• DoS attack is malicious attempt to affect availability of a targeted system, to legitimate end users.
  • During the attack, attackers generate large requests to overwhelm target system.
  • In DDoS attack, attacker uses multiple sources to generate attack.
  • DDoS attacks types, are as OSI being attacked
    • Network (layer 3)
    • Transport (Layer 4)
    • Presentation (Layer 6)
    • Application (Layer 7)

DDoS Mitigation

  • process of successfully protecting a targeted system from a DDoS attack.
  • Uses network equipment or protection service to mitigate incoming threat.

DDoS Mitigation Stages

  • Detection – to stop a DDoS distinguish an attack from a high volume of normal traffic.
  • Response – System responds to incoming identified threat by intelligently dropping malicious traffic
  • Routing – routing traffic, to break remaining traffic into manageable chunks preventing denial-of-service.
  • Adaptation – Analyzes traffic for patterns such as repeating offending IP blocks and attacks

AWS Services for DDoS Attack Mitigation

AWS Shield

  • A managed DDoS protection service
  • Available in Standard and Advanced tiers
  • Shield Standard
    • applies always-on detection and inline mitigation techniques, like deterministic packet filtering and priority-based traffic shaping
    • included automatically to ELB load balancers, CloudFront and Route 53 at no extra cost.
    • Use Shield with WAF rules to create a comprehensive DDoS attack mitigation strategy.
  • AWS Shield Advanced
  • provides enhanced DDoS attack detection and monitoring by – layer traffic to ELB, CloudFront and Route 53
  • Uses additional techniques for granular detection of DDoS attackslike detect HTTP floods or DNS query floods.
  • includes 24×7 access to AWS DDoS Response Team (DRT)
  • Directly create or update AWS WAF rules
  • Receive improvements to AWS architectures
  • includes access to near real-time metrics and reports
  • Combine with WAF metrics for comprehensive CloudWatch monitoring and alarming strategy.

AWS WAF

  • It is a web application firewall
  • Protects web applications from common web exploits
  • define customizable web security rules to control which traffic accesses web applications
  • Provided free with AWS Shield Advanced
  •  can engage the DRT to create WAF rules.
  • WAF rules use conditions to
    • target specific requests
    • trigger an action
    • identify and block common DDoS request patterns

Route 53

  • A highly available and scalable DNS service
  • to route end users to infrastructure running inside or outside of AWS.
  • manage traffic globally by routing types
  • Gives out-of-the-box shuffle sharding and Anycast routing capabilities

Amazon CloudFront

  • distributes traffic across multiple edge locations
  • filters requests to ensure that only valid HTTP(S) requests are forwarded to backend hosts
  • supports geoblocking, to prevent requests from particular geographic locations.

ELB

  • It automatically distributes incoming application traffic across multiple targets
  • Targets can be
    • Amazon EC2 instances
    • Containers
    • IP addresses
    • multiple AZ
  • It minimizes risk of overloading a single resource.
  • ELB, like CloudFront, supports valid TCP requests
  • UDP and SYN floods are not able to reach EC2 instances.
  • Also gives a single point of management
  • serves as a line of defense between internet and backend
  • ELB includes Application Load Balancer, for HTTP/HTTPS traffic load balancing
  • directly supports AWS WAF.

VPCs and Security Groups

  • With Amazon VPC can configure
    • subnet routes
    • public IP addresses
    • security groups
    • network access control lists
  • Can minimize application attack surfaces
  • Can configure load balancers and EC2 instance security groups
  • Controls traffic from specific IP addresses, from CloudFront or AWS WAF

Best Practices

  • Be ready to scale. Scale to meet additional traffic volumes, if valid or a DDoS attack by ELB, CloudFront, Route 53
  • Minimize the attack surface area and safeguard exposed resources- decouple infrastructure
  • Know what is normal; alert on what is not.
  • Architect for resilience
  • Deploy Firewalls for Sophisticated Application attacks

For web applications –

For Load Balanceable Applications

Menu