2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... ·...

26
© 2015 Imperva, Inc. All rights reserved. Protect Your Assets with Single IP DDoS Protection Shahar BenHador CISO Dvir Shapira Director, Product Management @imperva @Incapsula_com

Transcript of 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... ·...

Page 1: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Protect  Your  Assets  with  Single  IP  DDoS  Protection

Shahar Ben-­HadorCISO

Dvir ShapiraDirector,  Product  Management@imperva@Incapsula_com

Page 2: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Agenda

• DDoS threat  trends• Current  solutions• IP  Protection  overview• How  Imperva  is  using  IP  Protection• Lessons  learned

Confidential2

Page 3: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Speaker  Bio  for  Dvir Shapira

• Background– BSc  in  physics  (no  idea  why  I  did  it…)  and  EE– Saw  the  bubble  burst  around  me  as  a  part-­time  startup  employee  back  at  2001

– Held  various  roles  at  Applied  Materials,  CheckPoint,  Incapsula  and  a  few  startups.

• Director  of  product  management• Email:  [email protected]

3

Page 4: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Speaker  Bio  for  Shahar Ben-­Hador

• Background– BSc  in  Math  and  Computer  Science– More  than  7  years  with  Imperva– Held  various  roles  at  Imperva  around  Infrastructure   and  Security

• CISO• Email:  [email protected]

4

Page 5: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

DDoS Protection  Today1

Page 6: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved. Confidential6

Page 7: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved. Confidential7

DDoS Propelling   the  Rise  of  Cyber  Extortion

“Any  organization   can  be  hit  by  a  DDoS attack”  – Swiss  Governmental  Computer  Emergency  Response  Team

• Armada  Collective,  DD4BC,  others  continue  threatening  attacks  for  Ransom

• Even  governments  are  alerting  organizations  of  the  growing  threat

• The  need  for  comprehensive,  upstream  mitigation  is  urgent

Page 8: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

You  may  not  be  protected   even  if  you  have  anti-­DDoS

• Non-­HTTP  assets  are  still  vulnerable

• An  attack  on  an  exposed  server  can  bring  down  your  entire  infrastructure

• Protected  HTTP  servers  can  still  suffer  direct-­to-­origin  attacks

• Public  cloud  servers  can  be  vulnerable

Confidential8

Page 9: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

What  are  the  alternatives?

• Use  a  different  set  of  IPs

Confidential9

DDoS

LegitTraffic

• On  demand  BGP

• TCP/UDP proxy

• Single  IP  protection

Page 10: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

IP  Protection

Confidential10

DDoSLegitTraffic

Incapsula  Network

GRE  Tunnel

Incapsula  IP  Address1.2.3.4

Customer  Infrastructure

• Provides  complete  Infrastructure  DDoS protection  for  single  IP  addresses

• Deploys  as  an  always-­on  service  for  immediate  detection  and  mitigation  of  DDoS attacks

• Enables  origin  protection  for  DNS  redirection  based  services  (e.g.  CDNs)

Page 11: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Common  Use  Cases2

Page 12: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Customer  Story  (1/3)

Confidential12

We  have  constant  DDoS  attacks  on  three  IPs  in  which  we  use  proprietary  protocols.  Looked  at  four  different  vendors,  none  of  them  were  able  to  provide  a  decent  protection.  

Diego  T  |  CTO,  Online  Poker  site

No  C-­Class  ranges,   using proprietary  protocol

Page 13: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

BGP  on-­demand  customer,  requires   always  on

Customer  Story  (2/3)

Confidential13

We  use on-­‐demand  BGP,  but  for one  specific  server  we  want  to  deploy  an  always  on  solution.John  O  |  IT  Director,  video  conferencing  platform

Page 14: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Customer  Story  (3/3)

Confidential14

DDoS attacks  on  a  few  customers  can  affect  the  entire  ISP  operation.  We  need  to  identify  the  few  targets  and  protect  them,  to  keep  our  whole  network  from  being  burdened  by  attack.

Tim  W  |  Ops  Manager,  ISP

ISPs need   to  protect Specific  IPs  that  are  vulnerable

Page 15: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

How  it  Works3

Page 16: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Confidential16 ©  2016  Imperva,   Inc.  All  rights  reserved.

How  it  works

Customer Origin  Server

1.1.1.1

Traffic  is  routed  directly  to  the  server

Page 17: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Confidential17 ©  2016  Imperva,   Inc.  All  rights  reserved.

How  it  works

Customer Origin  Server

1.1.1.1

Incapsula  establishes  a  GRE  tunnel  between  its  CDN  and  the  origin  server

Page 18: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Confidential18 ©  2016  Imperva,   Inc.  All  rights  reserved.

How  it  works

Customer Origin  Server

1.1.1.1

Incapsula  assigns  a  unique  IP  to  the  customer

2.2.2.2

Page 19: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Confidential19 ©  2016  Imperva,   Inc.  All  rights  reserved.

How  it  works

Customer Origin  Server

Customer  changes  the  DNS  record  to  point  to  the  Incapsula allocated  IP

2.2.2.2

Page 20: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

Confidential20 ©  2016  Imperva,   Inc.  All  rights  reserved.

How  it  works

Customer Origin  Server

All  traffic  is  routed  through  the  Incapsula  global  networkOnly  clean  traffic  is  passed  to  origin

2.2.2.2

Page 21: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Safeguarding  our  Own  House4

Page 22: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Proof   in  the  Pudding

• All  IP  ranges  need  to  be  protected

• Non-­HTTP  entry  points  usually  weak  links  (e.g.  VPN  tunnels  with  customers,  client  server  applications)

• We’re  implementing  on-­demand  Infrastructure  Protection  with  IP  Protection  for  all  non-­HTTP  apps

• This  approach  provides  full  coverage  for  all  assets

Confidential22

Page 23: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Imperva  Architecture

Confidential23

Cloud  Based  DDOSand  WAFProtection  (Incapsula)  

Redundant  EnterpriseDatabase  Firewalls

Redundant  Enterprise  Web  Application  

Firewalls

Database  Servers  Network

Application  Servers  Network

Web  Servers  Network

RedundantISP

Connections

Redundant  Enterprise  Edge  

Routers

Redundant  Enterprise  Firewalls,IPS,AV

Website  Protection

Infrastructure  Protection

Page 24: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.24

Questions?  

Page 25: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address

©  2015  Imperva,   Inc.  All  rights  reserved.

Lessons  Learned

• Organizations  face  growing  risk  of  DDoS attacks  for  ransom

• Existing  mitigation  solutions  may  still  have  vulnerabilities  that  leave  organizations  exposed

• Always-­on  IP-­level  DDoS protection  is  the  only  way  to  completely  secure  your  network  infrastructure

Confidential25

Page 26: 2016.03 IP Protection Webcast v3[1]files.meetup.com/16943162/Incapsula's 'Protect Your... · IP"Protection 10 Confidential Legit DDoS Traffic Incapsula" Network GRE"Tunnel Incapsula"IP"Address