Top Banner
Radware 2012 Global Application & Network Security Report January 2013
31

2012 Global Application and Network Security Report

Aug 20, 2015

Download

Documents

Radware
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2012 Global Application and Network Security Report

Radware 2012 Global Application & Network Security Report

January 2013

Page 2: 2012 Global Application and Network Security Report

AGENDA

About 2012 Global Security Report

Key Findings & Trends

Attack Tools Trend

Recommendations

Page 3: 2012 Global Application and Network Security Report

3

Information Resources

• Industry Security Survey– External survey – 179 participants– 95.5% are not using

Radware DoS mitigation solutions

• ERT Cases – Internal survey– Unique visibility into attack

behavior– 95 selected cases

• Customer identity remains undisclosed

ERT gets to see attacks in

real-time on daily basis

Page 4: 2012 Global Application and Network Security Report

AGENDA

About 2012 Global Security Report

Key Findings & Trends

Attack Tools Trend

Recommendations

Page 5: 2012 Global Application and Network Security Report

5

Organizations Bring a Knife to a Gunfight

• “Someone who brings a knife to a gun fight” – Organizations who do prepare for the fight, but do not

understand its true nature

• Organizations today are like that– They do invest in security before the attack starts, and conduct

excellent forensics after it is over– However, there is one critical blind-spot – they don't have the

capabilities or resources to sustain a long, complicated attack campaign.

• Attackers target this blind spot!

Page 6: 2012 Global Application and Network Security Report

6

Attacked in 2012

They had the budget.They made the investment.

And yet they went offline.

Page 7: 2012 Global Application and Network Security Report

7

Organizations Deploy Two-phase Security Approach

Page 8: 2012 Global Application and Network Security Report

8

Attacks Today Have 3 Phases

Page 9: 2012 Global Application and Network Security Report

9

ERT Cases – Attack Duration Trend

Page 10: 2012 Global Application and Network Security Report

10

ERT Cases – Attack Vectors Trend

Page 11: 2012 Global Application and Network Security Report

11

ERT Introduces Its APT Score

Page 12: 2012 Global Application and Network Security Report

12

ERT Cases – APT Score Trend

Page 13: 2012 Global Application and Network Security Report

13

How Likely is It That Your Organization Will Be Attacked?

Page 14: 2012 Global Application and Network Security Report

14

How Well Are You Prepared?

Page 15: 2012 Global Application and Network Security Report

15

Attack Vector Trends

Page 16: 2012 Global Application and Network Security Report

16

Entities That Are The Bottlenecks in DoS Attacks

Page 17: 2012 Global Application and Network Security Report

17

Solutions Used Against DoS Attacks

Page 18: 2012 Global Application and Network Security Report

18

Dedicated Versus General Solutions

Page 19: 2012 Global Application and Network Security Report

19

Attackers Motivation Trend

Page 20: 2012 Global Application and Network Security Report

20

Who’s on the Target List?

Page 21: 2012 Global Application and Network Security Report

AGENDA

About 2012 Global Security Report

Key Findings & Trends

Attack Tools Trend

Recommendations

Page 22: 2012 Global Application and Network Security Report

22

HTTPS Based Attacks

• HTTPS based attacks are on the rise• SSL traffic is not terminated by DDoS Cloud scrubbers or DDoS solutions • SSL traffic is terminated by ADC or by the web server• SSL attacks hit their target and bypass security solutions

Page 23: 2012 Global Application and Network Security Report

23

Content Delivery Network (CDN)

Page 24: 2012 Global Application and Network Security Report

Attacks Evade CDN Service

Internet

Legitimate users

CDN service

Botnet

GET www.example.com

Backend Webserver

GET www.example.com/?[Random]

Legitimate requests are refused

• In recent cyber attacks, the CDN was easily bypassed

by changing the page request in every Web transaction

• These random request techniques forced CDNs to “raise the curtain”– All the attack traffic is disembarked directly to the

customer premise– More difficult to mitigate attacks masked by CDN

24

Page 25: 2012 Global Application and Network Security Report

25

Servers Enlisted to the Botnets Army

• In 2012 a dramatic change occurred in the DDoS landscape

• Attackers build and activate Botnets of powerful servers to achieve:– Greater firepower - x100 higher bandwidth capacity vs. home PC– Greater reliability - servers are always online– Greater control – fewer machine to control vs. botnet of PCs

Page 26: 2012 Global Application and Network Security Report

26

DDoS Infrastructure Changes

Page 27: 2012 Global Application and Network Security Report

AGENDA

About 2012 Global Security Report

Key Findings & Trends

Attack Tools Trend

Recommendations

Page 28: 2012 Global Application and Network Security Report

28

Attackers Are Well Prepared

• Attackers plan and run attacks on a regular basis• Turning DDoS attacks into their profession• Organizations face attacks a few times per year• Too limited experience to build the required “know how”

Page 29: 2012 Global Application and Network Security Report

29

Conclusions

• Today’s attacks are different:– Carefully planned– Last days or weeks– Switching between attack vectors

• Organizations are ready to fight yesterdays’ attacks:– Deploy security solutions that can absorb the first strike– But when attacks prolong - they have very limited gunfire– By the time they succeed blocking the first two attack vectors,

attackers switch to a third, more powerful one

Page 30: 2012 Global Application and Network Security Report

30

Recommendations

• Acquire capabilities to sustain long attacks• Train a team that is ready to respond to persistent attacks • Deploy the most up-to-date methodologies and tools• 24 x 7 availability to respond to attacks• Deploy counterattack techniques to cripple an attack

Page 31: 2012 Global Application and Network Security Report

Thank Youwww.radware.com