SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
DDoS Protection Solution
#Terabit Security LLC, 2016
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
AGENDA
About DDoS
Terabit Security
DPS
Technical
Specialty
Contact Us
Request a Demo
About DDoS
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
ABOUT DDoS
2015 © Terabit Security, All rights reserved
SOME FIGURES ABOUT DDoS
2015 © Terabit Security, All rights reserved
IMPACT OF DDoS ATTACKS ON YOUR BUSINESS
Theft
Attacks are becoming more advanced and now
include stolen funds, customer data, and
intellectual property
Productivity loss
When critical network system are shut down,
your workforce’s productivity comes to a halt
Revenue loss
Downtime affects your bottom-line. The average
costs of downtime is $5,600/minute, or over
$300K/hour
Reputation Damage
Your band suffers if customers can't access your
site or became casualties of data breach
Even with a large staff of IT
professionals it is almost impossible
for companies to handle a serious
DDoS attack and recover their
services on their own
Kaspersky Lab
E.Vigovsky, head of DDoS protection
2015 © Terabit Security, All rights reserved
PROFESSIONALS SAYS ABOUT DDoS
Hackers' improving and evolving
techniques are especially obvious
when it comes to distributed-denial-
of-service attacks.
DDos is on a trend that is only
going to continue
Businesses are facing a number of
threats in today's economy. When a
DDoS attack or DNS failure hits a
website or network, companies are
losing significant revenue and
employee productivity, and are likely
seeing decreasing customer
satisfaction and loyalty
Arbor Networks
Matt Moynahan, president
Verisign
Ben Petro, senior VC
Terabit Security DPS
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
TERABIT SECURITY DPS
Terabit DPS is solution for the detection of
DDoS attacks and their subsequent
treatment. Terabit DPS will help to ensure
maximum availability of your network and
eliminate any disruptions caused by DoS /
DDoS attacks
2015 © Terabit Security, All rights reserved
WHY DPS
Fast Deployment
Disparately fast deployment of DDoS protection
system – 10 minutes to start
Clustering
Clustering option for performance and
redundancy. Sflow capture – up to 10Tbps (1Tbps
per server), traffic mirroring – up to 6.4Tbps
(40Gbps per server)
Premium Support
All support inquiries are answered by experienced
engineers. Terabit DPS Proffesional Support with
SLA 24×5, 24×7, 24×365
Advanced WEB GUI
Web application offers single-point DPS
management, network monitoring and reporting
of data received from Collector, Explorer and
Filters deployed within the network
Affordable DDoS Protection
The most cost-effective on-premise DDoS
mitigation solution on the market! Annual
subscriptions include free support and upgrades.
Traffic Visualization Tool
Visualization of traffic Upstream / Donwstream in
bps and pps for whole network or dedicated host
Short response time
Immediate detection of DoS/DDoS attack in 1-2
seconds
Low hardware requirements
Up to 10GE with 12 Mpps on E5-1650V3 with Intel
NIC 82599 10GE
Primary uplink
Customers
Border
router
Access
switch
Backup uplink
DPS Server
BGP,
BGP Flowspec
NetFlow/IPFIX
sFlow, Port mirror
2015 © Terabit Security, All rights reserved
HOW DPS WORKS
Supported border routers
Extreme X460/X670
Juniper EX, MX series
Cisco ASR-series
2015 © Terabit Security, All rights reserved
HOW DPS WORKS
Traffic Capturing
NetFlow v5, v9
IPFIX
sFlow v4 (dev branch only), v5
Port mirror/SPAN capture with PF_RING (with ZC/DNA
mode), SnabbSwitch, NETMAP and PCAP
DDoS Mitigation
Complete BGP Flowspec support, RFC 5575
Can process incoming and outgoing traffic
Can trigger block script if certain IP loads network with a
large amount of packets/bytes/flows per second
Thresholds could be configured in per subnet basis with
hostgroups feature
Could announce blocked IPs to BGP router with ExaBGP
GoBGP integration for unicast IPv4 announces
2015 © Terabit Security, All rights reserved
OUR SOLUTIONS
DPS SOFTWARE APPLIENCE DPS VIRTUAL APPLIENCE DPS HARDWARE APPLIENCE
GET FULL FUNCTIONALITY OF DPS
Install DPS on your own server
Protection up to 400Gbps
Most popular OS supported
GET SAFETY WITHIN 15 MINUTES
Restore image to your hypervisor
Protection up to 400Gbps
Most popular hypervisors supported
GET ENTERPRISE LEVEL SOLUTION
Guaranteed SLA
Protection up to 6.4Tbps
Advanced support included
2015 © Terabit Security, All rights reserved
PROFESSIONAL SUPPORT
Basic Intermediate Advanced
8×5 support service | 20 cases per year 12×7 support service | unlimited cases per year 24×7 support service | unlimited cases per year
Provides an engaged response for
small companies with a limited
number of cases
Provides professional support for
non-critical systems based on 12x7
schedule
Provides an enterprise level 24x7
support for critical systems with
unlimited number of cases
2015 © Terabit Security, All rights reserved
OUR CUSTOMERS
1000+ customers
20+ countries
Terabits of protected traffic
* Includes community version
What people say about us
Technical Specialty
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
o Еаsy of implementation and uses well
understood constructs
o Requires high degree of co-ordination
between customer and provider
o Cumbersome to scale in a large network
perimeter
o Mis-configuration possible and expansive
Destination Remotely Triggered
Black Hole (D/RTBH)
2015 © Terabit Security, All rights reserved
o RFC 5635 circa 2009
o Requires pre-configuration of discard route
and uRPF on all edge routers
o Victim`s destination address is still useable
o Only works for single (or small number)
source
Source Remotely Triggered Black
Hole (S/RTBH)
DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
2015 © Terabit Security, All rights reserved
WHY BGP FLOWSPEC
 FlowSpec Leverages the BGP Control-plane to simplify the distribution
of ACL's, greatly improving operations.
• Inject new filter/firewall rules to all routers at the same time
without changing router config
• Reuse existing BGP operational knowledge and best practices
• Control policy propagation via BGP communities
 Improve response time to mitigate DDOS attacks
 Same Automation as RTBH
 Route validation is performed for eBGP sessions.
RFC5575
BGP Flowspec
2015 © Terabit Security, All rights reserved
BGP FLOWSPEC SPECIFICATION
Flowspec is very useful feature against today’s
DDOS.
Rule was too long, so forwarding router could not
apply filter as the result not only DDOS but also
normal traffic down.
This is defined in RFC 5575 . Specific information
about the flow can now be distributed using a BGP
NLRI.
AFI/SAFI = 1/133: Unicast Traffic Filtering
Applications
AFI/SAFI = 1/134 : VPN traffic filtering applications.
BGP Flow Specification can include the
following information
Type 1 - Destination Prefix
Type 2 - Source Prefix
Type 3 - IP Protocol
Type 4 - Source or Dest. Port
Type 5 - Destination Port
Type 6 - Source Port
Type 7 - ICMP Type
Type 8 - ICMP Code
Type 9 - TCP flags
Type 10 - Packet length
Type 11 - DSCP
Type 12 - Fragment Encodins
Actions are defined using BGP
Extended Communities
0x8006 - traffic-rate (set to 0 to drop all traffic)
0x8007 - traffic-action (sampling)
0x8008 - redirect to VRF (route target
0x8009 - traffic-marking (DSCP value)
2015 © Terabit Security, All rights reserved
BGP FLOWSPEC VENDOR SUPPORT
Supported by router vendors
SR OS 9.0R1 JUNOS 7.3 ASR and CRS
Supported by DDoS protection vendors
Peakflow SP 3.5 DDoS Secure 5.14.2-0 Defense Pro
since
2015 © Terabit Security, All rights reserved
CONTACT US
Sales Office
Rocklin CA, USA
Development Office
Kiev, Ukraine
https://terabitsecurity.com/
Sales
+1 650 460 14 86
sales@terabitsecurity.com
Terabit Security LLC
Rocklin CA, USA
Support
Support Center
http://support.terabitsecurity.com/
support@terabitsecurity.com
KEEP
CALM
AND
ENJOY
WORK
Request
a Demo
2015 © Terabit Security, All rights reserved
REQUEST A DEMO
Request
A Demo

Weitere ähnliche Inhalte

Was ist angesagt?

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...Ziv Ichilov
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PROIDEA
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionImperva Incapsula
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5 Networks
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-endborsan
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksMedia Perspectives
 
F5 DNS Solution for CSPs
F5 DNS Solution for CSPsF5 DNS Solution for CSPs
F5 DNS Solution for CSPsF5 Networks
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...Indonesia Network Operators Group
 

Was ist angesagt? (20)

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Cci Welcome
Cci WelcomeCci Welcome
Cci Welcome
 
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerability
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-en
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
F5 DNS Solution for CSPs
F5 DNS Solution for CSPsF5 DNS Solution for CSPs
F5 DNS Solution for CSPs
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
 

Andere mochten auch

Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaPavel Odintsov
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdPavel Odintsov
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)Pavel Odintsov
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationPavel Odintsov
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationPavel Odintsov
 

Andere mochten auch (6)

Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 

Ähnlich wie DDoS Protection Solution in 40 Characters

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyCloudflare
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERJody Spoor
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersCorero Network Security
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecurityTzoori Tamam
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceCloudflare
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationCorero Network Security
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficShain Singh
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...National Retail Federation
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 

Ähnlich wie DDoS Protection Solution in 40 Characters (20)

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTER
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
ServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - PortfolioServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - Portfolio
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric Security
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

DDoS Protection Solution in 40 Characters

  • 1. DDoS Protection Solution #Terabit Security LLC, 2016 2015 © Terabit Security - All rights reserved
  • 2. 2015 © Terabit Security, All rights reserved AGENDA About DDoS Terabit Security DPS Technical Specialty Contact Us Request a Demo
  • 3. About DDoS 2015 © Terabit Security - All rights reserved
  • 4. 2015 © Terabit Security, All rights reserved ABOUT DDoS
  • 5. 2015 © Terabit Security, All rights reserved SOME FIGURES ABOUT DDoS
  • 6. 2015 © Terabit Security, All rights reserved IMPACT OF DDoS ATTACKS ON YOUR BUSINESS Theft Attacks are becoming more advanced and now include stolen funds, customer data, and intellectual property Productivity loss When critical network system are shut down, your workforce’s productivity comes to a halt Revenue loss Downtime affects your bottom-line. The average costs of downtime is $5,600/minute, or over $300K/hour Reputation Damage Your band suffers if customers can't access your site or became casualties of data breach
  • 7. Even with a large staff of IT professionals it is almost impossible for companies to handle a serious DDoS attack and recover their services on their own Kaspersky Lab E.Vigovsky, head of DDoS protection 2015 © Terabit Security, All rights reserved PROFESSIONALS SAYS ABOUT DDoS Hackers' improving and evolving techniques are especially obvious when it comes to distributed-denial- of-service attacks. DDos is on a trend that is only going to continue Businesses are facing a number of threats in today's economy. When a DDoS attack or DNS failure hits a website or network, companies are losing significant revenue and employee productivity, and are likely seeing decreasing customer satisfaction and loyalty Arbor Networks Matt Moynahan, president Verisign Ben Petro, senior VC
  • 8. Terabit Security DPS 2015 © Terabit Security - All rights reserved
  • 9. 2015 © Terabit Security, All rights reserved TERABIT SECURITY DPS Terabit DPS is solution for the detection of DDoS attacks and their subsequent treatment. Terabit DPS will help to ensure maximum availability of your network and eliminate any disruptions caused by DoS / DDoS attacks
  • 10. 2015 © Terabit Security, All rights reserved WHY DPS Fast Deployment Disparately fast deployment of DDoS protection system – 10 minutes to start Clustering Clustering option for performance and redundancy. Sflow capture – up to 10Tbps (1Tbps per server), traffic mirroring – up to 6.4Tbps (40Gbps per server) Premium Support All support inquiries are answered by experienced engineers. Terabit DPS Proffesional Support with SLA 24×5, 24×7, 24×365 Advanced WEB GUI Web application offers single-point DPS management, network monitoring and reporting of data received from Collector, Explorer and Filters deployed within the network Affordable DDoS Protection The most cost-effective on-premise DDoS mitigation solution on the market! Annual subscriptions include free support and upgrades. Traffic Visualization Tool Visualization of traffic Upstream / Donwstream in bps and pps for whole network or dedicated host Short response time Immediate detection of DoS/DDoS attack in 1-2 seconds Low hardware requirements Up to 10GE with 12 Mpps on E5-1650V3 with Intel NIC 82599 10GE
  • 11. Primary uplink Customers Border router Access switch Backup uplink DPS Server BGP, BGP Flowspec NetFlow/IPFIX sFlow, Port mirror 2015 © Terabit Security, All rights reserved HOW DPS WORKS Supported border routers Extreme X460/X670 Juniper EX, MX series Cisco ASR-series
  • 12. 2015 © Terabit Security, All rights reserved HOW DPS WORKS Traffic Capturing NetFlow v5, v9 IPFIX sFlow v4 (dev branch only), v5 Port mirror/SPAN capture with PF_RING (with ZC/DNA mode), SnabbSwitch, NETMAP and PCAP DDoS Mitigation Complete BGP Flowspec support, RFC 5575 Can process incoming and outgoing traffic Can trigger block script if certain IP loads network with a large amount of packets/bytes/flows per second Thresholds could be configured in per subnet basis with hostgroups feature Could announce blocked IPs to BGP router with ExaBGP GoBGP integration for unicast IPv4 announces
  • 13. 2015 © Terabit Security, All rights reserved OUR SOLUTIONS DPS SOFTWARE APPLIENCE DPS VIRTUAL APPLIENCE DPS HARDWARE APPLIENCE GET FULL FUNCTIONALITY OF DPS Install DPS on your own server Protection up to 400Gbps Most popular OS supported GET SAFETY WITHIN 15 MINUTES Restore image to your hypervisor Protection up to 400Gbps Most popular hypervisors supported GET ENTERPRISE LEVEL SOLUTION Guaranteed SLA Protection up to 6.4Tbps Advanced support included
  • 14. 2015 © Terabit Security, All rights reserved PROFESSIONAL SUPPORT Basic Intermediate Advanced 8×5 support service | 20 cases per year 12×7 support service | unlimited cases per year 24×7 support service | unlimited cases per year Provides an engaged response for small companies with a limited number of cases Provides professional support for non-critical systems based on 12x7 schedule Provides an enterprise level 24x7 support for critical systems with unlimited number of cases
  • 15. 2015 © Terabit Security, All rights reserved OUR CUSTOMERS 1000+ customers 20+ countries Terabits of protected traffic * Includes community version What people say about us
  • 16. Technical Specialty 2015 © Terabit Security - All rights reserved
  • 17. 2015 © Terabit Security, All rights reserved DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC o Еаsy of implementation and uses well understood constructs o Requires high degree of co-ordination between customer and provider o Cumbersome to scale in a large network perimeter o Mis-configuration possible and expansive Destination Remotely Triggered Black Hole (D/RTBH)
  • 18. 2015 © Terabit Security, All rights reserved o RFC 5635 circa 2009 o Requires pre-configuration of discard route and uRPF on all edge routers o Victim`s destination address is still useable o Only works for single (or small number) source Source Remotely Triggered Black Hole (S/RTBH) DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
  • 19. 2015 © Terabit Security, All rights reserved WHY BGP FLOWSPEC  FlowSpec Leverages the BGP Control-plane to simplify the distribution of ACL's, greatly improving operations. • Inject new filter/firewall rules to all routers at the same time without changing router config • Reuse existing BGP operational knowledge and best practices • Control policy propagation via BGP communities  Improve response time to mitigate DDOS attacks  Same Automation as RTBH  Route validation is performed for eBGP sessions. RFC5575 BGP Flowspec
  • 20. 2015 © Terabit Security, All rights reserved BGP FLOWSPEC SPECIFICATION Flowspec is very useful feature against today’s DDOS. Rule was too long, so forwarding router could not apply filter as the result not only DDOS but also normal traffic down. This is defined in RFC 5575 . Specific information about the flow can now be distributed using a BGP NLRI. AFI/SAFI = 1/133: Unicast Traffic Filtering Applications AFI/SAFI = 1/134 : VPN traffic filtering applications. BGP Flow Specification can include the following information Type 1 - Destination Prefix Type 2 - Source Prefix Type 3 - IP Protocol Type 4 - Source or Dest. Port Type 5 - Destination Port Type 6 - Source Port Type 7 - ICMP Type Type 8 - ICMP Code Type 9 - TCP flags Type 10 - Packet length Type 11 - DSCP Type 12 - Fragment Encodins Actions are defined using BGP Extended Communities 0x8006 - traffic-rate (set to 0 to drop all traffic) 0x8007 - traffic-action (sampling) 0x8008 - redirect to VRF (route target 0x8009 - traffic-marking (DSCP value)
  • 21. 2015 © Terabit Security, All rights reserved BGP FLOWSPEC VENDOR SUPPORT Supported by router vendors SR OS 9.0R1 JUNOS 7.3 ASR and CRS Supported by DDoS protection vendors Peakflow SP 3.5 DDoS Secure 5.14.2-0 Defense Pro since
  • 22. 2015 © Terabit Security, All rights reserved CONTACT US Sales Office Rocklin CA, USA Development Office Kiev, Ukraine https://terabitsecurity.com/ Sales +1 650 460 14 86 sales@terabitsecurity.com Terabit Security LLC Rocklin CA, USA Support Support Center http://support.terabitsecurity.com/ support@terabitsecurity.com
  • 24. 2015 © Terabit Security, All rights reserved REQUEST A DEMO Request A Demo