SlideShare a Scribd company logo
DDoS Protection Solution
#Terabit Security LLC, 2016
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
AGENDA
About DDoS
Terabit Security
DPS
Technical
Specialty
Contact Us
Request a Demo
About DDoS
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
ABOUT DDoS
2015 © Terabit Security, All rights reserved
SOME FIGURES ABOUT DDoS
2015 © Terabit Security, All rights reserved
IMPACT OF DDoS ATTACKS ON YOUR BUSINESS
Theft
Attacks are becoming more advanced and now
include stolen funds, customer data, and
intellectual property
Productivity loss
When critical network system are shut down,
your workforce’s productivity comes to a halt
Revenue loss
Downtime affects your bottom-line. The average
costs of downtime is $5,600/minute, or over
$300K/hour
Reputation Damage
Your band suffers if customers can't access your
site or became casualties of data breach
Even with a large staff of IT
professionals it is almost impossible
for companies to handle a serious
DDoS attack and recover their
services on their own
Kaspersky Lab
E.Vigovsky, head of DDoS protection
2015 © Terabit Security, All rights reserved
PROFESSIONALS SAYS ABOUT DDoS
Hackers' improving and evolving
techniques are especially obvious
when it comes to distributed-denial-
of-service attacks.
DDos is on a trend that is only
going to continue
Businesses are facing a number of
threats in today's economy. When a
DDoS attack or DNS failure hits a
website or network, companies are
losing significant revenue and
employee productivity, and are likely
seeing decreasing customer
satisfaction and loyalty
Arbor Networks
Matt Moynahan, president
Verisign
Ben Petro, senior VC
Terabit Security DPS
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
TERABIT SECURITY DPS
Terabit DPS is solution for the detection of
DDoS attacks and their subsequent
treatment. Terabit DPS will help to ensure
maximum availability of your network and
eliminate any disruptions caused by DoS /
DDoS attacks
2015 © Terabit Security, All rights reserved
WHY DPS
Fast Deployment
Disparately fast deployment of DDoS protection
system – 10 minutes to start
Clustering
Clustering option for performance and
redundancy. Sflow capture – up to 10Tbps (1Tbps
per server), traffic mirroring – up to 6.4Tbps
(40Gbps per server)
Premium Support
All support inquiries are answered by experienced
engineers. Terabit DPS Proffesional Support with
SLA 24×5, 24×7, 24×365
Advanced WEB GUI
Web application offers single-point DPS
management, network monitoring and reporting
of data received from Collector, Explorer and
Filters deployed within the network
Affordable DDoS Protection
The most cost-effective on-premise DDoS
mitigation solution on the market! Annual
subscriptions include free support and upgrades.
Traffic Visualization Tool
Visualization of traffic Upstream / Donwstream in
bps and pps for whole network or dedicated host
Short response time
Immediate detection of DoS/DDoS attack in 1-2
seconds
Low hardware requirements
Up to 10GE with 12 Mpps on E5-1650V3 with Intel
NIC 82599 10GE
Primary uplink
Customers
Border
router
Access
switch
Backup uplink
DPS Server
BGP,
BGP Flowspec
NetFlow/IPFIX
sFlow, Port mirror
2015 © Terabit Security, All rights reserved
HOW DPS WORKS
Supported border routers
Extreme X460/X670
Juniper EX, MX series
Cisco ASR-series
2015 © Terabit Security, All rights reserved
HOW DPS WORKS
Traffic Capturing
NetFlow v5, v9
IPFIX
sFlow v4 (dev branch only), v5
Port mirror/SPAN capture with PF_RING (with ZC/DNA
mode), SnabbSwitch, NETMAP and PCAP
DDoS Mitigation
Complete BGP Flowspec support, RFC 5575
Can process incoming and outgoing traffic
Can trigger block script if certain IP loads network with a
large amount of packets/bytes/flows per second
Thresholds could be configured in per subnet basis with
hostgroups feature
Could announce blocked IPs to BGP router with ExaBGP
GoBGP integration for unicast IPv4 announces
2015 © Terabit Security, All rights reserved
OUR SOLUTIONS
DPS SOFTWARE APPLIENCE DPS VIRTUAL APPLIENCE DPS HARDWARE APPLIENCE
GET FULL FUNCTIONALITY OF DPS
Install DPS on your own server
Protection up to 400Gbps
Most popular OS supported
GET SAFETY WITHIN 15 MINUTES
Restore image to your hypervisor
Protection up to 400Gbps
Most popular hypervisors supported
GET ENTERPRISE LEVEL SOLUTION
Guaranteed SLA
Protection up to 6.4Tbps
Advanced support included
2015 © Terabit Security, All rights reserved
PROFESSIONAL SUPPORT
Basic Intermediate Advanced
8×5 support service | 20 cases per year 12×7 support service | unlimited cases per year 24×7 support service | unlimited cases per year
Provides an engaged response for
small companies with a limited
number of cases
Provides professional support for
non-critical systems based on 12x7
schedule
Provides an enterprise level 24x7
support for critical systems with
unlimited number of cases
2015 © Terabit Security, All rights reserved
OUR CUSTOMERS
1000+ customers
20+ countries
Terabits of protected traffic
* Includes community version
What people say about us
Technical Specialty
2015 © Terabit Security - All rights reserved
2015 © Terabit Security, All rights reserved
DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
o Еаsy of implementation and uses well
understood constructs
o Requires high degree of co-ordination
between customer and provider
o Cumbersome to scale in a large network
perimeter
o Mis-configuration possible and expansive
Destination Remotely Triggered
Black Hole (D/RTBH)
2015 © Terabit Security, All rights reserved
o RFC 5635 circa 2009
o Requires pre-configuration of discard route
and uRPF on all edge routers
o Victim`s destination address is still useable
o Only works for single (or small number)
source
Source Remotely Triggered Black
Hole (S/RTBH)
DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
2015 © Terabit Security, All rights reserved
WHY BGP FLOWSPEC
 FlowSpec Leverages the BGP Control-plane to simplify the distribution
of ACL's, greatly improving operations.
• Inject new filter/firewall rules to all routers at the same time
without changing router config
• Reuse existing BGP operational knowledge and best practices
• Control policy propagation via BGP communities
 Improve response time to mitigate DDOS attacks
 Same Automation as RTBH
 Route validation is performed for eBGP sessions.
RFC5575
BGP Flowspec
2015 © Terabit Security, All rights reserved
BGP FLOWSPEC SPECIFICATION
Flowspec is very useful feature against today’s
DDOS.
Rule was too long, so forwarding router could not
apply filter as the result not only DDOS but also
normal traffic down.
This is defined in RFC 5575 . Specific information
about the flow can now be distributed using a BGP
NLRI.
AFI/SAFI = 1/133: Unicast Traffic Filtering
Applications
AFI/SAFI = 1/134 : VPN traffic filtering applications.
BGP Flow Specification can include the
following information
Type 1 - Destination Prefix
Type 2 - Source Prefix
Type 3 - IP Protocol
Type 4 - Source or Dest. Port
Type 5 - Destination Port
Type 6 - Source Port
Type 7 - ICMP Type
Type 8 - ICMP Code
Type 9 - TCP flags
Type 10 - Packet length
Type 11 - DSCP
Type 12 - Fragment Encodins
Actions are defined using BGP
Extended Communities
0x8006 - traffic-rate (set to 0 to drop all traffic)
0x8007 - traffic-action (sampling)
0x8008 - redirect to VRF (route target
0x8009 - traffic-marking (DSCP value)
2015 © Terabit Security, All rights reserved
BGP FLOWSPEC VENDOR SUPPORT
Supported by router vendors
SR OS 9.0R1 JUNOS 7.3 ASR and CRS
Supported by DDoS protection vendors
Peakflow SP 3.5 DDoS Secure 5.14.2-0 Defense Pro
since
2015 © Terabit Security, All rights reserved
CONTACT US
Sales Office
Rocklin CA, USA
Development Office
Kiev, Ukraine
https://terabitsecurity.com/
Sales
+1 650 460 14 86
sales@terabitsecurity.com
Terabit Security LLC
Rocklin CA, USA
Support
Support Center
http://support.terabitsecurity.com/
support@terabitsecurity.com
KEEP
CALM
AND
ENJOY
WORK
Request
a Demo
2015 © Terabit Security, All rights reserved
REQUEST A DEMO
Request
A Demo

More Related Content

What's hot

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
Ziv Ichilov
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
Cci Welcome
Cci WelcomeCci Welcome
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
Marie-Agnès PONS
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PROIDEA
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
Imperva
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
Imperva Incapsula
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
F5 Networks
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
Bangladesh Network Operators Group
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
Peter Silva
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-en
dborsan
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Media Perspectives
 
F5 DNS Solution for CSPs
F5 DNS Solution for CSPsF5 DNS Solution for CSPs
F5 DNS Solution for CSPs
F5 Networks
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
DSorensenCPR
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
Indonesia Network Operators Group
 

What's hot (20)

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Cci Welcome
Cci WelcomeCci Welcome
Cci Welcome
 
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerability
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
F5's Dynamic DNS Services
F5's Dynamic DNS ServicesF5's Dynamic DNS Services
F5's Dynamic DNS Services
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-en
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
F5 DNS Solution for CSPs
F5 DNS Solution for CSPsF5 DNS Solution for CSPs
F5 DNS Solution for CSPs
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
 

Viewers also liked

Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Pavel Odintsov
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
Pavel Odintsov
 
03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
Pavel Odintsov
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Pavel Odintsov
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
Pavel Odintsov
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
Pavel Odintsov
 

Viewers also liked (6)

Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 

Similar to DDoS Protection System DPS

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
Atanas Gergiminov
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PROIDEA
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
Cloudflare
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERJody Spoor
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
Netpluz Asia Pte Ltd
 
ServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - PortfolioServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - Portfolio
ServerAdminz | Server Management Company
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
Corero Network Security
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecurityTzoori Tamam
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
Cloudflare
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
Corero Network Security
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
Shain Singh
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
PLUMgrid
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...
National Retail Federation
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 

Similar to DDoS Protection System DPS (20)

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Blank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTERBlank - Competitive Analysis - MASTER
Blank - Competitive Analysis - MASTER
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
ServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - PortfolioServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - Portfolio
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
 
Spider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric SecuritySpider & F5 Round Table - Application Centric Security
Spider & F5 Round Table - Application Centric Security
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

DDoS Protection System DPS

  • 1. DDoS Protection Solution #Terabit Security LLC, 2016 2015 © Terabit Security - All rights reserved
  • 2. 2015 © Terabit Security, All rights reserved AGENDA About DDoS Terabit Security DPS Technical Specialty Contact Us Request a Demo
  • 3. About DDoS 2015 © Terabit Security - All rights reserved
  • 4. 2015 © Terabit Security, All rights reserved ABOUT DDoS
  • 5. 2015 © Terabit Security, All rights reserved SOME FIGURES ABOUT DDoS
  • 6. 2015 © Terabit Security, All rights reserved IMPACT OF DDoS ATTACKS ON YOUR BUSINESS Theft Attacks are becoming more advanced and now include stolen funds, customer data, and intellectual property Productivity loss When critical network system are shut down, your workforce’s productivity comes to a halt Revenue loss Downtime affects your bottom-line. The average costs of downtime is $5,600/minute, or over $300K/hour Reputation Damage Your band suffers if customers can't access your site or became casualties of data breach
  • 7. Even with a large staff of IT professionals it is almost impossible for companies to handle a serious DDoS attack and recover their services on their own Kaspersky Lab E.Vigovsky, head of DDoS protection 2015 © Terabit Security, All rights reserved PROFESSIONALS SAYS ABOUT DDoS Hackers' improving and evolving techniques are especially obvious when it comes to distributed-denial- of-service attacks. DDos is on a trend that is only going to continue Businesses are facing a number of threats in today's economy. When a DDoS attack or DNS failure hits a website or network, companies are losing significant revenue and employee productivity, and are likely seeing decreasing customer satisfaction and loyalty Arbor Networks Matt Moynahan, president Verisign Ben Petro, senior VC
  • 8. Terabit Security DPS 2015 © Terabit Security - All rights reserved
  • 9. 2015 © Terabit Security, All rights reserved TERABIT SECURITY DPS Terabit DPS is solution for the detection of DDoS attacks and their subsequent treatment. Terabit DPS will help to ensure maximum availability of your network and eliminate any disruptions caused by DoS / DDoS attacks
  • 10. 2015 © Terabit Security, All rights reserved WHY DPS Fast Deployment Disparately fast deployment of DDoS protection system – 10 minutes to start Clustering Clustering option for performance and redundancy. Sflow capture – up to 10Tbps (1Tbps per server), traffic mirroring – up to 6.4Tbps (40Gbps per server) Premium Support All support inquiries are answered by experienced engineers. Terabit DPS Proffesional Support with SLA 24×5, 24×7, 24×365 Advanced WEB GUI Web application offers single-point DPS management, network monitoring and reporting of data received from Collector, Explorer and Filters deployed within the network Affordable DDoS Protection The most cost-effective on-premise DDoS mitigation solution on the market! Annual subscriptions include free support and upgrades. Traffic Visualization Tool Visualization of traffic Upstream / Donwstream in bps and pps for whole network or dedicated host Short response time Immediate detection of DoS/DDoS attack in 1-2 seconds Low hardware requirements Up to 10GE with 12 Mpps on E5-1650V3 with Intel NIC 82599 10GE
  • 11. Primary uplink Customers Border router Access switch Backup uplink DPS Server BGP, BGP Flowspec NetFlow/IPFIX sFlow, Port mirror 2015 © Terabit Security, All rights reserved HOW DPS WORKS Supported border routers Extreme X460/X670 Juniper EX, MX series Cisco ASR-series
  • 12. 2015 © Terabit Security, All rights reserved HOW DPS WORKS Traffic Capturing NetFlow v5, v9 IPFIX sFlow v4 (dev branch only), v5 Port mirror/SPAN capture with PF_RING (with ZC/DNA mode), SnabbSwitch, NETMAP and PCAP DDoS Mitigation Complete BGP Flowspec support, RFC 5575 Can process incoming and outgoing traffic Can trigger block script if certain IP loads network with a large amount of packets/bytes/flows per second Thresholds could be configured in per subnet basis with hostgroups feature Could announce blocked IPs to BGP router with ExaBGP GoBGP integration for unicast IPv4 announces
  • 13. 2015 © Terabit Security, All rights reserved OUR SOLUTIONS DPS SOFTWARE APPLIENCE DPS VIRTUAL APPLIENCE DPS HARDWARE APPLIENCE GET FULL FUNCTIONALITY OF DPS Install DPS on your own server Protection up to 400Gbps Most popular OS supported GET SAFETY WITHIN 15 MINUTES Restore image to your hypervisor Protection up to 400Gbps Most popular hypervisors supported GET ENTERPRISE LEVEL SOLUTION Guaranteed SLA Protection up to 6.4Tbps Advanced support included
  • 14. 2015 © Terabit Security, All rights reserved PROFESSIONAL SUPPORT Basic Intermediate Advanced 8×5 support service | 20 cases per year 12×7 support service | unlimited cases per year 24×7 support service | unlimited cases per year Provides an engaged response for small companies with a limited number of cases Provides professional support for non-critical systems based on 12x7 schedule Provides an enterprise level 24x7 support for critical systems with unlimited number of cases
  • 15. 2015 © Terabit Security, All rights reserved OUR CUSTOMERS 1000+ customers 20+ countries Terabits of protected traffic * Includes community version What people say about us
  • 16. Technical Specialty 2015 © Terabit Security - All rights reserved
  • 17. 2015 © Terabit Security, All rights reserved DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC o Еаsy of implementation and uses well understood constructs o Requires high degree of co-ordination between customer and provider o Cumbersome to scale in a large network perimeter o Mis-configuration possible and expansive Destination Remotely Triggered Black Hole (D/RTBH)
  • 18. 2015 © Terabit Security, All rights reserved o RFC 5635 circa 2009 o Requires pre-configuration of discard route and uRPF on all edge routers o Victim`s destination address is still useable o Only works for single (or small number) source Source Remotely Triggered Black Hole (S/RTBH) DDoS MITIGATION HOW IT WORKS W/O FLOWSPEC
  • 19. 2015 © Terabit Security, All rights reserved WHY BGP FLOWSPEC  FlowSpec Leverages the BGP Control-plane to simplify the distribution of ACL's, greatly improving operations. • Inject new filter/firewall rules to all routers at the same time without changing router config • Reuse existing BGP operational knowledge and best practices • Control policy propagation via BGP communities  Improve response time to mitigate DDOS attacks  Same Automation as RTBH  Route validation is performed for eBGP sessions. RFC5575 BGP Flowspec
  • 20. 2015 © Terabit Security, All rights reserved BGP FLOWSPEC SPECIFICATION Flowspec is very useful feature against today’s DDOS. Rule was too long, so forwarding router could not apply filter as the result not only DDOS but also normal traffic down. This is defined in RFC 5575 . Specific information about the flow can now be distributed using a BGP NLRI. AFI/SAFI = 1/133: Unicast Traffic Filtering Applications AFI/SAFI = 1/134 : VPN traffic filtering applications. BGP Flow Specification can include the following information Type 1 - Destination Prefix Type 2 - Source Prefix Type 3 - IP Protocol Type 4 - Source or Dest. Port Type 5 - Destination Port Type 6 - Source Port Type 7 - ICMP Type Type 8 - ICMP Code Type 9 - TCP flags Type 10 - Packet length Type 11 - DSCP Type 12 - Fragment Encodins Actions are defined using BGP Extended Communities 0x8006 - traffic-rate (set to 0 to drop all traffic) 0x8007 - traffic-action (sampling) 0x8008 - redirect to VRF (route target 0x8009 - traffic-marking (DSCP value)
  • 21. 2015 © Terabit Security, All rights reserved BGP FLOWSPEC VENDOR SUPPORT Supported by router vendors SR OS 9.0R1 JUNOS 7.3 ASR and CRS Supported by DDoS protection vendors Peakflow SP 3.5 DDoS Secure 5.14.2-0 Defense Pro since
  • 22. 2015 © Terabit Security, All rights reserved CONTACT US Sales Office Rocklin CA, USA Development Office Kiev, Ukraine https://terabitsecurity.com/ Sales +1 650 460 14 86 sales@terabitsecurity.com Terabit Security LLC Rocklin CA, USA Support Support Center http://support.terabitsecurity.com/ support@terabitsecurity.com
  • 24. 2015 © Terabit Security, All rights reserved REQUEST A DEMO Request A Demo