您好,欢迎访问三七文档
当前位置:首页 > 行业资料 > 国内外标准规范 > ISP Security by GenieATM-SC
GenieATM安全解决方案—异常流量检测和&MitigationGenieNRMApril,2007GenieATMseriesAgenda网络威胁的趋势和挑战运营商级别的安全解决方案—GenieATM异常流量的侦测和Mitigation案例运营商网络威胁的趋势和挑战GenieATMseriesISPSecurityFacts…TrendofThreats–“Botnet”AservantprocessonacompromisedsystemInstalledbyatrojanorwormsCommunicateswithahandlerSystemofbotsandhandler(s)isreferredtoasabotnetorzombienetworkDDoSisstilltheprimaryconcernfornetworksecurityoperationsDDoSandWormsaretop2concernsofSPsBrute-forceattacksaremostpopularandeffectiveGenieATMseriesHowBigIstheProblem?Wide-spread1,000,000+botnetidentifiedrecentlyFastGrowingAsmanyas172,000+newbotsrecruitedeveryday(reportbyCipherTrust)FirePowerBotnetdrivenattackshavebeenresponsibleforsingleDDoSattackflowsofmorethan10GbpsaggregatedcapacityGenieATMseriesAttackImpactsCustomerImpactingAttacks:Anaverageof40customerimpactattackspermonthreportedInfrastructureImpactingAttacks:Targeteddirectlyattheinfrastructure,aswellasaresultofcollateraldamagefromcustomerattacksMostoperatorshadnetsecuritytoolsinplace,thoughnotcoveringtheentirenetperimeterDetectionandmitigationmechanismsneedtobeimprovedandbedeployedubiquitouslyGenieATMseriesChallenges&Requirements(1)Needtoidentifytheinfectedhosts(Zombies/Bots)orvictimsaspreciseasindividualIPs☞LocateAttacking/InfectedIPaddressesNeedmoreaccuratedetectionmechanismsinresponsetothenatureofDDoS/Wormattacks☞ProtocolMisuse,ApplicationAnomaly☞DynamicBaselineLearning☞BlackList☞DarkIP/WormTrafficAnalysisGenieATMseriesChallenges&Requirements(2)NeedVariousMitigationTechniques:☞ACLs☞BGPBlack-holeRouting☞IntelligentFilteringNeedResourcefulInvestigationandForensics☞Flexibletroubleshootingtools☞AbundantanomalyreportsTheISPSecuritySolutionGenieATMv4.7(MP)GenieATMseriesWhatisGenieATMCollectDetectAnalyzeAction•NetFlowv5/v9•sFlowv4/v5•HuaweiNetstream•BGP•SNMP•NetworkModel•Rule-basedReport•TrafficMatrix•AttributesAnalysis•DynamicTopN•TrafficAnomaly•Worm•DoS/DDoS•InterfaceAnomaly•RouteInstability•Alarm/Notification•Troubleshooting•Forensic•ReportRebuild•Mitigation--AFlow-basedTrafficAnalysisandAnomalyDetectionSolutionGenieATMseriesEnhancedSecurityFeaturesGenieATMv4.7(MP)AccuratedetectionmechanismsProtocolMisuse,DynamicBaselineLearning,Dark-IPAnalysis,BlackListPreciseimpactidentificationLocateinfectedhosts(Zombies/Bots)andvictimsasdetailedasIPaddressesVariousMitigationTechniquesACLs,Black-hole,3rd-partyMitigationResourcefulInvestigationandForensicsAccurateDetectionMechanisms1.TrafficAnomaly2.ProtocolMisuse3.ApplicationAnomaly4.DarkIPAnalysisGenieATMseriesTrafficAnomaly:DynamicBaselineLearningNeedsISPhasnotimeornoideatoconfigurethousandsofbaselines.BenefitsSavetimefromautolearningnormaltrafficswithoutmanualconfiguration.ReducefalsealarmsbyDynamicThresholdandLatencymechanism.DailyTrafficLevel1-Jul11-Jul21-Jul31-Jul00:0000:3001:0001:3031-JulTolerance%ThresholdLearningbaselinefromhistoricaltrafficTrafficBaselineRecoveryLatencySeverityLatencyRecoveryLatencyThresholdAlarmMechanismyelloweventredeventGenieATMseriesProtocolMisuse:DetectDoS/DDoSAttacksWhenahostreceivesahugenumberofpacketsasbelowwithinashorttime,itshallbeidentifiedasthevictimofaDDoSattack:TCPSYNFloodingTCPRSTFloodingICMPFloodingUDPFloodingTCPFragment,UDPFragment,IPNULL,TCPNULL,LandAttackGenieATMseriesApplicationAnomaly:DetectWormAttacksDetectknownwormattacks:MSBlaster,Sasser,CodeRed,SQLSlammer,etc.ImplicitDoSimpactsofwormmoreconcerningthanwormpayloaditselfGenieATMcanlocatetheinfectedhostspropagatingwormtrafficGenieATMseriesAB????Internetdarkaddressspace(nocomputerwillresponse)FlowdataWhatisDarkIP?BGProutingnon-exist,unallocatedIPprefixSignsofDDoSattacksorscanATTACKERVICTIMDarkIPTrafficAnalysis:WhyDarkIPAnalysis?•Host/portscanning:92%•DDoSbackscatter:5%•Configurationmistakes:2%•Other:1%DoSATTACKREPLYGenieATMseriesDarkIPTrafficAnalysis:DarkIPMonitoring&ReportingDarkIPReportsInfectedHosts,HomePrefix,Interface,CustomerInadditiontoDarkIP,BlacklistalsohelpstomonitormaliciousIPaddressesPreciseImpactIdentificationGenieATMseriesIdentifyinfectedhosts(Zombies/Bots)andvictimsInfectedhostsVictimsSupportHost-basedDetectionMorethanCustomer-orPrefix-baseddetectionSupporteddetectiontypes:Protocol-Misuse,ApplicationAnomaliesGenieATMseriesApplicationAnomaly:DetectWormAttacksGenieATMaggregateswormtrafficandlocatesinfectedobjects:Locatehosts(InfectedHostsReport),‘LocateIPprefix(HomePrefixReport),LocatePath(InterfaceReport),LocateCustomers(CustomerReport)AnomalyMitigationOptions1.RouterACLsupport2.BlackHole3.3rd-partyTrafficCleansing(CiscoGuard,FlowSpec)GenieATMseries1.RouterACLSupportGenieATMseries2.BlackHoleviaBGPRouteRegionalNetworkRegionalNetworkGenieATMDetectAnomalyTrafficfromNetFlow1BGPannouncement23iproute192.1.1.2255.255.255.255Null03iproute192.1.1.2255.255.255.255Null0GenieATMseries3.3rd-partyCleanCenterDDoSDetectionCleanPipeTrafficControlDDoSMitigationNetwork-wideAnomalyTrafficDetectionNetwork-wideReal-timeTroubleshootingGenieATMCleanCenterNeedsArealeffectiveDDoSprotectionsolution.ProtectISP’simportantcustomersfrommaliciousDDoSa
本文标题:ISP Security by GenieATM-SC
链接地址:https://www.777doc.com/doc-5121670 .html