Corero White Paper The House Wins: Keeping Online Gambling in Play Against Denial-of-Service Attacks Defending Online Gambling Against DDoS Attacks TABLE OF CONTENTS Executive Summary .....................................................................1 The Stakes Are High for iGaming Companies ..............................1 Attackers Try to Rig the Game with Application-Layer Attacks....3 Criminals and Competitors Take a Piece of the Action................5 Best Bet: On-premises DDoS Defense .........................................6 Don’t Trust to Luck: Be Prepared.................................................7 The Winning Hand: Corero’s DDoS Defense System............................8 Defending Online Gambling Against DDoS Attacks Executive Summary Hackers are betting on distributed denial-of-service (DDoS) attacks to make money in the online gambling market. But what is making them money is costing revenue for the victim companies. Every second that someone cannot place a wager or play their favorite casino game translates not only to an immediate loss of revenue but to future losses, as players move on to other online gambling sites. DDoS attacks and the threat of a DDoS attack to extort ransom have been the cards criminals have played against online gambling — also known as Internet gaming or iGaming — companies over the last decade. Yet, these criminal attacks on online gambling businesses are growing in intensity and are continuing to shut down sites. The primary reason is the increasing sophistication of DDoS attack methods, particularly low and slow application-layer attacks, which are extremely difficult to detect and almost impossible to mitigate using traditional services and techniques. For the most comprehensive protection against all forms of DDoS attack, iGaming companies should bet on onpremises DDoS defense appliances. This white paper examines: who is responsible for the DDoS threat against the iGaming industry; what’s at stake for gambling services companies; the latest DDoS attack trends, and recommendations for an effective DDoS defense program to thwart those who would do your business harm. The paper also highlights how Corero Network Security provides a comprehensive solution that ensures continued availability of iGaming services to customers in the face of both new application- and traditional networklayer DDoS attacks. The Stakes Are High for iGaming Companies Global Online Gambling Revenue (Billions USD) 45 40 35 30 25 20 15 10 5 0 2005 2006 2007 2008 2009 2010 2011 2012 2013 Source: Global Betting and Gaming Consultancy DDoS attacks threaten the growing, multibillion-dollar global iGaming business. iGaming revenue is expected to reach $41.7 billion in the next year, according to Global Betting and Gaming Consultants (See “Online Global Gambling Revenue,” above). Online gambling is a high-speed, volatile market, in which time very literally is money. It also is intensely competitive, as online gambling companies vie for business from a finite pool of regular, repeat customers, as well as the more casual player. 1 Defending Online Gambling Against DDoS Attacks It isn’t surprising that DDoS is a widespread problem in the iGaming industry. Any business that relies on the Internet to make money is a target, and online gambling is at the forefront. A survey of 300 enterprises sponsored by Corero revealed that a third had suffered at least one DDoS attack in the past 12 months and 42% of those victim companies had experienced multiple attacks. Anywhere, anytime Internet access has upped the ante. Smart phones, tablet computing devices, high-speed home Internet access and extensive WiFi availability are creating a huge on-demand gambling environment. Online gambling providers have responded with a comprehensive selection of customer services, led overwhelmingly by sports wagering (see “Global Share of Online Gambling by Type,” below); followed by casino games, such as roulette and slot machines; online poker; skill games; bingo and lotteries. 13.3% 3.1% Global Share of Online Gambling by Type 12% 6.5% 16% 16.8% 40.6% 52% 19.6% 20% Sports Betting Casino Poker Bingo Skill & Other Gaming State Lotteries Source: Global Betting and Gaming Consultancy But customer loyalty can be fleeting, and DDoS attacks can drive away players in a hurry. Players want iGaming services that are always available. They expect a seamless experience. Internet gambling companies must ensure their sites are always up, with the full range of betting options available, without interruption or degraded performance. If a player faces a downed site or sluggish performance, they will place their bets on another site. 2 Defending Online Gambling Against DDoS Attacks Attackers Try to Rig the Game with Application-Layer DDoS Attacks Traditional Anti-DDoS Solutions These services can complement on-premises DDoS defense to protect against overwhelming attacks that saturate Internet links with traffic. Service Description Limitations OverProvisioning Bandwidth Enterprise purchases additional bandwidth to absorb flooding attacks. • Ineffective against application-layer attacks • Creates endless cycle of escalation • Reactionary • Not cost-effective “Clean-Pipe” Services ISP routes suspect traffic to proxy that “scrubs” it clean of malicious packets. • Ineffective against application-layer attacks • Reactionary • Legitimate traffic can be lost Specialized Cloud-based Services Service provider • Ineffective against application-layer scrubs traffic during a attacks network-layer attack, • Reactionary then routes good • No visibility into outbound traffic traffic to the client and server services network. DDoS attacks continue to succeed and seriously impact iGaming businesses largely because the new breed of insidious application-layer attacks frustrates traditional DDoS mitigation services. iGaming companies generally are well aware of the DDoS threat, many having had direct experience. They are all too cognizant that a welltimed sustained attack could cost them millions. So, they often turn to their Internet Service Providers (ISPs) to overprovision bandwidth to offset the impact of traditional network flooding DDoS attacks. They may also contract for so-called “clean pipe” anti-DDoS services or turn to specialized cloud-based service providers to combat DDoS attacks (See “Traditional Anti-DDoS Solutions,” above). But by betting on these services — once an almost sure thing — iGaming companies are not prepared for application-layer attacks. These solutions are ineffective against application-layer techniques, which are more difficult to detect and mitigate than traditional network attacks (such as SYN, UDP and ICMP floods that fill the Internet pipes with enormous volumes of traffic). Application-layer attacks, by comparison, create far less traffic and appear to be legitimate connections to targeted servers. Often, victim gambling companies are not even aware they are under attack – with the site remaining active but sluggish. For example, the popular repetitive HTTP GET attacks (see “Application Layer HTTP GET DDoS Attack”, p. 4), cripple the target server by overwhelming it with requests for a resource. The traffic seems “normal,” the volume is low, and the attack can be carried out by a small number of people or small botnet, compared to massive flooding attacks. 3 Defending Online Gambling Against DDoS Attacks Application Layer HTTP GET DDoS Attack Internet Bot Master GET GET GET GET GET GET GET GET GET GET GET GET GET Good TCP Connections GET Botnet Command and Control Repetitive HTTP GETs Bot Bot Botnet Victim Web Servers As a result, these attacks are more damaging, as gambling sites are taken off guard. By the time they realize they are under attack, their customers already are spending money at competitors’ sites. If the attacks are frequent and sustained, they may never return. Customer loyalty is only as good as the service they receive. Hackers know this and are betting on it to blackmail iGaming sites into paying ransom to stop attacks. Witness this reported comment from a spokesman for the online gambling site Paddy Power under DDoS attack in April 2011: “We are experiencing a protracted and malicious attack on our systems with the sole objective to bring down our website and prevent our customers from placing bets. We have systems in place to defend our site against such attacks. However, these systems have failed to protect us due to the sophistication of the attack.” The attackers are well aware of mitigation techniques and, as is true across the security landscape, develop new techniques to stay ahead of defensive mechanisms. As more iGaming companies adopt traditional defensive measures, their adversaries have turned to the more sophisticated, more elusive and ultimately more effective application-layer DDoS attacks. A new breed of so-called “slow” application-layer attacks, Slowloris and HTTP Post, bring web servers down by slowing requests. A more recent variant induces slow server responses. The aim is to deliver attacks that require fewer resources and are increasingly difficult to detect. As a result, DDoS attacks remain persistent and successful assaults on the stability and profitability of Internet gambling, even as iGaming companies attempt to counter the threats. 4 Defending Online Gambling Against DDoS Attacks Criminals and Competitors take a Piece of the Action DDoS Attack Motivations 12% 16% Political / Ideological Competitive Advantage Financial Extortion 52% 20% Just for Laughs Source: Vanson Bourne survey The most frequent perpetrators of DDoS attacks against online gambling sites are competitors attempting to undermine the business and drive customers to their own sites. In fact, unscrupulous competitors are cited as the leading force behind DDoS attacks across all industries. The Corero-sponsored survey noted above found that nearly half the enterprises that experienced DDoS attacks blamed competitors seeking unfair business advantage (See “DDoS Attack Motivations,” above). It makes good business sense, albeit from a criminal perspective. Who better than the competition understands the consequences of a prolonged service outage both in terms of direct loss of revenue and the volatility of the customer base? And with an attack method that uses legitimate resources the attackers also have plausible deniability. Online gambling companies understand that this sort of practice is an unfortunate fact of life among the less reputable businesses in the industry. A statement from online gambling software company Top Game Casinos in August 2011, posted on the forum of the Casinomeister site, declared that the company’s “recent investigation has revealed that the attacker does not only own and manage several online casinos and a fairly known affiliate program, but has also recently launched his own gaming software.” Attackers know when the stakes are highest. For example, in August 2009, Australia’s largest online betting sites were shut down on the eve of the Australian Football League and National Rugby League finals, reportedly resulting in losses of millions of dollars. Criminal extortion under threat of DDoS is also all too common. Like unscrupulous competitors, these extortionists understand how to hurt iGaming businesses. The threat of a DDoS attack is typically timed for maximum effect, in advance, for example, of a major sporting event such as the Super Bowl or a World Cup match, or a major holiday. They also will calculate the size of the ransom based on the likely financial impact of a sus- 5 Defending Online Gambling Against DDoS Attacks tained and successful DDoS attack at such a time. What’s $50,000 compared with the potential loss of millions? Often, the criminals will take the site down briefly as a demonstration to show that they are capable of carrying out their threat. They often will make good on their threat if they are refused. Unfortunately, companies that pay these ransoms sometimes get a reputation as a “soft touch” and will be hit repeatedly. Arrests are not all that frequent, but there have been notable exceptions. For example: • Three Russian men were sentenced to eight years in prison in 2006 after extorting $4 million from British gambling sites under threat of DDoS. One company that refused to pay a $10,000 ransom lost $200,000 in business during the Breeders’ Cup races. • A German man with more modest ambitions was convicted in June 2011 of attempting to extort $3,700 each from six online gambling sites, threatening to launch DDoS attacks during the 2010 World Cup. It is interesting to note that the unsuccessful extortionist was armed with a $65 per day Russian botnet, underscoring how DDoS is well within the means of criminals and competitors. Attackers also can rent a DDoS “hit squad” to launch attacks on their behalf. • Two Korean men were arrested in January 2011 after launching DDoS attacks against 100 rival sites for two hours a day over a two-week period. Sometimes, players themselves will launch narrow, session-based DDoS attacks to avoid losing. For example, a poker player dealt a poor hand may launch an attack to cause the game to malfunction. Typically, the site’s policy is that no players lose their money if there is a game malfunction. The cheating player recoups his loss, but the online gambling site can’t collect any of the bets placed. What’s more, players who believe they held a winning hand are bound to be upset that the session was curtailed before they had a chance to cash in. Best Bet: On-premises DDoS Defense Although the odds may appear to be stacked in favor of the attackers, online gambling companies can still come out winners. Since traditional services offer ineffective or incomplete protection, what’s required is a solution that provides comprehensive protection against a wide range of DDoS attacks including conventional network flooding and new application-layer attacks. Dedicated, on-premises DDoS defense appliances are the optimal solution. Installed in front of firewalls, applications and database servers, on-premises technology is the first line of defense against all DDoS attacks. On-premises appliances provide automated detection and mitigation against the full arsenal of attackers’ DDoS weapons, standing proof against the dominant new breed of application-layer attacks, as well as traditional network floods. On-premises DDoS defense enables granular responses, customized to the particular IT requirements of the iGaming environment, as well as corporate policies and business practices. For an optimal solution, iGaming companies should deploy automated monitoring services in concert with onpremises DDoS defense to rapidly identify and react to evasive, repetitive or sustained attacks. For increased protection against volumetric flooding attacks, which saturate Internet links, use a clean pipe solution in concert with an on-premises appliance. 6 Defending Online Gambling Against DDoS Attacks Don’t Trust to Luck: Be Prepared Players may trust in the roll of the dice, the spin of the wheel or the luck of the draw, but iGaming companies must combine best security practices and preparation to ensure the most effective DDoS defense against the extortionists, ruthless competitors and cheats arrayed against their business. Preparation and a thorough and well-coordinated response plan, in concert with on-premises DDoS defense technology, will ensure gambling sites remain up and running and available to players. Online gambling companies should follow these steps to prepare: 1. Develop a response plan A response plan is the difference between coordinated action in the face of a DDoS attack and an all-handson-deck scramble while the gambling site continues under duress. The plan should list and describes the steps organizations should take when under attack. The response plan should: • Outline the broad requirements for detection, mitigation, remediation and recovery efforts. • Describe how the response team will be mobilized and ensure timely, accurate and consistent communications with key personnel. • Specify the actions to be taken — and by whom — to identify the precise nature of the attack, its severity and quickly assess the risk to the business. • Define post-attack procedures, including the collection of logs and forensic evidence, and documenting response and mitigation technology gaps, weaknesses, and lessons learned. 2. Create a DDoS attack response team The response team are the “go-to” people when an iGaming site is hit by a DDoS attack. The team should possess the skills and experience to assess and address an attack rapidly and precisely. Key team members should include: • A team leader to oversee response activity during an attack, assign roles to individuals, and train them. • A system administrator to analyze alerts, logs and reports to determine what services, applications and/or devices are victims of a DDoS attack. • A security expert to quickly tune on-premises DDoS defense technology, if necessary, and other security tools, such as firewall and IPS, to defend in real time against DDoS attacks. • A networking expert to identify sources of network-layer DDoS attacks and begin to block attacking sources through on-premises DDoS defense technology. 3. Keep network information current Regularly update documentation of logical and physical enterprise network topologies, the entire network perimeter, and Web and DNS infrastructure. This information is essential to understand what systems could be victims of DDoS attack, where the business may be at risk and how and where to respond. 7 Defending Online Gambling Against DDoS Attacks In addition, take regular baseline assessments of “normal” traffic. Understanding the protocols, traffic types, available services, average traffic flows and overall network usage on enterprise networks enables quick and accurate identification of anomalous traffic, which may indicate a developing DDoS attack. 4. Deploy high-performance routers and firewalls Be sure that Internet-facing router performance can handle worst-case traffic and connection loads. This will reduce the impact of unexpected traffic spikes and/or DDoS attacks on enterprise networks. Similarly, Internet perimeter/DMZ firewall performance should be high enough to handle worst-case traffic and connection loads, so the firewall is less likely to be overwhelmed by flooding attacks. 5. Maintain a thorough and aggressive vulnerability management program Keep operating systems and applications on your application delivery servers up to date with the latest vendor patches and upgrades. This helps ensure they are less susceptible to attacks designed to exploit known vulnerabilities, including specially crafted packet DDoS attacks. Be sure to keep DNS server software current as well. These critical servers are often overlooked in security planning. 6. Follow threat trends and maintain vigilance Research new DDoS attack vectors, attack tools and industry advisories regularly to identify new vulnerabilities and potential gaps in the enterprise’s DDoS response plan and update DDoS defense mechanisms. DDoS attacks are becoming increasingly sophisticated. Don’t wait for your network or critical business applications to become unresponsive before taking action. IT personnel should be trained to look for signs of DDoS rather than assume a sluggish or unresponsive server is the result of hardware or application issues, or simply a temporary traffic spike. The Winning Hand: Corero’s DDoS Defense System Protection against DDoS Attacks Protection against Undesired Access Protection against Malicious Content Demerit Scoring System IN Patented DDoS Defense Client Request Limits Application Rate Limits Connection Limits Stateful Filtering Request & Response Behavior Analysis PVM+DVM Stateful Protocol Analysis Attack and Vulnerabilty Signatures Acceptable Application Usage OUT Attack Response Engine Logged Events Good Traffic Bad Traffic 8 Blocked Attacks Forensic Data & Analysis Defending Online Gambling Against DDoS Attacks Unscrupulous competitors, unpaid extortionists and crooked players — anyone who tries to bring down an online gambling site — will discover the house wins when iGaming companies deploy Corero Networks Security’s on-premises DDoS Defense System (DDS). DDS provides the most comprehensive protection against all forms of denial of service attacks. DDS detects and mitigates against stealthy application-layer attacks as well as network-layer flooding and reflective attacks. Based on intelligent behavioral analysis, DDS leverages patented DDoS Defense algorithms and extensive rate-based protection mechanisms, prevents unwanted access and detects and blocks to rebuff all forms of Internet attacks. These integrated component technologies comprise Corero’s unique Three Dimensional Platform (3DP) architecture (see diagram, p. 8). In order to stop DDoS attacks while allowing good traffic to pass without performance degradation, Corero’s behavioral analysis technology debits a DDS-maintained credit balance associated with each source IP address and blocks further requests from an IP address when the credits are depleted. The technology monitors both the number of client requests and behavioral characteristics of client-server communications, so that DDS effectively addresses low-bandwidth application-layer attacks and high-volume networklayer attacks. With Corero’s DDS, online companies can ensure their customers uninterrupted play and ensure business continuity, even while under attack. About Corero Network Security Corero Network Security (CNS:LN) is an international network security company and the leading provider of Distributed Denial of Service (DDoS) defense and Intrusion Prevention System (IPS) solutions. Corero’s products and services provide comprehensive, integrated, high-performance protection against constantly evolving network-borne cyber threats. Customers include enterprises, service providers and government organizations worldwide. Corero’s appliance-based solutions are highly adaptive and preemptively respond to modern cyber attacks, known and unknown, protecting critical information and online assets. Corero’s products are transparent on the network, highly scalable, and feature the lowest latency, and highest reliability in the industry. Corero is headquartered in Hudson, Mass., with offices around the world. Corporate Headquarters EMEA Headquarters 1 Cabot Road Hudson, MA 01749 USA Phone: +1.978.212.1500 No. 1 Cornhill London EC3V 3ND Phone: +44 (0) 203 427 3407 Web: www.corero.com 9
© Copyright 2026 Paperzz