SlideShare a Scribd company logo
1 of 67
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Adrian Newby, CTO, CrownPeak
David Grampa, Founder, TypeFrag.com
Andrew Kiggins, AWS Solutions Architect
Jeffrey Lyon, AWS Operations Manager
November 29, 2016
SEC310
Mitigating DDoS Attacks on AWS
Five Vectors and Four Use Cases
In this session, you will learn about …
Five DDoS Attack Vectors
1. UDP reflection attacks
2. UDP floods
3. TCP SYN floods
4. Web application layer attacks
5. DNS query floods
Four AWS Use Cases
1. Common web application
2. Highly-resilient web application
3. Video game development
4. Voice communication
DDoS attacks
DDoS attacks can …
• Target networks with large volumes of traffic
• Target systems with large volumes of connections
• Target services with large volumes of requests
Vector #1: UDP Reflection Attacks
• Attacker sends spoofed request to UDP service
• Spoofed IP is that of the victim
• Asymmetric: UDP service responds with large payload
Network Traffic | System Connections | Service Requests
20:07:45.918266 IP 192.0.2.2.1900 > server.example.com.http: UDP, length 274
20:07:45.918271 IP 198.51.100.3.1900 > server.example.com.http: UDP, length 320
20:07:45.918275 IP 203.0.113.7.1900 > server.example.com.http: UDP, length 307
20:07:45.918279 IP 192.0.2.5.1900 > server.example.com.http: UDP, length 326
20:07:45.918283 IP 198.51.100.12.1900 > server.example.com.http: UDP, length 300
20:07:45.918287 IP 203.0.113.58.1900 > server.example.com.http: UDP, length 307
20:07:45.918291 IP 192.0.2.33.1900 > server.example.com.http: UDP, length 302
20:07:45.918294 IP 198.51.100.113.1900 > server.example.com.http: UDP, length 323
20:07:45.918301 IP 203.0.113.90.1900 > server.example.com.http: UDP, length 268
Vector #1: UDP Reflection Attacks
Clear signature
Many requests from suspicious
source port
Large packet size
Flood of traffic is easy to
generate
UDP protocol
Clear indicator of suspicious activity if
destination does not use UDP
Network Traffic | System Connections | Service Requests
20:07:45.918266 IP 192.0.2.2.51523 > server.example.com.http: UDP, length 1024
20:07:45.918271 IP 198.51.100.3.23769 > server.example.com.http: UDP, length 1024
20:07:45.918275 IP 203.0.113.7.4655 > server.example.com.http: UDP, length 1024
20:07:45.918279 IP 192.0.2.5.13002 > server.example.com.http: UDP, length 1024
20:07:45.918283 IP 198.51.100.12.52670 > server.example.com.http: UDP, length 1024
20:07:45.918287 IP 203.0.113.58.21266 > server.example.com.http: UDP, length 1024
20:07:45.918291 IP 192.0.2.33.7940 > server.example.com.http: UDP, length 1024
20:07:45.918294 IP 198.51.100.113.35950 > server.example.com.http: UDP, length 1024
20:07:45.918301 IP 203.0.113.90.62370 > server.example.com.http: UDP, length 1024
Vector #2: UDP floods
Ambiguous
Source port may be difficult to
distinguish
Packet size
Defined by attacker
UDP protocol
Clear indicator of suspicious activity if
destination does not use UDP
Network Traffic | System Connections | Service Requests
Vector #3: TCP SYN Floods
• Flood of many connections targeting a system
• Very small packets
• Connections are left half-open, state table exhaustion
Network Traffic | System Connections | Service Requests
tcp 0 0 192.0.2.1:80 91.64.4.146:64979 SYN_RECV -
tcp 0 0 192.0.2.1:80 84.24.103.112:4005 SYN_RECV -
tcp 0 0 192.0.2.1:80 79.223.69.239:61510 SYN_RECV -
tcp 0 0 192.0.2.1:80 67.86.135.44:43312 SYN_RECV -
tcp 0 0 192.0.2.1:80 86.88.67.226:50600 SYN_RECV -
tcp 0 0 192.0.2.1:80 173.20.137.110:3813 SYN_RECV -
tcp 0 0 192.0.2.1:80 84.58.10.121:4878 SYN_RECV -
tcp 0 0 192.0.2.1:80 91.37.40.151:2408 SYN_RECV -
tcp 0 0 192.0.2.1:80 173.20.137.110:3441 SYN_RECV -
Vector #3: TCP SYN Floods
Half-open connections
We sent SYN-ACK, ACK never received
TCP protocol
Many connections destined to HTTP service
Network Traffic | System Connections | Service Requests
Vector #4: Web Application Layer Attacks
• Malicious web requests that look like real users
• Impact availability or scrape site content
• Mitigate using a WAF
• Block abusive IP’s, user agents, etc.
• Rate-based blacklisting
Network Traffic | System Connections | Service Requests
Vector #5: DNS Query Floods
• Many legitimate DNS queries can exhaust host capacity
• Random queries can “cache bust” recursive DNS (eg.
ezspobmzlanungyp.www.example.com)
• Authoritative DNS compelled to respond
Network Traffic | System Connections | Service Requests
DDoS Mitigation on AWS
Conventional DDoS Mitigation
Conventional data center
DDoS attack
Users DDoS mitigation service
DDoS Mitigation on AWS
• Built into the AWS global
infrastructure
• Fast mitigation without external
routing
• Protection of availability, latency, and
throughput
DDoS Attacks and Mitigation
• “BlackWatch” systems protect AWS, mitigate large
volume attacks
• Methods:
• Allow only traffic valid for the service
• SYN proxy/cookies when high levels of SYN==1 detected
• Suspicion-based traffic shaping
Suspicion-Based Traffic Shaping
• Prioritize reliable traffic
• Deprioritize spikes of traffic:
• Abnormal sources (networks, geos)
• Abnormal ports and protocols
• Abnormal packet or request characteristics
• Leverage AWS scale, minimize false positives
Suspicion-Based Traffic Shaping
Protecting Web Applications
Common Web Application
ALB security group
Amazon
EC2
instances
Application
Load Balancer
Public subnet
Web application
security group
Private subnet
DDoS
attack
Users
ALB Scaling and Mitigation
ALB security group
Application
Load
Balancer
Public subnet
DDoS
attack
Users
Application
Load
Balancer
Application
Load
Balancer
Application
Load
Balancer
BlackWatch
DDoS
mitigation
Transit Diversity and Redundancy
Internet
exchange
Internet
exchange
Internet
exchange
us-east-1
DDoS-resilient web
application
Highly Resilient Web Application
Amazon
Route 53
ALB security group
Amazon
EC2
instances
Application
Load Balancer
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAF
Amazon
API Gateway
DDoS
attack
Users
Mitigate closer to the source
Internet
exchange
Tokyo Singapore Hong Kong Dublin London Milan
Internet
exchange
Internet
exchange
Internet
exchange
Internet
exchange
Internet
exchange
us-east-1
BlackWatch
DDoS
mitigation
DDoS attack
DDoS resilient web
services
Globally Distributed Capacity
Case Study:
Crownpeak / BNY Mellon
Introduction to Crownpeak
• Crownpeak has pioneered the SaaS model for web
content management systems since 2001
• We provide a full digital experience management suite,
delivered entirely using Amazon Web Services
• We are headquartered in Los Angeles, CA, with offices
in Denver, CO, and London, UK
Introduction to the Case Study
• Bank of New York Mellon at a
glance:
• $29.5 trillion assets under custody
and/or administration
• $1.7 trillion assets under
management
• 100+ markets worldwide
• Many websites managed and
hosted by Crownpeak
• Committed to best-in-class cyber
defense and threat protection
Baseline Architecture
Amazon
Route 53
ELB security group
Amazon
EC2
instances
ELB load
balancer
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
DDoS
attack
Users
Hardened Architecture
Amazon
Route 53
ELB security group
Amazon
EC2
instances
Elastic Load
Balancing
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAFDDoS
attack
Users
AWS
Lambda
Amazon
S3
DDoS Testing
Test Description
HTTP GET baseline Basic load test to establish thresholds at which
mitigation devices activate
WILD HULK DDoS Obfuscation of source client, reference forgery,
stickiness, URL transformation
WAF overload Parallel SQL injection and vulnerability scans
Metric Ave / Peak
Concurrent attack vectors 200
Requests sent 200 K/second (ave), 1 M+/second (peak)
Data volume returned 35-40 Gb/second (ave), 52 Gb/second (peak)
Data volume sent 2.5-3.5 Gb/second (ave), 4.4 Gb/second (peak)
Test Results
How Far Can You Push These Technologies?
Conclusions and Final Recommendations
• Amazon CloudFront, AWS WAF are a highly effective
defense against the most sophisticated Layer 7 attacks
• Best practices for best defense:
Eliminates many common attacks
Invest time in limiting query
string and header forwarding
Shields the origin from redirect floods
Deploy HTTP->HTTPS
redirect at the edge
Many DDoS toolkits fail TLS handshake
Implement an SNI-based
infrastructure
DDoS-Resilient Architecture on
Amazon EC2
VPC Flow Logs, Security Groups, Network ACLs Primer
VPC public subnet VPC private subnet
10.200.0.0/16
10.200.150.0/2410.200.99.0/24
Route
table
Route
table
Flow
logs
Instance
Instance
Application
Security
Group
WebServer
Security
Group
Ingress Rule
0.0.0.0/0 : 80
Egress Rule
0.0.0.0/0 : ANY
ApplicationSecurityGroup:8443
Ingress Rule
WebServerSecurityGroup: ANY
Egress Rule
0.0.0.0/0 : ANY
Works like a firewall
Internet
gateway
NAT
gateway
VPC Flow Logs, Security Groups, Network ACLs Primer
Internet
gateway
VPC public subnet VPC private subnet
10.200.0.0/16
10.200.150.0/2410.200.99.0/24
Route
table
Route
table
Instance
Application
Security
Group
WebServer
Security
Group
NAT
gateway
Flow
logs
Instance
Works like NetFlow
srcIP, dstIP, srcPort, dstPort, protocol, accept/reject
VPC Flow Logs, Security Groups, Network ACLs Primer
Internet
gateway
VPC public subnet VPC private subnet
10.200.0.0/16
Route
table
NAT
gateway
Route
table
Flow
logs Application
Security
Group
WebServer
Security
Group
10.200.150.0/2410.200.99.0/24
Instance
Instance
Works like router ACLs
Amazon EC2 for Game Developers
• Web portals
• Game servers
• Matching servers
• Relay servers
Web Portal = The Usual Suspects
Amazon
Route 53
ELB security group
Amazon
EC2
instances
ELB / ALB
Amazon
CloudFront
Public subnet
Web application
security group
Private subnet
AWS WAF
Amazon
API Gateway
DDoS
attack
Users
Game Servers, Match Servers, Relays
• UDP vs TCP
• Latency
• Scaling
Options
• Reduce your attackable surface area
• Filter unwanted traffic
• DNS protection
• Protect API endpoint
• Restrict access
• Scale to absorb
• Size appropriately
• Reduce blast radius
• Move the target
Reduce the Blast Radius
Security group
Subnet
Players
Instance
Players
Players
Players
DDoS
attack
Security group
Security group Security group
Reduce the Blast Radius
Security group
Subnet
Players
Instance
Players
Players
Players
Players
DDoS
attack
Instance
Instance
Instance
Instance
Security group
Restrict Access – Security Groups
Subnet
Players
Players
Players
Players
Players
DDoS
attack
Instance
Security group
Restrict Access – Host-Based
Subnet
Players
Players
Players
Players
Players
DDoS
attack
Instance
Security group
Security group
Security group Security group
Move the Target
• Use elastic IP
addresses
• Don’t use
contiguous IP
addresses
Instance
Elastic IP
SubnetPlayers
Players
DDoS
attack
Instance
Elastic IP
Instance
TeamSpeak3 on EC2
• TeamSpeak3 is voice communication software
• Popular with online computer gamers
• Common DDoS target
TeamSpeak3 on EC2
Resiliency
1. Leverage AWS global infrastructure
2. Minimize attack surface
3. Reduce blast radius
4. Automatically mitigate attacks
5. Analyze and learn from attacks
Attack Surface
Amazon
Route 53
Users
Instance
Subnet
One network ACL per VPC subnet
One VPC subnet per instance
Elastic IP
NetworkACL
Attack Surface
Blast Radius
Amazon
Route 53
Users
AZ #1 AZ #2 AZ #3
Blast Radius
Amazon
Route 53
Users
AZ #1 AZ #2 AZ #3
Attack
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
DDoS attack begins
CloudWatch AWS Lambda
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1 DDoS attack detected
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1
2
Elastic IP address changed
Elastic IP
Attack Mitigation
Attack
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
1
2
Elastic IP
3
Route 53 DNS updated
Attack Mitigation
Amazon
Route 53
Users
Instance
Subnet
NetworkACL
Elastic IP
CloudWatch AWS Lambda
DDoS attack mitigated
Demo: Attack Mitigation with EIP Swapping
Results
Before After
50 attacks per month
2000 users affected per attack
15 minutes per attack
5 attacks per month
200 users affected per attack
90 seconds per attack
1,500,000
user minutes
1,500
user minutes
Attack Analysis
Amazon S3
Amazon
CloudFront
Amazon
SimpleDB
Amazon S3
Amazon API
Gateway
Amazon
Lambda
VPC
Flow Logs
Single-page app REST-based API
User
Attack Analysis
DDoS Mitigation Support
Need Help?
Step 1
Click “Create Case”
Step 2
Select “Distributed Denial of Service
(DDoS)”
Step 3
Select the category and severity and write a
subject and description
Step 4
Talk to a DDoS expert
AWS Best Practices for DDoS Resiliency
• Types of DDoS attacks
• Mitigation techniques
• Attack surface reduction
• Operational techniques
Download from
https://aws.amazon.com/security
AWS Best Practices for DDoS Resiliency
June 2016
Thank you!
Learn more about DDoS mitigation on AWS
at https://aws.amazon.com/security
Remember to complete
your evaluations!
Remember to complete
your evaluations!

More Related Content

What's hot

DOS, DDOS Atakları ve Korunma Yöntemleri
DOS, DDOS Atakları ve Korunma YöntemleriDOS, DDOS Atakları ve Korunma Yöntemleri
DOS, DDOS Atakları ve Korunma YöntemleriBGA Cyber Security
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxSMIT PAREKH
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfSouvikRoy114738
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationAmazon Web Services
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 

What's hot (20)

DOS, DDOS Atakları ve Korunma Yöntemleri
DOS, DDOS Atakları ve Korunma YöntemleriDOS, DDOS Atakları ve Korunma Yöntemleri
DOS, DDOS Atakları ve Korunma Yöntemleri
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
 
Akamai waf
Akamai wafAkamai waf
Akamai waf
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdf
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack Mitigation
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 

Viewers also liked

Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAmazon Web Services
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...Amazon Web Services
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...Amazon Web Services
 
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...Amazon Web Services
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...Amazon Web Services
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...Amazon Web Services
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...Amazon Web Services
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...Amazon Web Services
 
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...Amazon Web Services
 
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)Amazon Web Services
 
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceNEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceAmazon Web Services
 
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...Amazon Web Services
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)Kayo Iio
 
モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方Junpei Nakada
 

Viewers also liked (20)

DDoS Resiliency
DDoS ResiliencyDDoS Resiliency
DDoS Resiliency
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
 
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
AWS re:Invent 2016: DNS Demystified: Getting Started with Amazon Route 53, fe...
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
 
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
AWS re:Invent 2016: Deep-Dive: Native, Hybrid and Web patterns with Serverles...
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
 
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AW...
 
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...
 
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
AWS re:Invent 2016: Building Complex Serverless Applications (GPST404)
 
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection ServiceNEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
 
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
AWS re:Invent 2016: Serverless Architectural Patterns and Best Practices (ARC...
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)AmazonVPCについて(JAWSUG女子会発表分)
AmazonVPCについて(JAWSUG女子会発表分)
 
モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方モバイルゲームにおけるAWSの泥臭い使い方
モバイルゲームにおけるAWSの泥臭い使い方
 

Similar to Mitigating DDoS Attacks on AWS

SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Amazon Web Services
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
Advanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAdvanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAmazon Web Services
 
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Amazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
 
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Amazon Web Services
 
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Amazon Web Services
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...Amazon Web Services
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...Amazon Web Services
 
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Amazon Web Services
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxAmazon Web Services
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...Amazon Web Services
 
XCloudLabs- AWS Overview
XCloudLabs- AWS Overview XCloudLabs- AWS Overview
XCloudLabs- AWS Overview sangam biradar
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovSergey Fedorov
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewMarketingArrowECS_CZ
 
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013Amazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 

Similar to Mitigating DDoS Attacks on AWS (20)

SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Advanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application DefenseAdvanced Techniques for DDOS Mitigation and Web Application Defense
Advanced Techniques for DDOS Mitigation and Web Application Defense
 
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...Network security, Anti-DDoS and other Internet-side protections: Encryption i...
Network security, Anti-DDoS and other Internet-side protections: Encryption i...
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017Creating Your Virtual Data Center - AWS Summit Bahrain 2017
Creating Your Virtual Data Center - AWS Summit Bahrain 2017
 
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
Edge Services as a Critical AWS Infrastructure Component - August 2017 AWS On...
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
 
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
ENT202 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity O...
 
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
Fundamentals of Networking and Security on AWS - AWS Summit Tel Aviv 2017
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
 
XCloudLabs- AWS Overview
XCloudLabs- AWS Overview XCloudLabs- AWS Overview
XCloudLabs- AWS Overview
 
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey FedorovNetworking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
Networking @Scale'19 - Getting a Taste of Your Network - Sergey Fedorov
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
Comenzando com la nube hibrida
Comenzando com la nube hibrida Comenzando com la nube hibrida
Comenzando com la nube hibrida
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Mitigating DDoS Attacks on AWS

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Adrian Newby, CTO, CrownPeak David Grampa, Founder, TypeFrag.com Andrew Kiggins, AWS Solutions Architect Jeffrey Lyon, AWS Operations Manager November 29, 2016 SEC310 Mitigating DDoS Attacks on AWS Five Vectors and Four Use Cases
  • 2. In this session, you will learn about … Five DDoS Attack Vectors 1. UDP reflection attacks 2. UDP floods 3. TCP SYN floods 4. Web application layer attacks 5. DNS query floods Four AWS Use Cases 1. Common web application 2. Highly-resilient web application 3. Video game development 4. Voice communication
  • 4. DDoS attacks can … • Target networks with large volumes of traffic • Target systems with large volumes of connections • Target services with large volumes of requests
  • 5. Vector #1: UDP Reflection Attacks • Attacker sends spoofed request to UDP service • Spoofed IP is that of the victim • Asymmetric: UDP service responds with large payload Network Traffic | System Connections | Service Requests
  • 6. 20:07:45.918266 IP 192.0.2.2.1900 > server.example.com.http: UDP, length 274 20:07:45.918271 IP 198.51.100.3.1900 > server.example.com.http: UDP, length 320 20:07:45.918275 IP 203.0.113.7.1900 > server.example.com.http: UDP, length 307 20:07:45.918279 IP 192.0.2.5.1900 > server.example.com.http: UDP, length 326 20:07:45.918283 IP 198.51.100.12.1900 > server.example.com.http: UDP, length 300 20:07:45.918287 IP 203.0.113.58.1900 > server.example.com.http: UDP, length 307 20:07:45.918291 IP 192.0.2.33.1900 > server.example.com.http: UDP, length 302 20:07:45.918294 IP 198.51.100.113.1900 > server.example.com.http: UDP, length 323 20:07:45.918301 IP 203.0.113.90.1900 > server.example.com.http: UDP, length 268 Vector #1: UDP Reflection Attacks Clear signature Many requests from suspicious source port Large packet size Flood of traffic is easy to generate UDP protocol Clear indicator of suspicious activity if destination does not use UDP Network Traffic | System Connections | Service Requests
  • 7. 20:07:45.918266 IP 192.0.2.2.51523 > server.example.com.http: UDP, length 1024 20:07:45.918271 IP 198.51.100.3.23769 > server.example.com.http: UDP, length 1024 20:07:45.918275 IP 203.0.113.7.4655 > server.example.com.http: UDP, length 1024 20:07:45.918279 IP 192.0.2.5.13002 > server.example.com.http: UDP, length 1024 20:07:45.918283 IP 198.51.100.12.52670 > server.example.com.http: UDP, length 1024 20:07:45.918287 IP 203.0.113.58.21266 > server.example.com.http: UDP, length 1024 20:07:45.918291 IP 192.0.2.33.7940 > server.example.com.http: UDP, length 1024 20:07:45.918294 IP 198.51.100.113.35950 > server.example.com.http: UDP, length 1024 20:07:45.918301 IP 203.0.113.90.62370 > server.example.com.http: UDP, length 1024 Vector #2: UDP floods Ambiguous Source port may be difficult to distinguish Packet size Defined by attacker UDP protocol Clear indicator of suspicious activity if destination does not use UDP Network Traffic | System Connections | Service Requests
  • 8. Vector #3: TCP SYN Floods • Flood of many connections targeting a system • Very small packets • Connections are left half-open, state table exhaustion Network Traffic | System Connections | Service Requests
  • 9. tcp 0 0 192.0.2.1:80 91.64.4.146:64979 SYN_RECV - tcp 0 0 192.0.2.1:80 84.24.103.112:4005 SYN_RECV - tcp 0 0 192.0.2.1:80 79.223.69.239:61510 SYN_RECV - tcp 0 0 192.0.2.1:80 67.86.135.44:43312 SYN_RECV - tcp 0 0 192.0.2.1:80 86.88.67.226:50600 SYN_RECV - tcp 0 0 192.0.2.1:80 173.20.137.110:3813 SYN_RECV - tcp 0 0 192.0.2.1:80 84.58.10.121:4878 SYN_RECV - tcp 0 0 192.0.2.1:80 91.37.40.151:2408 SYN_RECV - tcp 0 0 192.0.2.1:80 173.20.137.110:3441 SYN_RECV - Vector #3: TCP SYN Floods Half-open connections We sent SYN-ACK, ACK never received TCP protocol Many connections destined to HTTP service Network Traffic | System Connections | Service Requests
  • 10. Vector #4: Web Application Layer Attacks • Malicious web requests that look like real users • Impact availability or scrape site content • Mitigate using a WAF • Block abusive IP’s, user agents, etc. • Rate-based blacklisting Network Traffic | System Connections | Service Requests
  • 11. Vector #5: DNS Query Floods • Many legitimate DNS queries can exhaust host capacity • Random queries can “cache bust” recursive DNS (eg. ezspobmzlanungyp.www.example.com) • Authoritative DNS compelled to respond Network Traffic | System Connections | Service Requests
  • 13. Conventional DDoS Mitigation Conventional data center DDoS attack Users DDoS mitigation service
  • 14. DDoS Mitigation on AWS • Built into the AWS global infrastructure • Fast mitigation without external routing • Protection of availability, latency, and throughput
  • 15. DDoS Attacks and Mitigation • “BlackWatch” systems protect AWS, mitigate large volume attacks • Methods: • Allow only traffic valid for the service • SYN proxy/cookies when high levels of SYN==1 detected • Suspicion-based traffic shaping
  • 16. Suspicion-Based Traffic Shaping • Prioritize reliable traffic • Deprioritize spikes of traffic: • Abnormal sources (networks, geos) • Abnormal ports and protocols • Abnormal packet or request characteristics • Leverage AWS scale, minimize false positives
  • 19. Common Web Application ALB security group Amazon EC2 instances Application Load Balancer Public subnet Web application security group Private subnet DDoS attack Users
  • 20. ALB Scaling and Mitigation ALB security group Application Load Balancer Public subnet DDoS attack Users Application Load Balancer Application Load Balancer Application Load Balancer BlackWatch DDoS mitigation
  • 21. Transit Diversity and Redundancy Internet exchange Internet exchange Internet exchange us-east-1 DDoS-resilient web application
  • 22. Highly Resilient Web Application Amazon Route 53 ALB security group Amazon EC2 instances Application Load Balancer Amazon CloudFront Public subnet Web application security group Private subnet AWS WAF Amazon API Gateway DDoS attack Users
  • 23. Mitigate closer to the source Internet exchange Tokyo Singapore Hong Kong Dublin London Milan Internet exchange Internet exchange Internet exchange Internet exchange Internet exchange us-east-1 BlackWatch DDoS mitigation DDoS attack DDoS resilient web services
  • 26. Introduction to Crownpeak • Crownpeak has pioneered the SaaS model for web content management systems since 2001 • We provide a full digital experience management suite, delivered entirely using Amazon Web Services • We are headquartered in Los Angeles, CA, with offices in Denver, CO, and London, UK
  • 27. Introduction to the Case Study • Bank of New York Mellon at a glance: • $29.5 trillion assets under custody and/or administration • $1.7 trillion assets under management • 100+ markets worldwide • Many websites managed and hosted by Crownpeak • Committed to best-in-class cyber defense and threat protection
  • 28. Baseline Architecture Amazon Route 53 ELB security group Amazon EC2 instances ELB load balancer Amazon CloudFront Public subnet Web application security group Private subnet DDoS attack Users
  • 29. Hardened Architecture Amazon Route 53 ELB security group Amazon EC2 instances Elastic Load Balancing Amazon CloudFront Public subnet Web application security group Private subnet AWS WAFDDoS attack Users AWS Lambda Amazon S3
  • 30. DDoS Testing Test Description HTTP GET baseline Basic load test to establish thresholds at which mitigation devices activate WILD HULK DDoS Obfuscation of source client, reference forgery, stickiness, URL transformation WAF overload Parallel SQL injection and vulnerability scans Metric Ave / Peak Concurrent attack vectors 200 Requests sent 200 K/second (ave), 1 M+/second (peak) Data volume returned 35-40 Gb/second (ave), 52 Gb/second (peak) Data volume sent 2.5-3.5 Gb/second (ave), 4.4 Gb/second (peak)
  • 32. How Far Can You Push These Technologies?
  • 33. Conclusions and Final Recommendations • Amazon CloudFront, AWS WAF are a highly effective defense against the most sophisticated Layer 7 attacks • Best practices for best defense: Eliminates many common attacks Invest time in limiting query string and header forwarding Shields the origin from redirect floods Deploy HTTP->HTTPS redirect at the edge Many DDoS toolkits fail TLS handshake Implement an SNI-based infrastructure
  • 35. VPC Flow Logs, Security Groups, Network ACLs Primer VPC public subnet VPC private subnet 10.200.0.0/16 10.200.150.0/2410.200.99.0/24 Route table Route table Flow logs Instance Instance Application Security Group WebServer Security Group Ingress Rule 0.0.0.0/0 : 80 Egress Rule 0.0.0.0/0 : ANY ApplicationSecurityGroup:8443 Ingress Rule WebServerSecurityGroup: ANY Egress Rule 0.0.0.0/0 : ANY Works like a firewall Internet gateway NAT gateway
  • 36. VPC Flow Logs, Security Groups, Network ACLs Primer Internet gateway VPC public subnet VPC private subnet 10.200.0.0/16 10.200.150.0/2410.200.99.0/24 Route table Route table Instance Application Security Group WebServer Security Group NAT gateway Flow logs Instance Works like NetFlow srcIP, dstIP, srcPort, dstPort, protocol, accept/reject
  • 37. VPC Flow Logs, Security Groups, Network ACLs Primer Internet gateway VPC public subnet VPC private subnet 10.200.0.0/16 Route table NAT gateway Route table Flow logs Application Security Group WebServer Security Group 10.200.150.0/2410.200.99.0/24 Instance Instance Works like router ACLs
  • 38. Amazon EC2 for Game Developers • Web portals • Game servers • Matching servers • Relay servers
  • 39. Web Portal = The Usual Suspects Amazon Route 53 ELB security group Amazon EC2 instances ELB / ALB Amazon CloudFront Public subnet Web application security group Private subnet AWS WAF Amazon API Gateway DDoS attack Users
  • 40. Game Servers, Match Servers, Relays • UDP vs TCP • Latency • Scaling
  • 41. Options • Reduce your attackable surface area • Filter unwanted traffic • DNS protection • Protect API endpoint • Restrict access • Scale to absorb • Size appropriately • Reduce blast radius • Move the target
  • 42. Reduce the Blast Radius Security group Subnet Players Instance Players Players Players DDoS attack
  • 43. Security group Security group Security group Reduce the Blast Radius Security group Subnet Players Instance Players Players Players Players DDoS attack Instance Instance Instance Instance Security group
  • 44. Restrict Access – Security Groups Subnet Players Players Players Players Players DDoS attack Instance Security group
  • 45. Restrict Access – Host-Based Subnet Players Players Players Players Players DDoS attack Instance Security group
  • 46. Security group Security group Security group Move the Target • Use elastic IP addresses • Don’t use contiguous IP addresses Instance Elastic IP SubnetPlayers Players DDoS attack Instance Elastic IP Instance
  • 47. TeamSpeak3 on EC2 • TeamSpeak3 is voice communication software • Popular with online computer gamers • Common DDoS target
  • 49. Resiliency 1. Leverage AWS global infrastructure 2. Minimize attack surface 3. Reduce blast radius 4. Automatically mitigate attacks 5. Analyze and learn from attacks
  • 50. Attack Surface Amazon Route 53 Users Instance Subnet One network ACL per VPC subnet One VPC subnet per instance Elastic IP NetworkACL
  • 53. Blast Radius Amazon Route 53 Users AZ #1 AZ #2 AZ #3 Attack
  • 56. Attack Mitigation Attack Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda 1 2 Elastic IP address changed Elastic IP
  • 57. Attack Mitigation Attack Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda 1 2 Elastic IP 3 Route 53 DNS updated
  • 58. Attack Mitigation Amazon Route 53 Users Instance Subnet NetworkACL Elastic IP CloudWatch AWS Lambda DDoS attack mitigated
  • 59. Demo: Attack Mitigation with EIP Swapping
  • 60. Results Before After 50 attacks per month 2000 users affected per attack 15 minutes per attack 5 attacks per month 200 users affected per attack 90 seconds per attack 1,500,000 user minutes 1,500 user minutes
  • 61. Attack Analysis Amazon S3 Amazon CloudFront Amazon SimpleDB Amazon S3 Amazon API Gateway Amazon Lambda VPC Flow Logs Single-page app REST-based API User
  • 64. Need Help? Step 1 Click “Create Case” Step 2 Select “Distributed Denial of Service (DDoS)” Step 3 Select the category and severity and write a subject and description Step 4 Talk to a DDoS expert
  • 65. AWS Best Practices for DDoS Resiliency • Types of DDoS attacks • Mitigation techniques • Attack surface reduction • Operational techniques Download from https://aws.amazon.com/security AWS Best Practices for DDoS Resiliency June 2016
  • 66. Thank you! Learn more about DDoS mitigation on AWS at https://aws.amazon.com/security
  • 67. Remember to complete your evaluations! Remember to complete your evaluations!