Preparing To Withstand A DDoS Attack
Preparing To Withstand A DDoS Attack
Preparing To Withstand A DDoS Attack
Preparing to withstand
a DDoS Attack
Gaurang Pandya
Abstract
A Distributed Denial of Service (DDoS) Attack, unlike most other cyber threats, is a lethal form
of threat that is almost impossible to eliminate, and its “planned” execution can have a deadly
effect on the target. This form of cyberattack is still as dreaded as it was a decade ago. This
attack, unlike other forms of cyber-attack, targets the limitations of IT systems. Additionally,
tools to generate such attacks are freely available and easy to use. On the other hand, enterprises
are ill prepared to handle these attacks.
It is due to this pervasive nature of attack that it is very prevalent and persistent. More often than
not, it is capable of bringing a well-crafted and protected service to its knees. It has been noticed
that quite often the targeted enterprise does not even realize that they are under a DDoS attack.
Worse, even after realizing, they are not able to respond appropriately to it, as they are ill
prepared for it.
This paper intends to provide details about the various technical and non-technical aspects that
will help an enterprise prepare to withstand a DDoS attack.
1 Introduction
The Distributed Denial of Service or DDoS Attack is a distinct form of cyber threat with various
aspects that differentiates it from other attack types. The first one being, it targets the inherent
limitations that exist in current systems. That is, it targets the memory, network bandwidth, and
CPU of target systems. Unlike traditional attacks, this form of attack is generated from an army
of compromised hosts known as botnets. It is these factors that make this attack easy to launch
and difficult to defend against. When attack traffic is generated by botnets, the attacker will
suffer the same problem of resource consumption that the target will. This is the reason behind
distributing an attack using several hosts, thus the making attack bigger and less resource
intensive. Hence, the name “Distributed” denial of service attack.
The tools to generate DDoS attacks are present in some operating systems and can easily be
downloaded and installed in others. Many are free of cost. These include LOIC and HOIC, to
name a few. Even a simple utility, like “ping,” can cause considerable damage to an unprotected
network if used appropriately. On the other hand, there are more sophisticated and organized
ways to launch these attacks and there is a growing underground economy around this. Services,
like rent-a-botnet and botnet-as-a-service, are specially tailored to the meet needs of an
organization trying to bring its competitor, governments, or others down. These attacks are also
widely used by hacktivists.
Commonly DDoS attacks are conducted by pivoting from compromised end user computers,
generally referred to as zombies. A collection of zombies is called a botnet, and a host that
controls this botnet is known as the command and control server.
There have been instances when government agencies have replaced the malicious command and
control server with their own server to help kill the botnet (Bright, 2011). In some instances, the
command and control server itself is destroyed, thus orphaning entire botnets and rendering them
useless (Bright, 2011).
This form of attack does not require the source address of packet to be spoofed, and zombies
attack the target with their own publicly accessible IP addresses, thus identifying themselves.
attacker sends malicious traffic to an intermediate host, after manipulating traffic to make it look
like it is originating from the target. Thus, when the reflecting host receives the packet, it replies
to the target.
In a reflection attack, the goal is to hide the identity of the true attacker, using intermediate hosts.
These intermediate hosts are just Internet hosts. However, due to the nature of the service they
perform, they are abused by the attacker and used to reflect the attack to the real target.
The attacker can also use legitimate online services like NTP, DNS, SNMP, and ICMP to pivot
the attack resulting in an amplification attack.
2 Protection planning
Asides just enterprises, the DDoS protection planning exercise is necessary for every site that
needs protection. This approach helps tailor the process for those sites that are non-standard or
have fewer resources. The protection planning phases are shown in the following figure:
Once the relevant information in terms of answers to the above questions are arrived at, the rest
of the phases will help gauge the available options and determine the best one.
The defence planning phase focuses on helping an organization achieve either (or both) of these
goals by providing various options that can be used to defend against a DDoS attack. Though
this phase explores some ways of using existing resources to defend against a DDoS attack, it is
not always possible. Traditionally, security devices are deployed in-premises, and when an
organization is under targeted DDoS attack the network connectivity will become saturated.
Hence, traffic will be dropped much before reaching these security devices for it to be effective.
This completes the DDoS attack. To overcome this challenge, the organization will have to fall
back on a third-party network or security service providers to handle DDoS attacks on its behalf.
3 Information gathering
Before initiating DDoS protection planning, it is important to identify the assets that need
protection throughout an organization. Therefore, it is important to have a detailed asset
inventory in place that includes not just information about assets, but has other information as
well such as the security policy, list of the stakeholders, their contact information, etc.
Table 6: VPN inventory template given the in the Appendix can help organizations gather this
vital information.
This document should provide a macro-level view of the site as a whole and serve as a ready
reference while taking decisions that would affect the entire site. To help gather this information
Table 7: Site inventory template given in the Appendix can be used.
For the post finalization of team information collection, every team member should be made
aware of his or her roles, responsibilities, and expectations from the point of view of the overall
DDoS incident management process.
Note: Not every organization will have all of the security policies found in Table 10, but relevant
information should be available as they relate to security policy documents.
Security control and configuration directives not only come from security policy documents,
additionally, they also are dictated by country, industry specific compliance, and regulatory
norms including industry specific standards. Thus, it becomes equally important to understand an
organization’s compliance and security requirements.
Table 11: Compliance matrix provides information pertaining to various security compliance
requirements for various geographies along with their industry, found in the Appendix.
4 Planning discovery
The goal of this phase is to help an organization discover that it is under a DDoS attack, within
fifteen minutes of the attack becoming lethal. There are several technologies available. These are
either general purpose or purpose-built for DDoS detection that help an organization achieve this
goal. On the other hand, various free and commercial tools are also available to help implement
those technologies. Details about various technologies and different tools to implement them can
be found in following sub-sections.
utilization of IT resources, they also serve as an excellent solution for discovering a DDoS attack
that is in progress and is consuming monitored resources.
To effectively use this feature, an NMS polling station should be deployed in each of the WAN
separated locations, and even within the LAN, in segments that are of high importance, making
sure all these polling stations report their status back to the centralized monitoring station.
In order to get the end user’s perspective of service, the polling stations can be deployed in the
user segment, and if user requests are originating from the Internet, a polling station can be
deployed with a cloud service provider.
In the above illustration, a critical server located in Site B needs to be monitored for resource
utilization using NMS. To provide thorough monitoring for that server, not only should the
servers be monitored by a locally deployed polling station, but every link leading to that from
HQ should also be monitored from the central monitoring station.
Certain NMS systems provide feature to identify network path failure and disable alerting for
resources located behind that. If possible, WAN links between central and remote routers should
be configured for such path monitoring, which is sometimes referred as “critical-path”
monitoring.
Once host uptime monitoring is configured appropriately, the next step is to configure the NMS
system to perform additional checks against monitored hosts as they help discover DDoS attack.
Table 12: NMS Checks found in the Appendix provides the list of checks that can be performed
on end servers and intermediate hosts such as a router, switch, or firewall.
The Network Flow system was first introduced by Cisco named NetFlow; later prominent
networking vendors came up with names for their own versions of flow exporting protocols as
given in Table 13: Flow exporting vendors found in the Appendix. The current vendor agnostic
flow monitoring protocol is called IPFIX.
An actively monitored host is one that exports flows by itself, whereas a passively monitored
host relies on external tools for generating and exporting flows on its behalf. The flow generating
tool gets a copy of the traffic from the switch or network tap and exports flows.
The flow collector is a server that accepts flows from both types of monitored hosts, and reports
back to the central monitoring station. The central monitoring station is responsible for providing
user interface, generating alerts, reports, etc.
When deployed in a distributed way, the remote collectors perform tasks like flow collection,
summarization, caching, and normalization, whereas the central monitoring station performs
tasks like graph generation, alert notification, and reporting.
Monitoring backbone or core router interfaces should be avoided, unless there is a compelling
reason for it. This approach does not just help manage loads on already heavily used routers but
also eliminates errors, caused by the double counting of flows.
Event Generator: These are servers, devices, or applications that generate event logs to be
fed to the SIEM system.
Event Normalizer: These purpose-built engines take log feeds from event generators, and
normalize, compress and redirect them to the correlation engine.
Event Correlation Engine: This core SIEM component performs event correlation, and
generates event notification.
To clearly identify service components that require SIEM monitoring, a dependency map can be
drawn, showing all the components that help deliver a critical service – be it in the same server
or different set of servers. While designing this dependency map one has to remember that there
could be multiple components capable of being monitored and that need monitoring residing on
same server.
There are organization and service provider-based grade appliances available from various
prominent vendors that discover as well as eradicate a DDoS attack with high degree of
accuracy.
There are three distinct modes in which Anti-DDoS appliances can be deployed for discovering
DDoS attacks.
In-band Mode
In this mode of deployment, the appliances are placed in the path of network traffic similar to
network firewalls or IPS. The advantage of this mode is that the appliance has complete visibility
of network traffic, and provides continuous protection against DDoS attacks. Often, these
appliances perform both discovery as well as eradication of DDoS attacks.
On the other hand, this deployment increases complexity, and introduces yet another point of
failure in the network, as shown in Figure 12.
SPAN/TAP Mode
Unlike the In-band mode, the device deployed in this mode works with a copy of network traffic
and performs DDoS discovery based on that traffic. The network traffic copy can be provided to
the device by using the SPAN/RPAN facility of a network switch or using a network TAP
device. A sample deployment is shown in Figure 13: SPAN/TAP Mode deployment:
The advantage of this mode is that it does not add another point of failure or any additional layer
of complexity like the In-band mode. However, as the traffic is not passing through it, it cannot
actively block malicious traffic and will always have to depend on other devices for defending
against a DDoS attack.
Out-of-band Mode
The mode in which an Anti-DDoS appliance can be deployed depends on the appliance itself, as
not all of them are designed to be deployed in this mode.
This is because the attack traffic, before reaching Anti-DDoS appliances, chokes the “last mile”
of network connectivity to the organization, rendering ineffective any solution that is deployed
in-premises in protecting against a high profile DDoS attack, as shown in Figure 15: DDoS
attack targeting last mile connectivity.
In order to get more clarity on the advantages and disadvantages of this solution, Table 17:
Effectiveness of various technologies can be consulted, under the Appendix.
There are two types of Anti-DDoS service providers – network service providers or Internet
Service Providers (ISP) and Security Service Providers(SSP) who do not generally provide
network services nor own cables.
In order to provide these Anti-DDoS services from their cloud, the network service providers
generally deploy various purpose-built Anti-DDoS appliances in their network. In addition, they
enable their edge routers to feed information to it. This enables them to perform DDoS discovery
on their clients’ behalf, as shown in Figure 16: DDoS Discovery at ISP, and alert clients
accordingly.
The advantage of opting for an added DDoS discovery and alerting service from the network
service provider is that it involves minimal to no efforts from the organization’s side. Network
service providers are already aware of which network segments are used by an organization; all
they have to do is enable monitoring on those segments. The flip side of this service is if an
organization has connections from multiple ISPs, and one/some of them are not providing such a
service, then effectively, the organization is unprotected.
In order to discover a DDoS attack, these SSPs either take network traffic metadata from their
client’s edge routers over a secure tunnel or get their client’s DNS changed to their DNS, as
elaborated on in Section 5.4.2.
Since these SSPs are network agnostic, they provide protection to their clients regardless of the
network provider.
5 Planning defence
The battle against DDoS attacks is partially won when the organization has succeeded in
discovering an attack within fifteen minutes of it starting to affect them. The next logical step is
to start eradicating it, achieving complete defence from the attack.
5.1.1 Firewalls
These appliances can provide protection if the attack is simple and is originating from a few
specific sources. Firewalls also offer “Syn protection” that prevents a Syn Flood attack from
spoofed sources. They also provide Geo-IP and Bogon/Dark IP-based filtering, which can help
effectively eliminate an attack originating from unintended or non-existent IP address ranges.
5.1.2 Routers
Modern routers provide firewall like functionality, and the same can be utilized to eradicate
DDoS attacks, as discussed in the previous section. Additionally, routers also provide the traffic-
shaping and rate-limiting feature that can be used to reduce the impact of an attack on networks
located behind the router.
For example, when an attack is targeting a legitimate DNS server, and DNS requests packets
from the attacker have a unique domain name, then that can be taken as a pattern, and any
packets that matches the pattern can be dropped using IPS.
convergence and route injection delays, the appliance itself should be plugged into one of the
interfaces of that edge router.
In this mode, the appliance is always in the path of traffic and hence able to provide continuous
protection to networks behind it from DDoS attacks, as shown in Figure 12: In-band Mode
deployment.
The advantage of this type of deployment is that the network is continuously protected from
DDoS attack as traffic is always flowing through these appliances. On the other hand, these
additional devices add to network complexity, as they introduce yet another point of failure.
The Anti-DDoS appliance when deployed in this mode is positioned in a separate infrastructure
zone within a network, as shown in Figure 18: Out-of-band mode deployment.This device is
generally not in the path of the network, but it introduces itself within the network path whenever
the network is under attack. It does this by performing route manipulation, using pre-configured
dynamic routing protocol.
These are generally purpose-built for DDoS eradication only, and they rely on other methods for
attack discovery itself. These are generally deployed by network and security service providers
in their cloud to provide DDoS eradication services to their clients.
When an organization wants to use this service, it can advertise an additional, more specific
route by attaching the above-stated RTBH community to it. Since this is a more specific route, it
takes precedence over existing routes. In addition, since this route also has the RTBH community
attached to it, routers will start dropping traffic just for that specific IP prefix, as advertised by
the organization.
When they want traffic towards any of their public IP address prefixes to be black-holed, they
communicate this to their ISP, and their job is done. Later they configure their network with
necessary black-holing thus dropping traffic to a specific requested IP prefix.
These service providers are able to provide a greater degree of DDoS protection by deploying
high-power and high capacity Anti-DDoS scrubbing centres throughout multiple countries and
continents. Most of them have tens to hundreds of Gigabits of network and scrubbing capacity.
This approach provides continuous protection from DDoS attacks with the help of in premises
deployed, purpose-built Anti-DDoS appliance, and protection from high volume, targeted, and
persistent attacks with the help of Anti-DDoS service from a service provider.
If there are multiple sites that qualify as per the above criteria, then initial protection should be
provided for Mission Critical and Business Essential sites.
and eradication solution available in organization. For other site categories, the organization can
choose to either provide a DDoS discovery service or provide DDoS defence service, or both. In
order to get site-specific information and make informed decision, the site inventory list can be
consulted.
When choosing existing devices for performing DDoS defence, capabilities that were highlighted
in Section 5.1, should be reviewed against defensive requirements. This is to make sure the
proposed defence method is able to meet the site requirements. It should be noted that sites with
high-security requirements might need purpose-built DDoS protection service from third-party
providers or even hybrid solutions, depending on site requirements.
6.1.5 Documentation
After the necessary site protection mechanisms and requirements are finalized, along with DDoS
discovery and defence, these same items should be updated in the various documents and
templates. These include the site inventory, asset inventory, and even incident management
process. The updated set of documents should include at least the following information:
The documentation helps gather updated security posture of a site and other related information,
should the need arise in future.
Manual reporting:
In this form of incident reporting, the incident is noticed by an individual who can be either
within or outside of the organization. Generally, it is noticed by an individual as “something-is-
wrong” and is hindering his normal work, where an end user of some service is not able to access
it, and thus reports the issue to the service desk. Thus, initial manual reporting of a DDoS
incident to CERT is generally received from the service desk team.
This type of manual DDoS attack reporting is generally noticed in organizations that are least
prepared to handle them; and even after reporting, they miss the bigger picture to see it as an
attack.
Automated reporting:
This is done with the help of the DDoS discovery tools discussed earlier in this paper and is
usually integrated into a corporate ticketing system. The CERT would generally have various
monitoring consoles open that should quickly be able to discover a DDoS attack after it has
exceeded a pre-set threshold.
In case the incident was reported manually, it is the responsibility of the CERT member to make
sure that every reported incident is registered in the ticketing system and followed up based on
priority.
Incident scoping:
Many large organizations have multiple geographically distributed CERTs, and an incident can
be discovered by more than one of those teams. In such a case, the CERT member should first
identify and scope the incident. This is to decide if an incident falls within their scope of work
and initiate the registration process after the appropriate scope is identified for the incident.
Incident verification:
This process will start the post registration of an incident, and helps segregate true incidents from
a collection of false reports. Regardless of how the incident was reported, a CERT member
should verify the incident details and take decision whether the reported incident was true. This
can be a simple or involved task, depending on the complexity of the reported incident.
However, it is important to verify an incident; as once it is identified as false, the incident will be
closed and no further action taken on it.
Incident pre-categorization:
This process involves gauging the impact of an attack with the information available at this
stage, all while not considering the information for the targeted system. It is important to see the
attack itself and gauge its impact in isolation regardless of what it is targeting. Depending on the
organizational incident response program, the categorization can be High, Medium, Low, or any
other agreed to categorization as per the organizational standard. In order to properly pre-
categorize an incident one or more of following attack parameters can be considered:
Incident prioritization:
This process involves combining incident pre-categorization along with endpoint information to
conclude the criticality level of an incident. This process helps putting a particular incident in
queue with other incidents for being addressed at a specific position, depending on the incident
priority. A high priority incident should be addressed with top priority over other incidents.
Table 15, as found in the Appendix, can help a CERT member prioritize an incident based on its
target asset and incident pre-categorization values.
for the site. Here the approach that an incident handler should take is to make sure he uses the
appropriate tools for eradicating the attack and chooses appropriate configuration options in the
tool(s) to make the best use of it.
More often than not, the resolution process is circular. In order to eradicate a DDoS attack, the
incident handler goes through a set of tasks more than a few times. This helps him refine the
eradication parameters at each pass, making the eradication of attack more effective than in the
previous cycle.
Upon receiving attack details from the CERT, the network or security team performs feasibility
checks to identify any immediate ill effects for the blocking of traffic at the perimeters of the
targeted site(s). Once the feasibility checks are done and ill effecting parameters are eliminated,
they configure necessary rules in perimeter devices of various sites to block similar attack from
targeting those sites as well. Most likely, such rules are temporary and should remain active only
for a few days or weeks, as systems involved in the attack are generally legitimate user machines
that had been turned into a botnet. Hence keeping them blocked forever could result in potential
business loss.
Preparation:
This activity must happen as soon as the incident is closed. The handler should document the
highlights of the attack using some pre-defined format, stating items or issues that were unusual
and discuss how they were managed. This ‘lessons learned’ document has to be prepared with
the help of other handlers involved. In post preparation, the document should be reviewed and
approved by fellow handlers.
Dissemination:
Once the lessons learned are documented and published, they should be discussed with wider
audience of incident handlers as knowledge sharing session that are done on regular basis. It is
not necessary for each incident to be discussed in that knowledge sharing session, but certainly
complex and targeted ones should be discussed.
The meeting should be organized and conducted to meet the following goals of identifying:
One of the key takeaways of this meeting could be the improvement of the overall security
infrastructure within the organization. Some of the brainstorming ideas can be converted into
rules and policies that can immediately be applied to the organization, thus making its security
stronger, one-step at a time.
7 Conclusion
Distributed Denial of Service attacks are becoming inevitable in the present age, with even small
handheld devices providing more power and capable of accessing large bandwidths that were
once on available to large enterprises. With the consumerization of IT, the increasing availability
of these high-power devices, awareness among owners to keep them safe is not increasing at the
same pace. Hence, a large number of devices are vulnerable to various types of abuses. These
devices are easily being converted into botnets and used to launch DDoS attacks against various
public and private sector organizations, including national/state departments.
This high bandwidth and power provides increased power in attacker’s hands, and thus the size
and shape of DDoS attacks has been increasing day by day. To add to this, point and click tools
to launch such attacks are freely available. In addition, since these attacks have a high possibility
of creating an impact on some target, an economy has been built around it. Hence an ill-intended
and cash rich organization can opt to rent a botnet to launch an attack by themselves, or avail
DDoS Attack as a service where they pay for launching a DDoS attack on their behalf to a DDoS
Attack service provider and get the attack launched, towards target organization.
While launching such attacks has become simpler and attack vectors became bigger, it has
become complex and more resource consuming for an enterprise to defend itself. Enterprises
cannot depend only on the traditional security devices and processes that they have been using.
In order to defend against a DDoS attack, the enterprise should have the right infrastructure,
skilled people, and tested processes. Thus, any organization that is serious about its IT security
should be prepared to withstand a DDoS attack.
This paper has presented various ways in which organizations of different sizes and capabilities
can prepare themselves to handle a DDoS attack. The paper provided initial preparation steps
that are mandatory not just for withstanding a DDoS attack but for any IT security incident
management program initiation. Later it provides various options that would help an
organization to discover that they are under an active DDoS attack. Here the goal was to discover
it within fifteen minutes of attack becoming lethal. Then similarly, different options were
provided that will help an organization eradicate the attack post detection of same.
The paper also offers ways in which enterprises can reuse their existing infrastructure to achieve
some level of protection from DDoS attack. It also gave ways in which protection can be
strengthened by deploying purpose-built anti-DDoS appliances. Later it was clarified that
discovering and eradicating a DDoS attack are two independent activities, and nothing that is
deployed on enterprise premises will be able to provide adequate protection due to nature of
DDoS attacks. That is because a powerful and targeted attack can choke organizations’ last mile
network connectivity, thus making everything on-premises ineffective. Therefore cloud based
solutions were suggested, where service providers would be able to help the enterprise with
DDoS eradication in one way or other, thus making sure last mile internet connectivity is not
saturated.
However, it was later hinted that the most appropriate way to handle a DDoS attack was to have
a custom-built hybrid model for both detection and eradication. This ensures that the enterprise
gets best of both worlds – that is, quicker protection from on premises devices, and assured
protection from large and persistent attacks with the help of security service providers.
Towards the end, this paper tied everything up by proposing changes to an existing Incident
Management process and listing necessary information that should be collected by an enterprise
that is willing to start their Anti-DDoS program. Finally, the paper also gives various steps that
can be done during an Incident Management process and how they should be used and
documented in order to achieve the best possible protection from DDoS attacks using available
resources.
8 References
Akamai. (n.d.). DDoS. Retrieved from www.akamai.com:
https://www.akamai.com/us/en/resources/protect-against-ddos-attacks.jsp
Beardmore, K. (2013, May 1). The Truth about DDoS Attacks: Part 1. carbon60.com, p. 1.
Bright, P. (2011, Apr 14). DoJ, FBI set up command-and-control servers, take down botnet.
Retrieved from arstechnica.com: http://arstechnica.com/security/2011/04/doj-fbi-set-up-
command-and-control-servers-take-down-botnet/
Bright, P. (2011, March 22). How Operation b107 decapitated the Rustock botnet. Retrieved
from arstechnica.com: http://arstechnica.com/information-technology/2011/03/how-
operation-b107-decapitated-the-rustock-botnet/
Chen, A. (2012, January 19). The Evil New Tactic Behind Anonymous' Massive Megaupload
Revenge Attack. Retrieved from gawker.com: http://gawker.com/5877707/the-evil-new-
tactic-behind-anonymous-massive-revenge-attack
Fisher, D. (2015, July 31). FBI Warns of Increase in DDoS Extortion Scams. Retrieved from
threatpost.com: https://threatpost.com/fbi-warns-of-increase-in-ddos-extortion-
scams/114092
Lee, M. (2012, January 5). ANZ E*Trade outage actually DDoS attack. Retrieved from ZDNet:
http://www.zdnet.com/article/anz-etrade-outage-actually-ddos-attack/#!
Nazario, J. (2008, August 12). Georgia DDoS Attacks – A Quick Summary of Observations.
Retrieved from arbornetworks.com: https://asert.arbornetworks.com/georgia-ddos-
attacks-a-quick-summary-of-observations/
Peters, S. (2014, August 26). Sony, XBox Victims Of DDoS, Hacktivist Threats. Retrieved from
darkreading.com: http://www.darkreading.com/sony-xbox-victims-of-ddos-hacktivist-
threats/d/d-id/1306656
Reese, B. (2008, November 18). Cisco technology partner: DDoS attack sizes may be on pace to
approach 100 gigabits by this time next year. networkworld.com, p. 1.
Sanders, A. E. (2011, November 23). FBI Denver Cyber Squad Advises Citizens to be Aware of a
New Phishing Campaign . Retrieved from fbi.gov: https://www.fbi.gov/denver/press-
releases/2011/fbi-denver-cyber-squad-advises-citizens-to-be-aware-of-a-new-phishing-
campaign
Wood, B. (2014, August 7). Analyze This: Denial of Service Attacks. americanis.net, p. 1.
9 Appendix
Resource
Attack Attack Vector
targeted
ICMP Flood Layer 3 Network
or Smurf Attack Protocol bandwidth
UDP Flood Layer 4 Network
Protocol bandwidth
LOIC Layer 4 Network
Protocol bandwidth
Resource
Attack Attack Vector
targeted
Christmas tree Layer 4 CPU utilization
Protocol
TTL Expiry Layer 3 CPU utilization
Protocol
<HostName/FQDN>
Physical Aspects
Asset id
Location Serial no.
Manufacturer Install Date
Model Asset Type Server/Appliance
Memory CPU/ Cores/
Speed
Hard disk count/ NIC count /
Capacity of each / Type /
Type
Available/Used Available/Used
RAM slots CPU Slots
Available/Used Available/Used
Hard disk slots PCI slots
NIC to Switch Switch
connections connected to
Power to Socket Power socket/
connections UPS connected
to
Is Virtual Yes/No If virtual, Host
asset id
Logical Aspects
Operating System Host Name
with Flavor
Service pack or Interface
Update No. Name/IP
Address/
MAC
Address
Bit Architecture Asset Mission Critical/ Business
Criticality Essential/ Business Core/
Business Supporting
Source: (Wocteam, 2009)
Asset Purpose Scheduled
Down time
and Impact
Asset Status In use/ Inactive/ Translated
Retired Addresses
Is public facing Yes/No Is partner Yes/No
facing
Contact Information
Business owner - BO Primary
Primary Contact info
and contact
hours
Business owner - BO Backup
Backup Contact info
and contact
hours
Technical Owner - TO Primary
Primary Contact info
and contact
hours
Technical Owner - TO Backup
Backup Contact info
and contact
hours
Monitoring Information
Services Monitored NMS
collector
Logs forwarded Log collector
Flow exported Yes/No Flow
collector
Monitored from Yes/No Services
Outside monitored
from Outside
BCP/DR Information
Role Primary/Backup Redundant
for
Data Sync type Real time/Batch Data sync
frequency
Backup configured Yes/No Directories/
Items Backed
up
Backup Schedule Test restore
schedule
SAN/NAS Yes/No SAN/NAS
connectivity connected to
Drives/ Directories
used of SAN/NAS
Dependent of this This asset
asset depending on
<Circuit Name>
Circuit Information
Circuit id
Location – Point A Location – Point B
Provider Circuit Type Internet/ MPLS/ Point-
to-Point
Install Date Renewal Date
Limitations Bandwidth: Circuit Features With protection/ with
Traffic Cap: redundancy etc.
Cable provider/ Physical Media
Route Used
Provider Point of Provider
Contact (POC) Escalation POC
Provider POC Provider
contact hours Escalation POC
contact hours
Provider SLA Provider <VAS that provider can
Capabilities provide currently but is
not subscribed for>
BCP/DR Information
Is backup Yes/No Backup Type Active/Active or
available Active/Standby
Primary of Backup of
Point A L1 Point B L1
Termination Termination
Point A L2/3 Terminating Asset id: Point B L2/3 Terminating Asset id:
Termination and Termination and
Type - Primary Asset Type: Type- Primary Asset Type:
Firewall/Router/Switch Firewall/Router/Switch
Point A L2/3 Terminating Asset id: Point B L2/3 Terminating Asset id:
Termination and Termination and
Type - Backup Asset Type: Type- Backup Asset Type:
Firewall/Router/Switch Firewall/Router/Switch
Usage information
Expected Data % Expected Data <absolute>
Expected Voice % Expected Voice <absolute>
Expected Mission % Expected <absolute>
critical traffic Mission critical
traffic
QOS Implemented Yes/No QOS Details
<Site Name>
Physical Information
Site Code Site Address
Seating capacity Occupancy
Multi-tenanted Yes/No Facility
Management
Contact info
Hosting Internal Yes/No Hosting Public Yes/No
Datacenter Datacenter
Operational Operating 24x7 Yes/No
Functions
Site Criticality Mission Critical/ Business Essential/ Business Core/ Business
Supporting
Connectivity Information
Physical Circuits <Circuit id1 .. n> Virtual Circuits <Circuit id1 .. n>
Incoming Circuits <Circuit id1 .. n> Outgoing <Circuit id1 .. n>
Circuits
Internet connected Yes/No Internet used for Just VPN/Other data
traffic/Both
BCP/DR Information
Site Redundancy Yes/No Redundancy Active/Active or
available Type Active/Standby
This site Primary/Backup Other site Primary/backup
Other site – Site Site replication Real-time/ Batch/
code strategy None
Team Role
Cyber Emergency This is the Emergency response team that will perform Incident
Response Team Management.
(CERT)
IT Security This is core team that gets involved during an IT security incident
management.
Network As DDoS is network based attack and depends on network for
discovery and eradication; getting this team involved in a DDoS
incident management process is of prime importance.
Server Management As DDoS attacks target servers or their availability, having this
team involved is mandatory. A representative from each server
type is required, for example Windows, Linux/Unix, Mainframe
etc.
Business Continuity This team will help identify alternative methods of bringing up
and Disaster critical services from an alternative location, should the primary
Management location get hit by DDoS attack.
Business Management Members of this team will help analyse impact of an attack and
provide valuable inputs during containment and eradication phase
of incident management lifecycle.
Legal advisory Individuals from this team will help in following situations.
Identify compliance requirement for incident management
program.
Help in situations where a ransom demand is made during
active DDoS attack
Identify the legal liability of an organization during a DDoS
attack.
Identity legal options that an organization has that will help
eradicate an attack.
Corporate Members of this team will help manage internal and external
Communications and communications regarding an attack, and help maintain
Public Relations organization’s public image.
Network Flow
Vendor
exporter
Cisco NetFlow
Juniper Networks JFlow
3Com/HP NetStream
Huawei Technologies NetStream
Alcatel-Lucent CFlowd
Ericsson Rflow
Citrix AppFlow
<Site Name>
Using appliance Using appliance Using cloud
deployed at the site deployed in other site based service
Discovery using general
methods
Discovery using
purpose-built appliances
Defense using general
security appliances
Defense using purpose-
built appliances
Target
Asset
Category Mission Business Business Business
Incident Critical Essential Core Supporting
pre-
category
alerting
Remotely Triggered Generally provided free of Unless BGP based solution is
black holing cost by network providers used, the triggering can take
Most effective when target time.
is non-existent or dark IP If not used carefully, can
address range. complete attack for malicious
user.
Anti-DDoS appliance Easier to deploy and Generally costlier than other
manage solutions
Provides complete Requires skilled people to
protection using various manage the solution
countermeasures Deployment can be complex
Provides continuous Cannot defend against high-
protection as this can be volume, and persistent attacks
deployed in-line to traffic
path
Protects from low and slow
as well as SSL based
attacks
Anti-DDoS service Easy to avail protection if Unless all the links are
network providers provide protected, the entire
this service as well infrastructure is not protected
Protects an organization Initiating protection could
from high-volume and introduce some delay, which
persistent attacks could result in service outage
Does not require any Cannot protect effectively from
footprint in enterprise, as it low and slow and SSL based
can be completely cloud attacks.
based