data analytics and ddos mitigation: lessons learned

2
1 Data Analytics and DDoS Mitigation: Lessons Learned In the cyber security industry, IT is driving the use of data analytics to gain real‐time insight into trends, attacker behaviors and specific cyber security events. Real‐time data analysis can be a powerful tool to help Internet‐facing organizations build a stronger cyber security strategy. Defending against DDoS attacks is a real‐time challenge for DDoS mitigation service providers. Hundreds of millions of data points in multiple streams pour into a DDoS mitigation platform in real time during an attack. A DDoS mitigation provider must quickly make sense of this deluge of data and make precise decisions as to which data/traffic to allow and which to block. The Prolexic approach to DDoS data analytics Merely summarizing numerical data will not show if network traffic anomalies are malicious or not. Prolexic uses data analytics to draw informed conclusions and answer questions such as: Is a site under DDoS attack or is this another kind of network anomaly, such as a flash crowd? If under attack, what type of DDoS threat is this and which part of the customer’s infrastructure could be most affected? Where are the attacks coming from? Have we encountered these attackers before? What are the attack signatures? Have we seen them before? Are they changing? Figure 1: Prolexic leverages a wide variety of metrics and models to provide meaningful DDoS insight.

Upload: david-collins

Post on 07-Mar-2016

214 views

Category:

Documents


2 download

DESCRIPTION

During a DoS or DDoS denial of service attack, Prolexic gathers hundreds of millions of data points from DDoS mitigation sensors. In this audio Prolexic shares what it has learned about using DDoS analytics to stop DDoS attacks.

TRANSCRIPT

Page 1: Data Analytics and DDoS Mitigation: Lessons Learned

1

DataAnalyticsandDDoSMitigation:LessonsLearned

Inthecybersecurityindustry,ITisdrivingtheuseofdataanalyticstogainreal‐timeinsightintotrends,attackerbehaviorsandspecificcybersecurityevents.Real‐timedataanalysiscanbeapowerfultooltohelpInternet‐facingorganizationsbuildastrongercybersecuritystrategy.

DefendingagainstDDoSattacksisareal‐timechallengeforDDoSmitigationserviceproviders.HundredsofmillionsofdatapointsinmultiplestreamspourintoaDDoSmitigationplatforminrealtimeduringanattack.ADDoSmitigationprovidermustquicklymakesenseofthisdelugeofdataandmakeprecisedecisionsastowhichdata/traffictoallowandwhichtoblock.

TheProlexicapproachtoDDoSdataanalyticsMerelysummarizingnumericaldatawillnotshowifnetworktrafficanomaliesaremaliciousornot.Prolexicusesdataanalyticstodrawinformedconclusionsandanswerquestionssuchas:

IsasiteunderDDoSattackoristhisanotherkindofnetworkanomaly,suchasaflashcrowd?

Ifunderattack,whattypeofDDoSthreatisthisandwhichpartofthecustomer’sinfrastructurecouldbemostaffected?

Wherearetheattackscomingfrom?Haveweencounteredtheseattackersbefore? Whataretheattacksignatures?Haveweseenthembefore?Aretheychanging?

Figure1:ProlexicleveragesawidevarietyofmetricsandmodelstoprovidemeaningfulDDoSinsight.

Page 2: Data Analytics and DDoS Mitigation: Lessons Learned

2

OurdataanalyticssystemProlexicacquiresbillionsofDDoSattackmetricsfromsensorsmonthly.Eachsensorsamplestensofthousandsofmetricseveryminuteandmaycapture30to40metricsforeachnetworkobjectorapplication.Somecustomershaveasmanyas30,000networkmetrics.OursystemdistillsthedataforourDDoSmitigationexpertstoanalyzeandactupon.Bycorrelatingthemetricsandshowingtheirrelationships,Prolexic’smitigationexpertscansearchonthedatainrealtimeandextractintelligencetohelpthemmakethebestandfastestdecisionsonhowtomitigatetheattack.

Whatwe’velearnedThreeofthelessonswehavelearnedare:

UsingdataanalyticsforDDoSmitigationrequiresalargecapitalinvestmentandamulti‐yearefforttobuildasystemthatcantakemyriadsourcesofinformationandpresentitinawaythatsupportsrapiddecisionmaking.

Automaticdecision‐makingalgorithmsarepronetofalsepositives.Soasgoodastoday’sanalyticssystemsare,forDDoSattacks,theycannotreplaceanexperiencedlivemitigationengineer.

Batch‐orientedanalyticssystems,suchasHadoop,havelatencythresholdsthataretooslowtosupportthereal‐timerequirementsofProlexic’scyber‐attackmitigationtimeframe.

GetthewhitepaperDataAnalyticsandDDoSMitigation:LessonsLearnedathttp://www.prolexic.com/ddosanalyticsformoredetailsandconclusions,including:

ThethreeimportantquestionstoaskofyourDDoSdata Theproblemoffalsepositives Thelatencychallengesofbatch‐orientedanalytics ThegapbetweenthecapabilitiesofautomatedsystemsandliveDDoSattackers HowProlexicmanagesthebigdataassociatedwithDDoSattacks Morelessonslearned

AboutProlexic

ProlexicTechnologiesistheworld’slargestandmosttrustedproviderofDDoSprotectionandmitigationservices.Learnmoreatwww.prolexic.com.

AboutPLXsert

ProlexicSecurityandEngineeringResponseTeam(PLXsert)monitorstheglobalmaliciouscyberthreatsandactivelyanalyzesDDoSattacksusingproprietarytechniquesandequipment.