DOTS WG
Operational Requirements DDoS Open Threat Signaling (DOTS) Working Group
Chris ¡Morrow ¡<morrowc@ops-‑netman.net> ¡ Network ¡Security ¡Engineer, ¡Google ¡ ¡ Roland ¡Dobbins ¡<rdobbins@arbor.net> ¡ Principal ¡Engineer, ¡Arbor ¡Networks ¡
DDoS Open Threat Signaling (DOTS) Working Group Operational - - PowerPoint PPT Presentation
DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements Chris Morrow <morrowc@ops-netman.net> Network Security Engineer , Google Roland Dobbins <rdobbins@arbor.net>
DOTS WG
Operational Requirements DDoS Open Threat Signaling (DOTS) Working Group
Chris ¡Morrow ¡<morrowc@ops-‑netman.net> ¡ Network ¡Security ¡Engineer, ¡Google ¡ ¡ Roland ¡Dobbins ¡<rdobbins@arbor.net> ¡ Principal ¡Engineer, ¡Arbor ¡Networks ¡
DOTS WG
2 ¡
DOTS WG
What is a Distributed Denial of Service (DDoS) attack?
design or implementation, or exploit lack of infrastructure capacity
(i.e., DDoS)
than the attack itself
data/Internet! No revenue!
DDoS Background
DOTS WG
Confiden'ality ¡ Integrity ¡ Availability ¡
Three Security Characteristics
characteristics
DOTS WG
Three Security Characteristics
maintaining availability in the face of attack
Confiden'ality ¡ Integrity ¡
Availability ¡
DOTS WG
6 ¡
DOTS WG
7 ¡
Common Perception of Internet Security Posture Today
DOTS WG
8 ¡
Actual State of Internet Defenses Today
DOTS WG
9 ¡
Who Can Help? Your ISP or MSSP!
DOTS WG
10 ¡
How Can You Ask for Help Today?
Technology pioneered by Robert Hooke in 1667, only slightly improved!
DOTS WG
11 ¡
Asking for Help is Hard! Knowing How to Help is Harder!
traffic looks like, much less what’s actually happening when they’re being DDoSed (or even understanding that they’re under attack!).
for their end-customers. In many (most?) cases, end- customers cannot articulate what servers/services need protection, what network access policies should be in place, etc.
end-customers (and customers of those end-customers).
DOTS WG
12 ¡
Automated DDoS Attack Notification Methods Exist Today
mitigation providers, MSSP DDoS cloud mitigation providers. Effective coordination during an attack is for all practical purposes impossible.
can’t signal for mitigation, even if they have the ability to detect and classify DDoS attacks (think Apache mod_security/mod_evasive, BIND RRL).
working to mitigate DDoS attacks.
miscuing occurs between defenders.
degrees of mitigation configurability (most end-customers wouldn’t know what to configure), and can be difficult to access during an attack when IDC & client LAN transit are conflated.
DOTS WG
13 ¡
DDoS Defense Becomes a Typing Contest . . . Attacker.
DOTS WG
14 ¡
DDoS Defense Becomes a Typing Contest . . . Defender.
DOTS WG
15 ¡
Largely Static, Low-Agility Defenses . . .
DOTS WG
16 ¡
. . . Lead to Predictable Outcomes.
DOTS WG
17 ¡
Coordination of DDoS Defenses, Circa 1995.
DOTS WG
18 ¡
Coordination of DDoS Defenses, Circa 2005.
DOTS WG
19 ¡
Coordination of DDoS Defenses, Circa 2015.
DOTS WG
20 ¡
We Can – and Must – Do Better Than This!
DOTS WG
21 ¡
We Need a Standardized Way of Sharing Information . . .
DOTS WG
22 ¡
. . . Across a Fast, Low-Latency, Unreliable Transport . . .
DOTS WG
23 ¡
. . . Across a Reliable Transport That Will Make It Through Policies . . .
DOTS WG
24 ¡
. . . Tell Us About Itself, Its Problems, and Its Desired Actions. . .
DOTS WG
25 ¡
. . . That Can Be Relayed Internally and Externally as Needed . . .
DOTS WG
26 ¡
. . . Everyone and Everything on the Network Can Participate . . .
DOTS WG
27 ¡
. . . In Coordinated, On-Demand DDoS Defense.
DOTS WG
28 ¡
DOTS WG
29 ¡
DOTS WG
30 ¡
DOTS WG
31 ¡
DOTS WG
32 ¡
DOTS WG
This Presentation – http://bit.ly/1I2IVrF
DOTS WG
Chris ¡Morrow ¡<morrowc@ops-‑netman.net> ¡ Network ¡Security ¡Engineer, ¡Google ¡ ¡ Roland ¡Dobbins ¡<rdobbins@arbor.net> ¡ Principal ¡Engineer, ¡Arbor ¡Networks ¡
DDoS Open Threat Signaling (DOTS) Working Group