – Investigation Timeline
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)Introduction to OpenStack (Juno)
Introduction to OpenStack (Juno)
 
Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)Azure Network Security Groups (NSG)
Azure Network Security Groups (NSG)
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...
 

More from Cloudflare

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceCloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarCloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 

More from Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Recently uploaded

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

  • 1. Surviving a DDoS Attack: Securing CDN traffic at CloudFlare Martin J. Levy, Network Strategy CloudFlare, Inc. MSK-IX Moscow Russia December 4, 2014
  • 2. 24 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DDoS Attacks are becoming massive, and easier to initiate Today:
  • 3. 34 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Major Attacks against CloudFlare Customers Mar 2013 309 Gbps Feb 2014 400 Gbps Feb 2012 65 Gbps Next? ??? Gbps
  • 4. 44 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare
  • 5. 54 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare network locations • Global: Deployed into 28 data centers in 20 countries • Secure: Built into every layer and every protocol • Robust: Every node can perform any task. Anycast HTTP routing • Reliable: Built-in redundancy, load balancing, and high-availability
  • 6. 64 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare works at the network level
  • 7. 74 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare works globally
  • 8. 84 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare sample customers Nearly two million websites
  • 9. 94 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Chronology of the major attacks
  • 10. 104 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare March 2013
  • 11. 114 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Spamhaus attack
  • 12. 124 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Monday, March 18th thru 21st “Annoyance” attacks, 10-80Gbps
  • 13. 134 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Wednesday, March 20th ~75Gbps attack “Instant on”
  • 14. 144 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Then, it got real …
  • 15. 154 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Sunday, March 24th thru 25th Peaks of the attack reached 309Gbps “Instant on”
  • 16. 164 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare February 2014
  • 17. 174 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Monday, February 10th, 2014 400Gbps, Globally Distributed Attacks
  • 18. 184 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 19. 194 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Evolving Landscape
  • 20. 204 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare The Evolving Landscape of DDoS Attacks DNS amplification Up to 300 Gbps NTP reflection Up to 400+ Gbps (35% up from DNS amplification) DNS infrastructure 100s Gbps HTTP Application 100s Gbps Sophistication ATTACK TYPE TREND • Volumetric Layer 3 / 4 • DNS Infrastructure • HTTPS application • Origin: 100s of countries More sophisticated DDoS mitigation and larger surface area to block volumetric attacks has forced hackers to change tactics. New DNS infrastructure and HTTP layer 7 attack signatures that mimic human-like behavior are increasing in frequency. 20142013
  • 21. 214 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Layer 7 Attacks
  • 22. 224 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Layer 7 Attack methodology Exhausts CPU Attackers use millions of compromised machines to launch a sophisticated attack that mimics real users and overloads the slow points in your web property. A highly advanced attack that mimics real users is detected and blocked by CloudFlare before it can overload the slow parts of web server software.
  • 23. 234 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DNS Infrastructure Attacks
  • 24. Layer 7 – Malicious Payload • Request sent to exploit vulnerability on server • WAF on CloudFlare blocks 1.2 billion request per day • Shellshock • 10 to 15 attacks per second during the first week • Top countries: France (80%), US (7%), Netherlands (7%) 244 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 25. 254 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Breaking Down the Attacks
  • 26. 264 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare DDoS mechanics
  • 27. 274 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare IP Spoofing Attacker Network Device 1.2.3.4 Hi, I’m 1.2.3.4, and I need some info Here’s your info 213.4.99.70 Target Website
  • 28. 284 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare IP Spoofing http://spoofer.cmand.org/ 25.5% of networks allow spoofing
  • 29. 294 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Attack #1 – Spamhaus Attack: 309Gbps UDP DNS
  • 30. 304 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Getting to 309Gbps 10 Mbps 30,900X 309,000 Mbps=
  • 31. 314 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare An easier way: DNS Amplification Attacker Open DNS Resolver Target Website 64 Bytes 3,363 Bytes ~50x
  • 32. 324 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare How easy is it to create a DNS query packet?
  • 33. 334 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 64 bytes becomes 3,363 bytes $ dig ANY isc.org @63.21*.**.** +edns=0 +notcp +bufsize=4096 64 byte query Sorryforthesmallprint ;; ANSWER SECTION: isc.org. 7147 IN SOA ns-int.isc.org. hostmaster.isc.org. 2013073000 7200 3600 24796800 3600 isc.org. 7147 IN NS ns.isc.afilias-nst.info. isc.org. 7147 IN NS ord.sns-pb.isc.org. isc.org. 7147 IN NS ams.sns-pb.isc.org. isc.org. 7147 IN NS sfba.sns-pb.isc.org. isc.org. 7 IN A 149.20.64.69 isc.org. 7147 IN MX 10 mx.pao1.isc.org. isc.org. 7147 IN TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all" isc.org. 7147 IN TXT "$Id: isc.org,v 1.1835 2013-07-24 00:15:22 dmahoney Exp $" isc.org. 7 IN AAAA 2001:4f8:0:2::69 isc.org. 7147 IN NAPTR 20 0 "S" "SIP+D2U" "" _sip._udp.isc.org. isc.org. 3547 IN NSEC _adsp._domainkey.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF isc.org. 7147 IN DNSKEY 256 3 5 BQEAAAABwuHz9Cem0BJ0JQTO7C/a3McR6hMaufljs1dfG/inaJpYv7vH XTrAOm/MeKp+/x6eT4QLru0KoZkvZJnqTI8JyaFTw2OM/ItBfh/hL2lm Cft2O7n3MfeqYtvjPnY7dWghYW4sVfH7VVEGm958o9nfi79532Qeklxh x8pXWdeAaRU= isc.org. 7147 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGr hhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+ u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy3 47cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQz Bkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyL KOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bB yBNsO70aEFTd isc.org. 7147 IN SPF "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32 ip6:2001:500:60::65/128 ~all" isc.org. 7147 IN RRSIG SPF 5 2 7200 20130828233259 20130729233259 50012 isc.org. XDoOYzkTHEV1W1V4TT50SsqXn4cxNhPvEuz3iFjq/oskLY9UOaK4GYDO GqHAjwNT0B6pUakKTQ3GvBjUBufPcEauCOl7L7kb8/cC6zYifUCoW0pS moiQxmyqfrPDTzyVA894myUONGgMmB6QW68HGPVvc6HzGWx9bOmjvFyX uOs= isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 12892 isc.org. COfF8fU6a8TBUG97SI/X+u2eKv7/mw+ixD3IWBnr3d3cWZmzF1sV8bWT YbuJebwnJMgN5OfB9PLsN+4QT617OjBe1dUF2M9jZeBiWsSsvvrdHnHM P8KwX6eayByDUoFsYe9VAH6C94XmOVXTQ7h7Cr0ytaVSXUytqFZV+DGn v3kqSi50V3YkFNPAJDqqs0treWjwV/SPlqWVqEAoU/KMZMtYpCEMbHVP 8nbRP3jj/10WLccPtjHhiw4Ka9Sk4o+b7BMYCgXGXlhaap21SUqkytHt 8RJdVxxd5Cj7Bi+O4LXODlS4bAZEDG7UoHR27MzXtvMZogsNyyNUKHSs FtUvBg== isc.org. 7147 IN RRSIG DNSKEY 5 2 7200 20130828230128 20130729230128 50012 isc.org. Mbr/QqJPoIuf3K5jCuABUIG0/zSHQ8iWZpqvHx7olVBEmTxhi3/vW+IE DW6VCE1EpZclSIlMMRZUnbBnVSpe0rZ13BxoLlRQqvsbC3jD15Se41WB DscD0S63C0GLqI9IhSyVugtlpqhA3CaluSqtABHbAktPP05Rm00tST2Y A5Q= isc.org. 3547 IN RRSIG NSEC 5 2 3600 20130828233259 20130729233259 50012 isc.org. V7G42xY7TY9wF1vsBlRFuJ2ror/QjftLoRrDCMfqFW6kb5ZswjKt5zho 4o2sIrylTqad68O+lMxrDcg+7c2D8Hdh84SC0DEkjunBXkGBtLtaJvO5 zMn+d/OgUY5O7wtkerybJwZeiHcFxIkMRIcvsPKJYZWKCdaaCWibne7c w1s= isc.org. 7147 IN RRSIG NAPTR 5 2 7200 20130828233259 20130729233259 50012 isc.org. gWDvD0KACaYgsCgtRS4iKkHBBidfJfqS4drUf4kuPX2Etl9fj1YrqOQK QFB5kBrzJLKh1IF4YpV+KYVUF82l3AtpsohpUH5Uyc3yD3r1CUDVyVvc T9qUrIuRpZLInD2kBLmDaG76MRz4Fz+NAkdXmwxZJhgTrfMLy+Uw/Ktk H7w= isc.org. 7 IN RRSIG AAAA 5 2 60 20130828233259 20130729233259 50012 isc.org. dfzIo0VGT0MptTaPoua3tFwDxSpeuOg127QedlqLGTxKGN1ppV/bd6R0 WktMagZY9rSqmjfXNPlF3Q+7YeTpMssQhHqjE/tDoj9q9r8RXuBLJ1+a VRq3+xMbxb5EXAyQVZw24LIuloqNprXePRUGCXNINSWd7VZEIDNqhu9C g7U= isc.org. 7147 IN RRSIG TXT 5 2 7200 20130828233259 20130729233259 50012 isc.org. WtB3SYzcOKpNbOtBlnmtsI0DCbDB4Kiv/HBY24PTZyWF/3tI8l+wZ+/p MfJ/SblbAzT67DO5RfxlOhr8UlRKVa70oqinQp5+rqiS67lv1hGO6ArO k+J0jLTis9Uz32653dgAxlgjEdWDKAg4F12TaHirAXxyI8fos5WNl/h4 GLo= isc.org. 7147 IN RRSIG MX 5 2 7200 20130828233259 20130729233259 50012 isc.org. BSXC42oV6MCF0dX2icyxnvyijhy569BJCoanm5VrIIuiNeTeo261FQJx 7ofFCWa4fKOoa+EZ0qloNPfDiczStr8MmK8Lznu6+8IRfdmcG/kURuSi JdvDa0swxjmCm9aYu2nhoyHs+jqbJ+9+fneI0iDUX1fiM+9G2K9BjLru NxU= isc.org. 7 IN RRSIG A 5 2 60 20130828233259 20130729233259 50012 isc.org. Gmb8tt8d7kxx4HsA8L6IdFYGGSJCA8PTWexUP3CBLna39e4a6gVzjoNd dEI7B5mySAujZBEXNx3dSagpjiTJYfMML8AY0uO0tgyjqaTyzwPPV5lW xQKVC092BPJx9IeKw+DC57f3m9LOaHJlMIh7wYFn8jxqeg1lSwJN0e35 Qvc= isc.org. 7147 IN RRSIG NS 5 2 7200 20130828233259 20130729233259 50012 isc.org. RBvXLeTH0726iKvElmBZYUE+AWG3s2YRxKxuCnrhg7o9qIQGKXvEXrb3 wJeC/74KY2FW+RRz4F0QxODnPm+frpWIPbCpRf0SUFDQ82opQDwAb2CM 0D9N95y1t9hYfSeHEsEEk2yWgLymd9/S24XCmwuVVZ7ZeYQmVEVkF7Jt V3A= isc.org. 7147 IN RRSIG SOA 5 2 7200 20130828233259 20130729233259 50012 isc.org. iiDnH6tvmap0h2cdULI8Ihme+zbtQ2+D3ycKRqBc9TRfA0poNaaZ97aF 15EIKyIpjiVybkP2DNLm5nkpNsgA+Ur+YQ6pr0hZKzbDkBllBIW4C0LV DsjzPX3qLPH4G3x/20M+TeGe4uzPB5ImPuw0VxB8g8ZP5znvdiZG6qen jas= ;; AUTHORITY SECTION: isc.org. 7147 IN NS ns.isc.afilias-nst.info. isc.org. 7147 IN NS ord.sns-pb.isc.org. isc.org. 7147 IN NS ams.sns-pb.isc.org. isc.org. 7147 IN NS sfba.sns-pb.isc.org. ;; ADDITIONAL SECTION: ns.isc.afilias-nst.info. 56648 IN A 199.254.63.254 ns.isc.afilias-nst.info. 56652 IN AAAA 2001:500:2c::254 ord.sns-pb.isc.org. 31018 IN AAAA 2001:500:71::30 ord.sns-pb.isc.org. 31018 IN A 199.6.0.30 ams.sns-pb.isc.org. 31018 IN AAAA 2001:500:60::30 ams.sns-pb.isc.org. 31018 IN A 199.6.1.30 sfba.sns-pb.isc.org. 31018 IN AAAA 2001:4f8:0:2::19 sfba.sns-pb.isc.org. 31018 IN A 149.20.64.3 mx.pao1.isc.org. 3547 IN AAAA 2001:4f8:0:2::2b mx.pao1.isc.org. 3547 IN A 149.20.64.53 _sip._udp.isc.org. 7147 IN SRV 0 1 5060 asterisk.isc.org. 3,363 byte response
  • 34. 344 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 300Gbps+ of DDoS attack traffic 1 laptop + 5-7 compromised servers + 3 networks which allow spoofing + 9Gbps of DNS requests to + 0.1% of all open resolvers ---------------------------------------- = 300Gbps of DDoS traffic
  • 35. 354 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Attack #2 – The NTP Attack: 400Gbps UDP NTP
  • 36. 364 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Tweets report attack issues
  • 37. 374 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare An EVEN easier way: NTP Amplification Attacker NTP Server with MONLIST Target Website 64 Bytes 13,184 Bytes ~206x
  • 38. 1 laptop + 1 compromised server + 1 network which allowed spoofing + 1.94Gbps of MONLIST to ---------------------------------------------------- = 400Gbps+ of DDoS attack traffic 384 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 400Gbps+ of DDoS attack traffic
  • 39. 394 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare What’s Next? ~206x 650x ~50x 8xDNS EDNS NTP SNMP → → → →
  • 40. 404 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Something extra …
  • 41. Largest Attack in History • Hong Kong • Peaked at ~500Gbps • 7 days • Reflection attack (DNS, NTP) • DNS flood - 250 million DNS requests per second • HTTP(S) attack 414 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare
  • 42. 424 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Protecting your network
  • 43. 434 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 28 Million Open DNS Resolvers http://OpenResolverProject.org/ Lock your DNS server (recursive & authoritative) down
  • 44. 444 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare 28 Million Open DNS Resolvers http://team-cymru.org/ Confirm that the resolver is a closed resolver options { recursion no; additional-from-cache no; }; UNIX bind configuration examples acl "trusted" { 10.42.0.0/16; 192.0.2.0/24; 192.0.6.0/24; }; options { recursion no; additional-from-cache no; allow-query { none; }; }; view "trusted" in { match-clients { trusted; }; allow-query { trusted; }; recursion yes; additional-from-cache yes; };
  • 45. 454 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks http://OpenNTPProject.org/ Turn off MONLIST on your NTP servers
  • 46. 464 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks
  • 47. 474 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare NTP Amplification Attacks http://team-cymru.org/ “noquery” is required to disable MONLIST # by default act only as a basic NTP client restrict -4 default nomodify nopeer noquery notrap restrict -6 default nomodify nopeer noquery notrap # allow NTP messages from the loopback address, useful for debugging restrict 127.0.0.1 restrict -6 ::1 # server(s) we time sync to server 192.0.2.1 server 2001:db8::1 server time.example.net UNIX ntpd configuration example
  • 48. 484 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Prevent IP Spoofing (network hygiene) • BCP38 / RFC2827 (ingress filtering) – May, 2000: • http://bcp38.info/ • http://www.ietf.org/rfc/bcp/bcp38.txt • http://www.ietf.org/rfc/rfc2827.txt • BCP84 / RFC3704 (for multihomed) – March, 2004: • http://www.ietf.org/rfc/bcp/bcp84.txt • http://www.ietf.org/rfc/rfc3704.txt … and yet still an issue today!
  • 49. 494 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Securing CDN traffic at CloudFlare
  • 50. 504 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare security
  • 51. 514 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare CloudFlare – a global network Attack traffic is global and hence a global edge is valuable
  • 52. 524 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Anycast Dilutes Attacks 300Gbps of attack traffic / 28 locations ---------------------------------------------------- = ~10.7Gbps average per location Reality is that some locations are much larger than others. However every location is vital.
  • 53. 534 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Anycast Dilutes Attacks
  • 54. 544 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Solution: Hide Origin IPs • Use separate IPs for HTTP, DNS, SMTP, etc • Public DNS should route to your EDGE’s public IPs • Keep actual/origin web device IPs protected
  • 55. 554 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Filter traffic by IP and protocol • No UDP packets should be able to hit your HTTP server • UDP is IP protocol 17 vs. TCP for HTTP is IP protocol 6 • No HTTP packets should be able to hit your SMTP server • HTTP is TCP port 80 & 443 vs. SMTP is port 25 & 587
  • 56. 564 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Filter traffic by IP and protocol http://team-cymru.org/ Allow only HTTP& HTTPS via TCP protocol to a specific IP ! hostname router-www ! interface ethernet0 ip access-group 102 in ! access-list 102 permit tcp any host 10.0.0.100 eq 80 access-list 102 permit tcp any host 10.0.0.100 eq 443 access-list 102 deny all ! Simple Cisco filter configuration example
  • 57. 574 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Protect your infrastructure • Internal switches, routers, and other devices should be locked down from any external access • All traffic should flow through EDGE devices which handle attacks • CloudFlare Web Application Firewall (WAF) service
  • 58. 584 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Build relationships upstream • Understand what your data center and bandwidth providers do about DDoS • Know who to call when trouble strikes • Share your IP/Protocol architecture with them
  • 59. 594 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Communicate about attacks
  • 60. 604 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Summary
  • 61. 614 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Summary • Volumetric DDoS evolving (NTP came and went) • Larger botnets / Cloud services user in botnets • DNS flood on the rise / Application-level on the rise • Politically motivated attacks • First, make sure you’re not part of the problem … • Second, practice good protocol hygiene … • Third, implement infrastructure ACLs … • Fourth, know your upstreams
  • 62. 624 December 2014 MSK-IX Moscow Russia - CloudFlare - Surviving a DDoS Attack - Securing CDN traffic at CloudFlare Questions? Martin J. Levy, Network Strategy @mahtin @cloudflare http://www.cloudflare.com/ AS13335

Editor's Notes

  1. Founded 1998 // The Spamhaus Project is an international nonprofit organization whose mission is to track the Internet's spam operations
  2. more volumetric attacks (less frequent) more sophisticated attacks (more frequent)
  3. ~50 million packets per second in single location