Fortiddos 2013 Upb-1
Fortiddos 2013 Upb-1
Fortiddos 2013 Upb-1
Fortinet Confidential
Agenda
• What is DDOS
• Classification of Attacks
• Approaches to DDOS Prevention
• DDOS and Market Trends
• Introducing FortiDDOS
• FortiAsic – Traffic Processor
• Deployment Scenarios
• Features and Benefits
2
What is DDoS?
Fortinet Confidential
Typical DDOS Motivations
• Financial
DDOS provides a revenue stream opportunity for the attacker who
targets ecommerce sites
How much would you pay to keep the store open?
• Political
DDOS is used to protest about a given issue, disrupt operations but the
primary motivation is not financial
The Armchair Hacktivist
4 Fortinet Confidential
What to attack?
Firewall
Firewall / IPS Device
connection tables,
ISP 2 forwarding and session
Back End Database
Servers
set up processing Server resources
SQL Injection vulnerabilities
5 Fortinet Confidential
The Classification of Attacks
Fortinet Confidential
Attack Traffic : Top Originating Countries
Source: Akamai
Fortinet Confidential
Ever Changing Landscape – Recent quote from
Wikileaks
Fortinet Confidential
Volume and Motivation – Size isn’t
everything
Fortinet Confidential
Cost and Mitigation
Fortinet Confidential
Existing solutions are broken
Fortinet Confidential
DDoS and Market Trends
Fortinet Confidential
Some Traditional Attacks
• SYN Flood
• Targets connection table resources
• Zombie Flood
• The classic botnet
• TCP/UDP Flood IP Spoofing, Reflection
One becomes many
Fortinet Confidential
Attack Tools
15 Fortinet Confidential
The Slowloris Attack
Fortinet Confidential
Introducing FortiDDoS
Fortinet Confidential
How it works – Baseline Building
Fortinet Confidential
How it works – Detection and Mitigation
Virtual Partitioning
Legitimate Traffic
Attack Traffic
• Correlated with the created traffic model Packet Flood
Mitigation
• Protocol Anomalies, Threshold Violations Stateful Inspection
Application level attacks Out of State Filtering
Heuristic Filtering
Fortinet Confidential
FortiAsic-Traffic Processor (TP)
No CPU in the path of the packets
No fast or slow path
No IP/M AC address in the path of the
packets
Network, Transport,
Application Layer State Anomaly
Anti-spoofing
Header Anomaly Prevention
Prevention
Network, Transport,
Dark Address, Geo-
Application Layer Source Tracking
location, IP Reputation
Access Control Lists
Fortinet Confidential
How Does It Work?
Fortinet Confidential
Deployment Scenarios
Fortinet Confidential
Virtual Partitions
Fortinet Confidential
Deployment Scenarios – VIDs
Wealth Management
Online Banking
Fortinet Confidential
Deployment Scenarios (Contd.)
Fortinet Confidential
Deployment Scenarios (Contd.)
Fortinet Confidential
FortiDDoS-100A
Power Single AC
Fortinet Confidential
FortiDDoS-200A
Fortinet Confidential
FortiDDoS-300A
Fortinet Confidential
FortiDDoS Features and Benefits
Feature Benefit
Fortinet Confidential 30
Complementary Fortinet DDoS Solutions
Fortinet Confidential
In Summary
• When under attack the defending appliance must be stable and deliver
predictable behavior, not possible with a general CPU and software
combination
Fortinet Confidential
THANK YOU
Fortinet Confidential