41

(SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

Embed Size (px)

DESCRIPTION

In this session, we'll give an overview of Distributed Denial of Service (DDoS) and discuss techniques using AWS and security solutions from AWS Marketplace to help build services that are resilient in the face of DDoS attacks. We'll discuss anti-DDoS features available in AWS, such as Route 53's Anycast Routing, Auto Scaling for EC2, and CloudWatch's alarms, and how these features can be used jointly to help protect your services. Also, you'll hear from CrownPeak, an AWS Technology Partner, on how it used techniques discussed in the presentation to help mitigate an actual DDoS attack.

Citation preview

Page 1: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 2: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 3: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 4: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

• Infrastructure attacks (Layer 3 / 4)– Average attack size is 900Mbps (50% under 500Mbps)

– 78% of attacks are infrastructure (simple to launch)

• Application attacks (Layer 7)– 22% of all attacks target port 80 & 443 (more complex)

• Multi-vector – different attack types simultaneously

• Amplification (NTP, SSDP, DNS, Chargen, SNMP)

• Hit and run DDoS (91% < 1hour) and smokescreens (16-18%)

Page 5: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

X

Page 6: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

GET GET GET GET GET GET

G - E - T

Page 7: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 8: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 9: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 10: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

web app

server

DMZ public subnet

ssh

bastion

NAT

ELBusers

admin

internet

Amazon EC2security group

security group

security group

security group

frontend private subnet

TCP: 8080

Amazon EC2

TCP: 80/443

backend private subnet

security group

TCP: 1433;

3306

MySQL db

TCP: Outbound

TCP: 22

Page 11: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

ELB

users

security group

DMZ

public subnet

Amazon

Route 53

CloudFront

Edge Location

security group

web app

server

Frontend server

private subnet

DDoS

Page 12: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 13: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 14: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 15: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

ELB

users

security group

DMZ

public subnet

Amazon

Route 53

CloudFront

Edge Location

security group

web app

server

Frontend server

private subnet

DDoS

Page 16: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

InternetConnection C

InternetConnection A

InternetConnection B

CloudFront

ValidObject Request

InvalidProtocol

InvalidObject Request

Country B

Country A

Country C

Route A

Route B

Route C

users

Page 17: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 18: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 19: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 20: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

Security

Group

Auto Scaling 1:1

WAF Master

Auto Scaling

WAF Worker

Admin

Auto Scaling

Web

Application

Management /

Monitoring

Custom Profile

Configuration ELB

ELBELB

Amazon S3

Web Traffic

Unauthorized

Web Traffic

Page 21: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 22: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 23: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

ELB

security group

DMZ

public subnet

CloudFront

Edge Location

security group

web app

server

Frontend server

private subnet

DDoS

users

Page 24: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

ELB

security group

DMZ

public subnet

CloudFront

Edge Location

security group

web app

server

frontend server

private subnet

DDoS

users

Page 25: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

ELB

security

group

DMZ

public subnet

CloudFront

Edge Location

security group

WAF / Proxy

private subnet

DDoS

users

WAF

Auto

ScalingELB

security

group

Auto Scaling

security

group

frontend servers

private subnet

web app

server

Page 26: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 27: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 28: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 29: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 30: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 31: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 32: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 33: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 34: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 35: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 36: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

9:30 pm PDTTraffic analysis suggests opportunity to mitigate attack by revising configuration.We also decide to disable auto-scaling to preserve data for FBI forensic analysis.

10:34 am PDTFirst indications of impaired response from monitors. Traffic ramps dramatically.

12:30 pm PDTAttack initially targets IP addresses of A record. Switch to Route53 CNAME as cutout eliminates traffic.

6:24 pm PDTAttack resumes (targeting CNAME this time). Traffic ramps dramatically.

Page 37: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014
Page 38: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

2:15 am PDTBad guys give up. Attack stops … Hah!

9:30 pm PDTTraffic analysis suggests opportunity to mitigate attack by revising configuration.We also decide to disable auto-scaling to preserve data for FBI forensic analysis.

10:34 am PDTFirst indications of impaired response from monitors. Traffic ramps dramatically.

12:30 pm PDTAttack initially targets IP addresses of A record. Switch to Route53 CNAME as cutout eliminates traffic.

6:24 pm PDTAttack resumes (targeting CNAME this time). Traffic ramps dramatically.

1:00 am PDTRevised configuration in place. The arms race begins …

7:17 pm PDTPeak capacity deployed:- 17 c3.8xlarge HA proxies- 34 m3.large web servers

Bad guys run out of gas … traffic plateaus. 1-3 second response times.

Page 39: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

Per-instance metric

First attack:IP specific

Second attack:arms race

Sigh of relief …

Page 40: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

Customer CIO

“Team - I have been sitting here in

my hotel room thinking about what

this team has been able to

accomplish over the past 2 days and

it has been amazing. Not really my

style to think we are out of the woods

yet...but the level of effort and

coordination has been world class.

To the CrownPeak/AWS team...

Thank you for all of your efforts to

assist our organization. You should

know that it has been greatly

appreciated at all levels.”

Page 41: (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | AWS re:Invent 2014

Please give us your feedback on this session.

Complete session evaluations and earn re:Invent swag.

http://bit.ly/awsevals