The document discusses how web attacks are increasingly targeting application layers and becoming more sophisticated. It describes Akamai's web application firewall which uses rule-based detection, rate controls and custom rules to protect applications from layer 3, 4 and 7 attacks at the edge of the network.
The document discusses how web attacks are increasingly targeting application layers and becoming more sophisticated. It describes Akamai's web application firewall which uses rule-based detection, rate controls and custom rules to protect applications from layer 3, 4 and 7 attacks at the edge of the network.
Original Description:
akamai kona WAF Help Manual, Web application firewall and site security
The document discusses how web attacks are increasingly targeting application layers and becoming more sophisticated. It describes Akamai's web application firewall which uses rule-based detection, rate controls and custom rules to protect applications from layer 3, 4 and 7 attacks at the edge of the network.
The document discusses how web attacks are increasingly targeting application layers and becoming more sophisticated. It describes Akamai's web application firewall which uses rule-based detection, rate controls and custom rules to protect applications from layer 3, 4 and 7 attacks at the edge of the network.
TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense What Were Seeing Attacks Are Happening On Multiple Levels Target of Traditional DDoS Attacks Network Layer (Layers 3/4) 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense What Were Seeing Attacks Are Happening On Multiple Levels Target of Traditional DDoS Attacks Network Layer (Layers 3/4) 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense What Were Seeing Attacks Are Happening On Multiple Levels Target of Traditional DDoS Attacks Network Layer (Layers 3/4) Application Layer (Layer 7) Where increasing number of attacks are focused 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Web Attacks Are Getting More Sophisticated (e.g. multi- vector) Layers 3&4, Layer 7, DNS, Direct-to-Origin, Large, Small & Stealthy Unreported 37% SQL Injection (SQLi) 27% Denial of Service 23% Banking Trojan, 3% Brute Force, 3% Cross-Site Request Forgery, 2%
Predictable Resource Location, 2% Stolen Credentials, 2% Clickjacking, 1% What Attack Methods do Hackers Use? Source: TrustWave Spider Labs - 2011 - Web Hacking Incident Database 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Web Applications (Layer 7) Are Increasingly Targeted ~10,000,000 More Attacks in 1H2011 over 1H2010 (~45% increase) 0 5,000,000 10,000,000 15,000,000 20,000,000 25,000,000 30,000,000 35,000,000 2009 2010 1H2011 Total # Web Application Attacks at Mid-Year 20092011 Source: HP CyberSecurity Risks Report 1H2011 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Web Applications (Layer 7) Are Increasingly Targeted ~10,000,000 More Attacks in 1H2011 over 1H2010 (~45% increase) 63% 37% Layer 3/4 Attacks versus non- Web Layer 7 Attacks 1H2011 Layer 3/4 Attacks Layer 7 Attacks 0 5,000,000 10,000,000 15,000,000 20,000,000 25,000,000 30,000,000 35,000,000 2009 2010 1H2011 Total # Web Application Attacks at Mid-Year 20092011 Source: HP CyberSecurity Risks Report 1H2011 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense On the Web, the Application is the Perimeter Firewall Hardware WAF App server DB Web server Traditional Data Center Security 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense In-The-Cloud Security On the Web, the Application is the Perimeter Firewall Hardware WAF App server DB Web server Traditional Data Center Security 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense In-The-Cloud Security On the Web, the Application is the Perimeter The threats are distributed, your response needs to be distributed! Firewall Hardware WAF App server DB Web server Traditional Data Center Security 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense
Akamai Intelligent Platform Deflecting Network Layer Attacks at the Edge Network Layer attack mitigation ! Built-in protection is always on ! Only Port 80 (HTTP) or Port 443 (HTTPS) traffic allowed on Platform o All other traffic dropped at the Akamai Edge Attack traffic never makes it onto Platform Customer not charged for traffic dropped at Edge o Absorbs attack requests without requiring identification o Requires CNAME onto Akamai Intelligent Platform
Absorbs attacks through massive scale ! ~5.5 Tbps average throughput; up to 8Tbps ! Distribution of HTTP request traffic across 100,000+ servers; 1,100+ networks ! No re-routing, added latency, or point of failure Examples of attacks types dropped at Akamai Edge ! UDP Fragments ! ICMP Floods ! SYN Floods ! ACK Floods ! RESET Floods ! UDP Floods 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense
Web Application Protection Web Application Firewall Application-layer controls ! Does deep packet inspection to protect against attacks such as SQL Injections & Cross-Site Scripts Custom Rules ! Create policy-based rules that are enforced before or after execution of the application layer controls ! Serve as Virtual Patches for new website vulnerabilities
Network Layer Controls ! Allow or restrict requests from specific IP addresses Protect customer Origin from application layer attacks ! Implements IP Blacklists & Whitelist ! Geo blocking ! 10,000 CIDR entries supported Named lists e.g., Tor exit nodes 30 45 minute deployment 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense
Custom Rules Web Application Firewall Description ! WAF Custom Rules implemented in Akamai metadata written by Akamai Professional Services ! Rules are created and managed in customer portal ! Rules are then associated with firewall policies and deployed with WAF in 45 minutes 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense
Custom Rules Web Application Firewall Description ! WAF Custom Rules implemented in Akamai metadata written by Akamai Professional Services ! Rules are created and managed in customer portal ! Rules are then associated with firewall policies and deployed with WAF in 45 minutes The Result ! New rule logic can be built to handle specific use cases for the customer ! Rules can be built that execute when one or more baseline rules or rate control rules match ! Output of application vulnerability products can be implemented as virtual patches ! Advanced piping to user validation actions can be achieved (prioritization) 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense
Custom Rules Web Application Firewall 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Adaptive Rate Controls Malicious Behavior Detection ! Specify number of requests per second against a given URL o Controls requests based on behavior pattern not request structure Use client IP address, session ID, cookies, etc. ! Configure rate categories to control request rates against digital properties Mitigate rate-based DDoS attacks ! Statistics collected for 3 request phases o Client Request Client to Akamai Server o Forward Request Akamai Server to Origin o Forward Response Origin to Akamai Server ! Statistics collected allow us to ignore large proxies and pick out a malicious user hiding behind a proxy ! Statistics collected allow for detection of pathological behavior by a client o Request rate is excessive for any stage o Requests causing too many Origin errors
2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Adaptive Rate Controls Malicious Behavior Detection 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Adaptive Rate Controls Malicious Behavior Detection 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Rate Controls Use Case: Blocking IPs Causing Origin Errors 1. Count the number of Forward Responses that return a 404 error code 2. Block any IP address that exceeds 5 errors per second Client Request Forward Request Response code 404 Customer Origin Akamai Edge Server X Custom Error page Automatic Origin Abuse Mitigation! 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Use Case 2: Validate IPs Causing High Origin Load 1. Count the number of Forward Requests 2. Validate any IP address that exceeds 20 Forward Requests per second Forward Request Forward Response Customer Origin Akamai Edge Server Client Request 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Use Case 2: Validate IPs Causing High Origin Load 1. Count the number of Forward Requests 2. Validate any IP address that exceeds 20 Forward Requests per second Forward Request Customer Origin Akamai Edge Server Client Request 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Use Case 2: Validate IPs Causing High Origin Load 1. Count the number of Forward Requests 2. Validate any IP address that exceeds 20 Forward Requests per second Forward Request Customer Origin Akamai Edge Server Client Request 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Use Case 2: Validate IPs Causing High Origin Load 1. Count the number of Forward Requests 2. Validate any IP address that exceeds 20 Forward Requests per second Forward Request Customer Origin Akamai Edge Server Client Request 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Use Case 2: Validate IPs Causing High Origin Load 1. Count the number of Forward Requests 2. Validate any IP address that exceeds 20 Forward Requests per second Customer Origin X Custom Error page Automatic Origin Overload Prevention! Akamai Edge Server Client Request 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (1 of 3) Timeline of Requests by Hour 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (1 of 3) Visual Display of Requests by Geography 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (1 of 3) Requests by WAF Rule ID 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (1 of 3) Requests by WAF Message 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (1 of 3) Requests by WAF Tag 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (2 of 3) Multiple ways to display request statistics 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (3 of 3) Requests by City 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (3 of 3) Requests by Client IP address 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Security Monitor (3 of 3) ARLs being attacked 2012 Akamai FASTER FORWARD TM Web Application Firewall Compliance Payment Tokenization Web Application Firewall Website Defense Any experience. Any device. Anywhere.