Ddos Response Playbook: Why You Should Read This Guide?
Ddos Response Playbook: Why You Should Read This Guide?
2
DDoS 101 The Basics
Before preparing a DDoS response plan, lets set the groundwork by answering a few key questions
regarding the nature of the threat and how these attacks impact your organization.
Given the relative simplicity and low cost of instigating a DDoS attack, as well as the relative
impunity perpetrators enjoy, these trends are hardly surprising. Simple, low-cost DDoS toolkits and
botnet-for-hire services costing as little as $50 for an attack leave no online network, application,
service, or website immune from danger.
3
Competitors
DDoS attacks are increasingly being used as a competitive business tool. Some are designed to
keep a competitor from doing online business or participating in a significant event such as Cyber
Monday (the cyber equivalent of blocking the entrance to your competitors store). If your site is
down, your services are disrupted and consumers may flock to your competitor. Even a very small
amount of downtime can end up costing a company many thousands of dollars.
Vandals
And then there are black hat hackers innately nasty people who get a kick out of bringing down a
companys website. In the words of Batmans faithful butler, Alfred Pennyworth, Some men just want
to watch the world burn. DDoS vandals are the equivalent of the first generation of computer virus
writers, looking for their fifteen minutes of fame.
What are the different DDoS attack methods and how do they
affect your website?
DDoS assaults are intended to do just what the name implies prevent a server or network resource from
performing actions it is charged with providing. Such attacks are generally divided into three types:
Network (OSI model layers 3 & 4) attacks clog the pipelines connecting your network,
website, or online service to the Internet. They send huge amounts of traffic, overwhelming
connection capacity until your systems become unavailable. The largest of these assaults, such
as SYN floods and DNS amplification, already exceed 200Gbps. These volumetric penetrations
continue to grow in size, fueled in part by the growing availability of cloud infrastructure.
Verizons 2014 Data Breach Investigations Report confirms this trend, showing an increase in
average attack size from 4.7 Gbps in 2011 to 10.1 Gbps in 2013.
Protocol attacks consume actual server resources, or those of intermediate communication
equipment such as firewalls and load balancers. They are measured in packets per second (p/s).
Application (OSI model layer 7) attacks seek to overload resources upon which an
application is running. The application crashes and takes the site offline. Layer 7 penetrations
typically mimic legitimate user traffic so as to evade an organizations common security
measures (including network layer anti-DDoS solutions). They do not require high volumes, for
even a rate of 50 100 requests/second is enough to cripple most mid-sized websites.
Over 80% of DDoS attacks employ multiple methods (according to Incapsulas report) to create
smokescreens, bypass protective solutions, and target multiple resources. Such multi-vector assaults
wreak havoc within organizations and confound even the most vigilant human operators.
4
Companies of all sizes experience DDoS attacks. They are often worse for larger organizations,
however. Findings from our 2014 customer survey show that those having 5,000 or more employees
are most likely to experience a DDoS encroachment, incur higher assault costs, and require more
employees to combat the problem.
5
Preparation
Building Your DDoS Response Team
Establishing your DDoS response team is a crucial preparatory step toward reducing the impact
of a DDoS attack. The first step is to identify the various people and departments within your
organization who will be in charge of both planning and execution. Your team must fulfill a range
of tasksfrom identifying and mitigating an attack to coordinating with ISPs, notifying customers,
communicating with the press, and minimizing potential reputation and liability issues.
Ideally, your DDoS response team should include representatives from marketing, operations,
customer service/support, legal, and IT security. These stakeholders should collaborate in developing
your plan and establishing the roles/responsibilities of each team memberboth in terms of
planning and execution.
Risk Assessment
In preparing your organization to deal with a DDoS incident, its imperative to understand the scope
of your risk. Which infrastructure assets need protection? What is the cost of a given asset becoming
unavailable? What are the thresholds for implementing your plan?
Caused by a DDoS incident, the impact of an extended outage can be measured in terms of lost
revenue and resources required to recover an asset. This risk needs to be evaluated against the cost
of implementing DDoS protection for the asset.
Websites and externally-facing applications (i.e., any application or service accessible from outside
your organization), are the crown jewels of the hacker community. The reason is simple disrupting
applications not only impacts online business, but is highly-visible to the world, affecting the user
experience of your customers. Its imperative, therefore, that your web applications should be
among the first assets to be reviewed for DDoS resiliency.
6
Other pieces of infrastructure such as email servers, FTP servers, VoIP services and back office
platforms, like a CRM or ERP, can also be targeted with a DDoS attack. In addition to assessing risk
for core business assets, business owners need to prioritize protection around infrastructure critical
to their business. To an online banking or e-commerce site, for example, website downtime due to
a DDoS attack means lost revenues and reputation damage. An insurance company, on the other
hand, may be less concerned about its corporate website than ensuring that their agents in the field
always have access to the back-office systems.
It is reasonable to assume that internal applications and services (i.e., those that can only be
accessed via the company network) do not require DDoS protection.
Testing
If youre using an on-demand DDoS mitigation solution, dont want to wait for an actual attack to
discover whether everything is in working order. As time goes by, you introduce new websites and
applications, and your DDoS protection vendor periodically updates its systems. Its important to
check the impact of these changes on your readiness.
For testing purposes, Incapsula recommends turning on your DDoS mitigation measures for a
two-hour period every 3 4 months (once a year at an absolute minimum). Certify your systems
and applications continue to function properly, traffic continues to arrive, and there is no negative
impact on your users.
Some DDoS mitigation providers bill on a per-incident fee. You may want to contact your provider
prior to testing to ensure that you wont incur undue fees.
Maintenance Aspects
Five years ago, switching IP addresses was a fairly common, short term method for avoiding DDoS
attacks. Today this method is no longer effective, for massive network attacks often target an entire IP
range (a.k.a., a subnet). Since the impact on your ISP remains the same, you still run the risk of being
kicked off its service.
Moreover, todays DDoS attacks are DNS-aware. Even if your new IP address belongs to a different ISP,
the attack is still able to reach its target destination.
Switching ISPs works as long as your secondary ISP is being protected from the attack. This means
that its anti-DDoS service is already in place and your new IP address is hidden.
Regarding network components, if youre considering upgrading to more robust equipment to
deal with DDoS attacks, think again. Your bandwidth is finite, while DDoS attack size of continues
to grow. Even equipped with a 20Gbps anti-DDoS appliance in front of your router/firewall, assaults
exceeding that limit will get stopped upstream by the size of your Internet link, creating a problem
for both you and your ISP.
8
Preparation Checklist
STEP 1: Build DDoS response team
Identify people and departments needing to be involved
Define roles and responsibilities
STEP 2: Create DDoS response plan
Define resources, tools, and procedures required to minimize the risk and costs of a DDoS incident
Plan should cover the steps below
STEP 3: Conduct risk assessment
Internet-facing applications and websites
Infrastructure assets
Third-party services
DNS services
STEP 4: Identify single points of failure
DNS server
Bandwidth (Internet link size)
Router and switches
Firewalls and other network equipment
STEP 5: Strategize with your ISP
What type of DDoS protection does it offer?
What type of DDoS attacks can it protect against (e.g., network layer, application layer)?
What type of assets can it protect: DNS servers? Infrastructure? Websites?
How much protection does it provide?
What is its SLA in terms of time to mitigation?
STEP 6: Other ISP-related issues
Working with two ISPs for redundancy
Optimize your DNS TTLs
STEP 7: Test DDoS readiness
Once every 3 4 months
9
Building the Right DDoS Protection Strategy
When it comes to selecting a DDoS protection solution, the good news is that there are highly-
effective technologies, products, and services available. The bad news is there are a lot of options
to choose from each representing a different protection approach. These include homegrown
solutions, cloud-based services, and appliances deployed within the data center.
There is not one right answer for everyone; each type of IT setup requires a different DDoS solution.
Think about your own requirements and choose a fully-compatible solution.
10
The majority of website visitors are automated, non-human users. Of those, roughly 50% are malicious and
perform functions such as DDoS attacks, comment spam, and site scraping.
Source: Incapsula Bot Report, 2014
WAF
DDoS is often used by sophisticated perpetrators as a means to an end in multi-vector attacks.
Here the DDoS assault serves as a smokescreen, tying up your IT security team and distracting
them from the true target (e.g., sensitive data theft, network resource compromises). In addition to
diverting attention, attackers use DDoS to weaken perimeter defenses or crash security appliances;
this increases their chance of success using more traditional vectors (e.g., exploiting known
vulnerabilities).
In seeking to protect your websites and applications against well-disguised layer 7 DDoS attacks,
youll require robust web application firewall (WAF) technology. This solution analyzes application
traffic, distinguishing potential risks from legitimate usage.
A WAF protects your website or web application against traditional methods used in a multi-vector
attack. This includes shielding against any type of application level hack, such as SQL injection, cross
site scripting (XSS), illegal resource access, remote file inclusion (RFI), and other vulnerabilities. Make
certain your WAF provider has the security expertise required to ensure your protection against new
and emerging attack techniques.
Deployment Modes
Your DDoS protection solution can be deployed in various ways (e.g., always on, on-demand) and
can be on-boarded using different strategies. Mix and match the following summary of options to
meet your organizations specific needs.
Always-on
Always-on DDoS protection, as it implies, means that your websites and applications are always
guarded from the moment it is deployed. This type of implementation offers instant DDoS
identification and mitigation, so your systems are protected from the first salvo of any assault.
This strategy has the quickest time-to-mitigation and negates the question of How long before
my solution kicks-in?
11
By definition, always-on is a more secure option, but you should take into account that not all
systems work optimally with DDoS protection continually engaged. The choice is dependent on
your systems, applications, and on the service youre considering.
For websites or web applications, services which are not based on a content delivery network
(CDN) can introduce such a high degree of latency that the user experience is greatly impeded.
On-demand mode may be preferable in these situations.
On-demand
On-demand services are only engaged when an attack is detected. Typically, it can take up to
three hours to activate such a solution due to internal procedures and escalation processes.
Activation may also depend on the day and time of detection). Meanwhile, the bombardment
continues at full strength resulting in performance degradation and potential downtime
during the critical first stages.
When choosing between always-on and on-demand, evaluate the possible impact on your
application performance versus the risk of being exposed to a DDoS attack until your solution is
engaged.
DNS Redirection for Web Application Protection
This deployment type of uses DNS redirection to reroute all website traffic (HTTP/HTTPS) through
the DDoS protection providers network. It requires changing your websites DNS setting to point
to your providers network; there incoming traffic is scrubbed prior to being routed back to the
IP address origin. DNS redirection offers fast and easy onboarding, since there isnt an additional
hardware or software requirement involved. As a bonus, it lets you keep your existing hosting and
application infrastructures.
Once traffic enters the providers network, various inspection layers identify and filter out malicious
DDoS traffic. While malicious traffic is weeded out, legitimate traffic continues to flow unhindered to
your protected websites.
However, in using DNS redirection particularly with respect to preventing layer 7 attacks the
degree of sophistication depends on the vendor.
Its important to understand the type of network through which DDoS attacks will be redirected.
Legacy scrubbing networks a simple collection of scrubbing servers through which traffic is routed
for cleansing impact website performance, since your data must transit through them en route
between a website and its users. A more modern and therefore preferable type of scrubbing
network is where the DDoS protection solution sits on top of a global CDN. CDNs do not introduce
latency and, in many cases, speed up web traffic thereby enhancing the user experience.
While true any type of DDoS mitigation method you employ, provisioning and implementing prior
to an attack is especially important. This is because SSL certificates may need to be configured so
that HTTPs-based traffic can also be inspected and cleansed.
12
Border Gateway Protocol (BGP) Routing
For enterprises needing to protect multiple service types and protocols across an entire subnet
range of IP addresses (known as a /24 or C-class subnet), BGP routing-based solutions are effective.
Typically these are an on-demand solution type. Theyre good for thwarting large volumetric and
advanced DDoS assaults targeting any type of protocol or infrastructure including HTTP/S, SMTP,
FTP, VoIP, et al. This deployment mode also provides origin protection against direct-to-IP attacks (i.e.,
attacks against network infrastructure/servers that target a specific IP address).
BGP routing most often requires an additional monitoring solution; it may be included as part
of the sale or as an add-on to identify attacks. During an attack traffic is redirected through a set
of distributed scrubbing centers using BGP announcements. From that point on, the protection
provider acts as the ISP, advertising all protected IP range announcements. All incoming traffic
is inspected and filtered; only clean traffic is securely forwarded to the application origin via GRE
tunneling or a dedicated cross-connect. Outbound traffic is returned asymmetrically via your usual
upstream ISP.
A minor drawback to using the BGP routing-based approaches is that latency may increase during
attacks. This happens because traffic must first be routed through the scrubbing network for
cleansing, without CDN technology in place to counteract the extra travel distance the data incurs.
Dedicated IP
For smaller organizations wishing to protect multiple service types and protocols, but do not have a
full C-class IP range, this is similar to IP-based protection. In this deployment mode (and unlike BGP),
the protection provider assigns you a dedicated IP address from its own IP range. Using this address,
all incoming traffic passes through the providers network where it is inspected and filtered. A
redundant, secure two-way GRE tunnel is used to forward clean traffic to the origin IP and to return
outbound traffic from the application to the users.
13
DNS Proxy
Deployed as an always-on service, proxy solutions can be used to safeguard DNS servers from
targeted DDoS attacks. To set this up, a proxy is deployed in front of your protected DNS servers,
where it inspects all incoming DNS requests. It filters out malicious requests, ensuring that only safe
queries reach your origin DNS server. Additionally, it also blocks attempts to use your server as a
platform for DNS amplification attacks targeting other servers.
Depending on the TTL settings of your name server, implementing a DNS proxy solution can
potentially be accomplished in minutes (but could take as long as 24 hours). Once enabled, the
proxy becomes your authoritative DNS server, while you continue to manage your DNS zone files
outside of the proxy network.
If you use an external DNS provider, a proxy service can help you avoid huge bills by offloading
large volumes of malicious traffic sent to the DNS server. Moreover, it reduces the chances of being
blacklisted from their service due to DDoS attacks originating from your site.
DNS proxies offer an added benefit in that they can also function as caching servers. If the proxies
are deployed globally, such as on a CDN, they can cache DNS requests and return results locally
thereby accelerating DNS server response times.
14
DDoS Mitigation Requirements Checklist
Attack Detection
Does the solution support automatic detection?
Does the solution scale on demand to mitigate massive network/protocol layer attacks?
Does the solution mitigate application layer attacks?
Time to Mitigation
Does the solutions time-to-mitigation match my business and operational needs?
User Classification
What user classification technologies are in place?
Can it distinguish between legitimate users and bots?
WAF
Do the solutions Im evaluating include a WAF?
If not, how will they protect me from application layer threats?
Always-On
Will I always be protected by the solution?
Do I need to engage it each time an attack occurs?
Deployment Mode
Does the solution deployment model make sense for my architecture?
DNS redirection for web applications
BGP routing for infrastructure protection
DNS proxy for DNS-targeted attacks
Physical link for infrastructure protection in shared data center
15
Responding to an Attack
Identifying an Attack
Early detection plays a pivotal role in minimizing the impact of a DDoS assault. Even before bringing
down your networks or systems, frontline appliances are affected, attack volume increases, and
performance further degrades for every second a penetration goes unnoticed.
Additionally, some DDoS Attacks patterns are specifically designed to exploit slow reaction times. For
example, so-called hit-and-run bursts rapidly flood a network with requests, slamming it again and
again every few minutes sometimes for days. Slow-to-respond manual safeguards are worthless in
such situations.
Many DDoS intrusions are launched over a weekend or on holidays, with the assumption that
response teams are not available. Coupling automatic detection with instant triggering of mitigation
measures offers a highly-effective 24 7 DDoS mitigation while eliminating time-consuming
manual procedures.
16
The Importance of a Communications Plan
Communicating with customers, partners, and the general public soon after a DDoS attack is vital for
preserving your organizations reputation.
The public will know that your site, service, or other systems are down keeping it secret simply
fuels fears. Instead, its better to explain to customers the difference between a DDoS assault and
other types of cyber-attacks that place customer data at risk.
If your organizations website has been afflicted by a DDoS attack, its possible your blog may also
be out of commission (if its hosted on the same server as the attack target). In such casein event,
social channels such as Twitter can be an effective communications vehicle, helping to limit damage
to your brand. This serves as another reason to invest in a secondary Internet connection, so as to
maintain external communication channels while under attack.
A communications plan helps your organization minimize brand damage and reduce the financial
impact of a DDoS attack, while also preparing it in advance to answer questions from customers, the
press, and shareholders (as applicable).
Process Analysis
By analyzing gaps in your DDoS response plan execution from both a technical and business
standpoint, you can adjust it to improve execution during future incidents. Here are some items to
evaluate:
Consider those preparation steps you could have taken to respond to the incident faster or
more effectively.
Adjust assumptions that affected the decisions made during DDoS incident preparation (if
necessary).
Assess the effectiveness of your DDoS response process in relation to communications.
Consider what relationships inside and outside your organizations could help you with future
incidents.
18
DDoS Glossary
Application DDoS Attacks
These attacks seek to overload resources upon which an application is running, for example, by
making excessive log-in, database-lookup or search requests. This type of attack typically mimics
legitimate user traffic so as to evade an organizations common security measures (including
network layer anti-DDoS solutions). Also known as Layer 7 attacks.
BGP (Border Gateway Protocol)
BGP is used to make core routing decisions on the Internet and is the protocol used by organizations
to exchange routing information. Incapsula uses BGP to enable organizations to redirect network
traffic through its scrubbing centers.
Bot
A web robot, or simply bot, is a computer that is under control of a third party.
Botnet
A botnet is a network of bots (zombies) that can be commanded as a single group entity by a
command and control system. Botnets receive instructions from command and control systems to
launch DDoS attacks.
DNS
The Domain Name System (DNS) is the way that Internet domain names are located and translated
into Internet Protocol (IP) addresses. A domain name is a meaningful and easy-to-remember handle
for an Internet address.
DNS Amplification (Reflection)
By forging a victims IP address, an attacker can send small requests to a DNS server and ask it to send
the victim a large reply. This allows the attacker to have every request from its botnet amplified as
much as 70 times in size, making it much easier to overwhelm the target.
DoS (Denial of Service)
DoS is an acronym for denial of service. A DoS attack typically uses one or a few computers to cause
an outage on the target.
DDoS (Distributed Denial of Service)
A distributed denial of service (DDoS) attack uses many computers (often bots) distributed across the
Internet in an attempt to consume available resources on the target. DDoS assaults are intended to do
just what the name implies render a server or network resource unavailable to its intended users.
ICMP (Ping) Flood
An ICMP flood overwhelms the target resource with ICMP Echo Request (ping) packets, generally
sending packets as fast as possible without waiting for replies. This type of attack can consume both
outgoing and incoming bandwidth, since the victims servers will often attempt to respond with
ICMP Echo Reply packets, causing a significant overall system slowdown.
Layer 3 and Layer 4 DDoS Attacks
Layer 3 and 4 DDoS attacks are types of volumetric DDoS attacks on a network infrastructure. Layer 3
(OSI model network layer) and Layer 4 (protocol layer) DDoS attacks rely on extremely high volumes
(floods) of data to slow down web server performance, consume bandwidth and eventually shut
down access for legitimate users. These attack types typically include ICMP, SYN and UDP floods.
Layer 7 DDoS Attack
A Layer 7 (OSI model application layer) DDoS attack is an attack structured to overload specific
elements of an application server infrastructure. Layer 7 attacks are especially complex, stealthy, and
difficult to detect because they resemble legitimate website traffic.
19
Network Layer Attacks
This type of DDoS attack clogs the pipelines connecting your network, website, or online service
to the Internet. They send huge amounts of traffic, overwhelming connection capacity until your
systems become unavailable. Also known as Layer 3/4 attacks.
Parameter Tampering
Parameter tampering targets web data such as referrer fields, form fields and cookies. By changing
the data in the files, servers can be made to process unexpected large amounts of data which can
exhaust their resources.
Scrubbing Centers
Scrubbing centers are technical facilities designed for filtering malicious DDoS traffic from inbound
traffic streams when mitigating DDoS attacks.
Security Operations Center (SOC)
A security operations center (SOC) is a centralized venue staffed with IT security experts who
monitor and defend enterprise networks and their components. Incapsulas 24x7x365 SOC provides
customers with proactive response and event management, continuous real-time monitoring, policy
tuning, summary attack reports and 24x7 support.
SSL Floods
Decrypting SSL traffic on the server side requires 15 times more resources than encrypting the traffic
on the client side. SSL floods exploit this asymmetry to overwhelm web servers, which are typically
able to handle up to 300 concurrent SSL requests.
SYN Flood
A SYN flood DDoS attack exploits a known weakness in the TCP connection sequence (i.e., the
three-way handshake). The client tries to establish a TCP connection with the host server, but
doesnt respond to the host servers request for acknowledgment. The host system continues to wait
for acknowledgment for each of the requests, tying up resources until no new connections can be
made, and ultimately resulting in denial of service.
Tear Drop Attacks (TCP Fragment Flood)
A teardrop attack involves sending TCP fragments with overlapping, over-sized payloads to the
target machine. When the server attempts to assemble the packet, these mangled packets can
cause the server to crash.
UDP Flood
This type of attack floods random ports on a remote host with numerous UDP packets, causing
the host to repeatedly check for the application listening at that port, and (when no application is
found) reply with an ICMP Destination Unreachable packet. This process saps host resources, and can
ultimately lead to inaccessibility.
Volumetric Attacks
Volumetric DDoS attacks are also known as floods. DDoS attackers seek to overwhelm the target
with excessive data, often using reflection and amplification DDoS techniques. See also Layer 3 and
Layer 4 attacks.
Web Application Firewall (WAF)
A web application firewall controls access to a specific application or service by applying a set of
rules to incoming HTTP traffic. A WAF is critical for detecting and preventing stealthy Layer 7 DDoS
attacks that mimic regular application traffic.
Learn more about the Imperva Incasula Web Application Firewall.
20
About Imperva
Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly
protecting high-value applications and data assets in physical and virtual data centers. With an integrated security
platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to
neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over
3,500 customers in more than 90 countries rely on our SecureSphere platform to safeguard their business. Imperva is
headquartered in Redwood Shores, California.
Learn more at www.imperva.com.
www.imperva.com