Securing Data Centers: A Unique Opportunity for

Arbor White Paper
Securing Data
Centers: A Unique
Opportunity for ISPs
About Arbor Networks
Arbor Networks, Inc. is a leading provider of network
security and management solutions enterprise and service
provider networks, including the vast majority of the world’s
Internet service providers and many of the largest enterprise
networks in use today. Arbor’s proven network security and
management solutions help grow and protect customer
networks, businesses and brands. Through its unparalleled,
privileged relationships with worldwide service providers
and global network operators, Arbor provides unequalled
insight into and perspective on Internet security and traffic
trends via the ATLAS® Active Threat Level Analysis System.
Representing a unique collaborative effort with 230+
network operators across the globe, ATLAS enables the
sharing of real-time security, traffic and routing information
that informs numerous business decisions.
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
The Growing Managed Security Services Market
For today’s enterprises, any downtime in their
Internet data center (IDC) operations can
dramatically impact the bottom line. So it
is no surprise that the increasing scale and
frequency of distributed denial of service
(DDoS) attacks are now having a much
greater impact on the business continuity
and profitability of these companies. What’s
more, while DDoS attacks may have been
driven by noneconomic reasons in the past,
they now have major monetary drivers
including extortion, competitive advantage
and corporate revenge.
DDoS threats that impact the availability of services represent
a significant opportunity for Internet service providers (ISPs).
Enterprises and their IDC operators are more concerned about
DDoS than ever before, and ISPs can help them combat these
threats. This white paper explores the security challenges
affecting today’s enterprises and IDC operators, and examines
how ISPs are in a unique position to respond by delivering
revenue-generating, managed DDoS protection services.
The managed security service provider (MSSP) market is
expected to grow to around $4 billion by 2016 in North
America alone, according to Frost & Sullivan. Moreover, the
managed security and security monitoring services segment
will continue to yield the highest percentage of total revenue
in the MSSP market.
“Although budget cutbacks have resulted from the economic
slowdown, companies are continuing to implement measures
to upgrade security,” says Frost & Sullivan Research Analyst
Martha Vazquez. “Outsourcing security to an MSSP will free up
time for organizations to focus on core business processes.”
Enterprises will spend more on network-based security services
from ISPs as they become more comfortable with ISPs providing these services. Many factors—such as better support, more
mature options, improved service control and faster services—
will increase this comfort level. Today, the majority of MSSP
customers purchase managed security services that are based
on customer premise equipment (CPE). Consequently, customers
might have fewer concerns about purchasing a network-based
security service if it also includes a CPE-based component.
The managed security service provider (MSSP)
market is expected to grow to around $4 billion
by 2016 in North America alone, according to
Frost & Sullivan.
1
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
The Evolving DDoS Threat
The market demand for managed security services is real and growing. Service providers have
some inherent advantages that enable them to capitalize on this demand because they own
the pipes that transmit data across the Internet. This makes ISPs uniquely well-positioned
to deliver a comprehensive solution that can combat the two primary types of DDoS attacks.
First, they can stop “volumetric” DDoS attacks. These are usually
generated by Internet bots or compromised PCs that are
grouped together in large-scale botnets. Examples include
DDoS attacks against UK-based online betting sites1 where the
hackers extorted the betting firms, and the politically motivated
DDoS attacks against the Georgian government.2 They are
generally high-bandwidth attacks and originate from a large
number of bots that are geographically distributed. Because of
the high-bandwidth and distributed nature of these attacks, the
congestion might occur upstream in the provider’s network and
cannot be stopped at the enterprise or data-center edge.
In addition, a new type of DDoS attack has emerged that
threatens the business viability of service provider customers.
Two days before Christmas in 2009, last-minute shoppers could
not access some of the world’s most popular Internet shopping
sites including Amazon, Expedia and Walmart. A targeted DDoS
attack against UltraDNS,3 a leading provider of domain name
system (DNS) services, took these major retail sites offline. The
attack could have dramatically affected the Christmas shopping
season and the profitability of these retailers if UltraDNS had
not been able to detect and stop the attack very quickly.
This attack revealed the potential impact of DDoS to online
commerce. More importantly, it revealed a new type of
“application-layer” DDoS attack that targets specific services
and consumes lower bandwidth. These new application-layer
DDoS attacks threaten a myriad of services ranging from Web
commerce and DNS services to email and online banking.
Enterprise customers are very concerned with the availability
of critical services running in their data centers. At the same
time, attackers view these Internet-facing data centers as new
prime targets and are launching DDoS attacks to wreak havoc
on these companies. The convergence of volumetric and
application-layer DDoS attacks poses a significant threat to
online services, and customers will be looking for solutions.
$
TARG ET
I M PACT
$
I M PACT
Load Balancer
I M PACT
$
Paid Attacker
Botnet
Internet
TARG
ET
TARG ET
Internet Data Center
I M PACT
I M PACT
Load Balancer
Attack Traffic
Legitimate Traffic
news.bbc.co.uk/2/hi/technology/4169223.stm
www.cnn.com/2009/TECH/08/07/russia.georgia.twitter.attack
3 www.cnn.com/2009/TECH/12/24/cnet.ddos.attack/index.html
1
2
2
DDoS driven by financial motivations
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
Only ISPs Can Provide the Comprehensive Solution
to Protect Data Centers from DDoS
ISPs can gain a unique advantage by
providing a layered network- and edge-based
managed solution to combat both volumetric
and application-layer DDoS attacks. The best
place to stop volumetric DDoS attacks is
in the ISP cloud (via network-based DDoS
protection) because the saturation happens
upstream and can only be remediated in the
provider’s cloud.
The best place to perform application-layer DDoS detection is
in the data center itself because the attack can only be detected
and quickly stopped at the data-center edge. Only ISPs can
provide both a network-based service component to stop
volumetric DDoS attacks and a CPE-based service component
to stop application-layer DDoS attacks—representing a distinct
competitive advantage.
There are cost efficiencies at work, too. When an ISP is
already supplying a managed firewall, Secure Socket Layer
virtual private network (SSL VPN), intrusion detection system
(IDS), intrusion prevention system (IPS) and other security
measures, adding an incremental managed DDoS protection
service can be relatively straightforward and cost-efficient.
LARG E D DoS ATTACKS
I S P CLEAN I NG
CE NTE R
DATA CE NTE R
Firewall
ISP
Load Balancer
Firewall
IDS/IPS
Attack Traffic
IDS/IPS
Target Applications
and Services
APPLICATION LAYE R
Multiple layers of defense required for comprehensive DDoS protection
3
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
Why Traditional Security Products Fail to Address
the Evolving DDoS Threat
Firewalls, IPS and other products are
key elements of your customers’ security
strategy, but these solutions are designed
to provide security functions that are
fundamentally different from dedicated
DDoS detection and mitigation products.
For example, firewalls are essentially policy enforcement
points that are usually deployed at the network or data-center
perimeter. Their role is to establish and enforce the rules that
govern what traffic is allowed in and out of a data center as
defined by ports, protocols and destinations.
Internet-facing data centers are open to Web traffic (TCP
port 80/443) and other services such as video, voice and file
transfer. DDoS attacks target the very services that firewalls
have to allow through, so there is no inherent DDoS protection
in the firewall layer.
In fact, because firewalls maintain state information for every
session established between a client on the Internet and the
corresponding server in the data center, the firewalls themselves
are commonly the targets of DDoS attacks. What’s more, they
are potentially the single point of failure that disables the data
center during large-scale DDoS attacks. In these cases, it is best
to provide DDoS protection in the ISP network or “cloud” before
it reaches the data center since by that time it is too late.
ISP/Internet
Data Center
FAILURE
CONGESTION
CONGESTION
Botnet
Firewall
Attack Traffic
Legitimate Traffic
Firewalls can actually be the targets of DDoS attacks
4
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
ISP/Internet
Data Center
FAILURE
CONGESTION
CONGESTION
Botnet
IPS
Attack Traffic
Legitimate Traffic
IPS devices are not designed to stop DDoS attacks
IPS/IDS devices are also not designed or positioned to protect
against some denial of service attacks. They are designed to
inspect packets and remove network-based malware through
signature matching. Many times, however, DDoS attack traffic
is not a signature-based threat. Because all IDS/IPS devices
are deployed in-line and suffer from the same resource and
memory exhaustion problems that plague firewalls, they are
also a potential single point of failure on the network and
increase network latency. In these cases, the detection and
removal of DDoS attack traffic is best done in the ISP’s
network either before it reaches the data-center edge or
through off-ramping the malicious traffic.
Some firewalls and IDS/IPS products offer DDoS detection
using techniques such as statistical anomaly detection or
malformed protocol detection. But since firewalls and IDS/IPS
products conduct anomaly detection on a per point basis, they
have a very myopic view of the network. The very nature of a
“distributed” denial of service attack means that the attack traffic
is coming from different sources. Therefore, the solution must
be able to recognize this behavior and stop the traffic as close
to the sources as possible. This is another reason why the
distributed detection and mitigation of DDoS attacks are best
done in the ISP network.
In these cases, it is best to provide DDoS
protection in the ISP network or “cloud” before
it reaches the data center since by that time it
is too late.
5
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
Peakflow ® SP: The Platform for Comprehensive
Managed DDoS Services
A complete DDoS protection solution must support the following:
• Both in-line and, more importantly, out-of-band deployment
to avoid being a single point of failure on the network.
• True “distributed” DoS (DDoS) attack detection, which
requires broad visibility into the network (not just from a
single network perspective) and the ability to analyze traffic
from different parts of the network.
• Attack detection using multiple techniques such as statistical
anomaly detection; customizable threshold alerts; and
fingerprints of known or emerging threats that are based
on Internet-wide intelligence.
• Mitigation that can easily scale to handle attacks of all sizes,
ranging from low-end (e.g., 1 Gbps of mitigation, deployed
in the data center) to high-end (e.g., 40 Gbps of mitigation,
deployed in the ISP network).
Peering/
Transit Edge
The Peakflow SP solution (“Peakflow SP”) is a complete platform that service providers can use to develop comprehensive
managed DDoS services for customers. Today, the majority of
the world’s leading ISPs rely on Peakflow SP for the networkwide visibility and security they need to proactively fend off
malicious threats, thwart DDoS attacks and strengthen the
quality of their service. Increasingly, these ISPs are leveraging
their investment in Peakflow SP to deliver profitable, new,
in-cloud managed services.
Backbone
Peakflow SP
Collector Platform (CP) 5500
Peakflow SP
Business Intelligence (BI)
The solution must also feature managed security service
enablers. These include application programming interfaces
(APIs) for integration with existing systems; the ability to
launch a customer portal easily; provisioning templates; fault
tolerance; and redundancy. Lastly, the solution must be proven
and backed by a company that is a known industry expert in
Internet-based DDoS threats.
Peakflow SP
Collector Platform (CP) 5500
Regional Mitigation
Center
Peakflow SP
Threat Management System (TMS)
1200/2500/3x00/4x00
Peakflow SP
Portal Interface (PI)
Customer/
Hosting Edge
Peakflow SP Threat Management
System (TMS) 1200/2500
Peakflow SP Portal Interface (PI)
Peakflow SP
Flow Sensor (FS)
Managed Service Customers
Central Console for Visibility
and Threat Management
Peakflow SP Architecture
Consists of five types of appliances: 1) Peakflow SP Collector Platform (CP)
appliances in the peering edge or backbone; 2) Peakflow SP Flow Sensor
(FS) appliances in the customer aggregation edge; 3) Peakflow SP Business
Intelligence (BI) appliances to increase scalability and add redundancy for
managing criticalss objects; 4) Peakflow SP Portal Interface (PI) appliances
to increase the scale, redundancy and profitability of Arbor-based managed
services; and 5) Peakflow SP Threat Management System (TMS) appliances
deployed in any part of the network to surgically mitigate network threats.
6
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
40
4000
4 x APM (40 Gbps)
3 x APM (30 Gbps)
2 x APM (20 Gbps)
8 x 10 GigE ports, 6U, 1 x APM (10 Gbps)
30
20
Performance (Gbps)
10
3110
10 Gbps, 3U, 2 x 10 GigE ports + 10 x 1 GigE ports
9
8
7
6
5
3050
5 Gbps (software upgrade to 10 Gbps), 3U,
2 x 10 GigE ports + 10 x 1 GigE ports
4
3
2500
2.5 Gbps, 2U, 6 x 1 GigE ports, NEBS certified
2
1200
1.5 Gbps, 1U, 4 x 1 GigE ports
1
0
Small Provider, Dedicated
Customer, Small POPs
Deployment
Large Provider, Regional
Scrubbing Center, Large POPs
Peakflow SP TMS deployment
Peakflow SP meets the key requirements of a comprehensive
DDoS solution by providing:
• Ability to stop both volumetric and application-layer
DDoS attacks: Peakflow SP provides the tools to diagnose
and stop both high-bandwidth DDoS attacks as well as
targeted application-layer DDoS targets.
• Multiple deployment options: Peakflow SP can be
deployed out-of-band where attack traffic is diverted to
the TMS appliances. The solution can also be deployed
in-line or passively.
• True “distributed” DoS attack detection: Peakflow SP
offers true distributed anomaly detection rather than simple
point-based detection.
• Managed service enablers: Peakflow SP offers a full range
of enablers that help ISPs launch network-based service
offerings to their customers.
• Multiple methods of threat detection and mitigation:
Peakflow SP provides multiple attack detection techniques.
These range from statistical anomaly detection and
threshold-based flood detection to fingerprint-based
detection based on the global intelligence in Arbor’s
Threat Level Analysis System (ATLAS®).4
• Industry expertise backed by a market leader: Arbor
Networks is a leading provider of security and network
management solutions for global business networks, including
more than 70 percent of the world’s ISPs and many of the
largest enterprise networks in use today.
• Scalability to handle all-size threats: Peakflow SP can
detect threats of all sizes by leveraging flow technology in
existing network infrastructure equipment. The solution can also
stop any-size threat by supporting an array of Peakflow Threat
Management System (“TMS”) appliances that provide surgical
mitigation ranging from 1 Gbps to 40 Gbps (see above).
4
atlas.arbornetworks.com
7
Arbor White Paper: Securing Data Centers: A Unique Opportunity for ISPs
Conclusion
DDoS attacks are continuing to rise
and both public and private data centers
are prime targets. Today’s data center
operators are seeking solutions to this
pressing problem.
8
ISPs have a unique opportunity to respond by offering
valuable network- and edge-based services that protect their
customers’ data centers against DDoS attacks and drive
incremental revenue. Peakflow SP is a proven platform that
enables ISPs to develop unique managed DDoS protection
services and help solve this growing threat.
For more information about the Peakflow SP
solution, visit the Arbor Networks Web site
at www.arbornetworks.com/peakflowsp or
contact an Arbor Networks representative
at www.arbornetworks.com/contact.
Corporate Headquarters
76 Blanchard Road
Burlington, MA 01803 USA
Toll Free USA +1 866 212 7267
T +1 781 362 4300
Europe
T +44 207 127 8147
Asia Pacific
T +65 6299 0695
www.arbornetworks.com
©2012 Arbor Networks, Inc. All rights reserved. Arbor Networks, the Arbor Networks logo, Peakflow, ArbOS, How Networks
Grow, Pravail, Arbor Optima, Cloud Signaling, ATLAS and Arbor Networks. Smart. Available. Secure. are all trademarks of
Arbor Networks, Inc. All other brands may be the trademarks of their respective owners.
WP/SDC/EN/0612