SlideShare a Scribd company logo
1 of 17
Download to read offline
Distributed Mitigation Managed Service
against DDoS (DMMS)
www.iptp.net
Better network,
not just a bigger one.
www.iptp.net
CLEAN
PIPE VS
LATENCY1. BANDWIDTH3.
EXPENSES4.REACTION TIME2.
We compare 2 ways of mitigation of DDoS attack:
1. Traditional, known as Clean Pipe or Cleaning Center Solution
2 . Distributed Mitigation Managed Service (DMMS) by IPTP Networks.
The comparison will be based on 4 aspects associated with DDoS Mitigation:
IPTP
DMMS
NetwoRK
Dangers of DDoSwww.iptp.net
600
500
400
300
200
100
0
2009 2010 2011 2012 2013 2014 2015 2016
100 Gbps
60 Gbps
500 Gbps
602 Gbps
Survey of DDoS
attacks size
peak over
the years
Loss in revenue
1%
8%
12%
15%
5%5%
7%
11%
21%
15%
Estimated loss in revenue for
each minute of downtime. *
* — Ponemon Institute© Research Report
$1—10
$10—100
$100—1 000
$1 000—5 000
$5 000—10 000
$10 000—25 000
$25 000—50 000
$50 000—100 000
over $100 000
hard to determine
Average total loss per minute $21, 699
www.iptp.net
Volumetric distributed Denial-of-Service (DDoS) is a special type of denial of
service attack where the malicious traffic is generated from multiple sources
What is volumetric DDoS?
ISP2
ISP3
ISP1
Global
Internet
www.iptp.net
Target
Server
How Clean Pipe solution works?www.iptp.net
ISP2
ISP3
ISP1
Global
Internet
Target
Server
Cleaning
Center
FAKE TARGET
IPTP DMMS Networkwww.iptp.net
ISP2
ISP3
ISP1
Global
Internet
DMMS Network
1.1 Latency
ISP1 ISP2 CLEANING
CENTER
ISP3 TARGET
SERVER
WEB-SITE
VISITOR
+50 ms
www.iptp.net
CLEAN PIPE OR CLEANING CENTER
The route of an IP packet during a volumetric DDoS attack,
when redirected through the Cleaning Center.
+50 ms +50 ms +50 ms +50 ms
1.2 Latency
• IP packets do not go any extra distances. They move from the web-site
visitor to the Target Server and back exclusively via our distributed firewalls.
• All our firewalls are geographically-dispersed across the globe, applying
distributed protection against volumetric DDoS while adding no latency.
www.iptp.net
The route of an IP packet during a volumetric DDoS attack,
when protected by IPTP DMMS Network
IPTP
NETWORKS
IPTP
FIREWALL
TARGET
SERVER
WEB-SITE
VISITOR
IPTP DMMS NETWORK
2.1 Reaction Time
It can take from 30 minutes to 1 hour and even longer for
the mitigation to begin.
www.iptp.net
DDoS
Detect Report
to provider
Establish
a tunnel
CLEAN PIPE OR CLEANING CENTER
2.2 Reaction Time
Reaction time is the time from detection of a DDoS
attack to a counter-reaction against it.
3600sec
up to
sec
≈VS
Cleaning
Center
IPTP DMMS
Network
www.iptp.net
0
2.3 Reaction Timewww.iptp.net
Router IPTP
firewall
Target
server
Web-site
visitor
IPTP global
MPLS network
BOTNET
IPTP DMMS NETWORK
IPTP
Firewall
• The traffic is filtered directly at the border of IPTP DMMS Network.
• No manual set-up.
• No tunnel required
www.iptp.net 3.1 Bandwidth
• Cleaning Center is normally located within one geographical point,
with limited internet capacity.
• When the attack size exceeds Cleaning Centers capacity it results in
channel aggregation as the ports cease to withstand the traffic load.
CLEAN PIPE OR CLEANING CENTER
ISP1
ISP2
ISP3
Cleaning
Center
Target Server
ISP4
IPTP DMMS NETWORK
www.iptp.net 3.2 Bandwidth
• Network capacity of over 30 Tb/s allows to withstand heavy-bandwidth
DDoS attacks, without the risk of service degradation.
• Distribution of traffic among multiple points in our network - no combined
volume of traffic on one network node.
OVER
150010 Gbps
ports
total
capacity
30Tbps
DATA
CENTERS IN
22countries
• When additional bandwidth is required, the ISP will charge the DDoS
Mitigation Service Provider, increasing the mitigation costs.
www.iptp.net
CLEAN PIPE OR CLEANING CENTER
4.1 Expenses
ISP1
ISP2
ISP3
ISP4
$
$
Bill for bandwidth
Bill for traffic
Cleaning
Center
Target Server
4.2 Expenseswww.iptp.net
IPTP DMMS NETWORK
• Can mitigate bandwidth-heavy DDoS attacks while
applying no additional charges for the traffic.
• Advanced firewalls can handle multi-gigabits of traffic and filter any
types of floods (ICMP, UDP, SYN and others).
Summary
No reaction time.
No added latency
Bandwidth limits higher
by an order of magnitude
No extra charges for
bandwidth overload
No volumetric DDoS
Distributed Mitigation Managed
Service against DDoS by
IPTP Networks is:
www.iptp.net
Geographical
destribution
Advanced
firewalls
Highnetwork
capacity
Zeroreactiontime
Noextra
trafficcharges
No additional
latency
IPTP
DMMS
Network

More Related Content

What's hot

What's hot (20)

12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
Datamining
DataminingDatamining
Datamining
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPT
 
DDoS Attack and Mitigation
DDoS Attack and MitigationDDoS Attack and Mitigation
DDoS Attack and Mitigation
 
Ping
PingPing
Ping
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 

Similar to DMMS presentation29

DMMS presentation25
DMMS presentation25DMMS presentation25
DMMS presentation25
Yuri Alimov
 

Similar to DMMS presentation29 (20)

DMMS presentation25
DMMS presentation25DMMS presentation25
DMMS presentation25
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security Enforcement
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
9534715
95347159534715
9534715
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
Corsa Giga Filter
Corsa Giga FilterCorsa Giga Filter
Corsa Giga Filter
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 

DMMS presentation29

  • 1. Distributed Mitigation Managed Service against DDoS (DMMS) www.iptp.net Better network, not just a bigger one.
  • 2. www.iptp.net CLEAN PIPE VS LATENCY1. BANDWIDTH3. EXPENSES4.REACTION TIME2. We compare 2 ways of mitigation of DDoS attack: 1. Traditional, known as Clean Pipe or Cleaning Center Solution 2 . Distributed Mitigation Managed Service (DMMS) by IPTP Networks. The comparison will be based on 4 aspects associated with DDoS Mitigation: IPTP DMMS NetwoRK
  • 3. Dangers of DDoSwww.iptp.net 600 500 400 300 200 100 0 2009 2010 2011 2012 2013 2014 2015 2016 100 Gbps 60 Gbps 500 Gbps 602 Gbps Survey of DDoS attacks size peak over the years
  • 4. Loss in revenue 1% 8% 12% 15% 5%5% 7% 11% 21% 15% Estimated loss in revenue for each minute of downtime. * * — Ponemon Institute© Research Report $1—10 $10—100 $100—1 000 $1 000—5 000 $5 000—10 000 $10 000—25 000 $25 000—50 000 $50 000—100 000 over $100 000 hard to determine Average total loss per minute $21, 699 www.iptp.net
  • 5. Volumetric distributed Denial-of-Service (DDoS) is a special type of denial of service attack where the malicious traffic is generated from multiple sources What is volumetric DDoS? ISP2 ISP3 ISP1 Global Internet www.iptp.net Target Server
  • 6. How Clean Pipe solution works?www.iptp.net ISP2 ISP3 ISP1 Global Internet Target Server Cleaning Center FAKE TARGET
  • 8. 1.1 Latency ISP1 ISP2 CLEANING CENTER ISP3 TARGET SERVER WEB-SITE VISITOR +50 ms www.iptp.net CLEAN PIPE OR CLEANING CENTER The route of an IP packet during a volumetric DDoS attack, when redirected through the Cleaning Center. +50 ms +50 ms +50 ms +50 ms
  • 9. 1.2 Latency • IP packets do not go any extra distances. They move from the web-site visitor to the Target Server and back exclusively via our distributed firewalls. • All our firewalls are geographically-dispersed across the globe, applying distributed protection against volumetric DDoS while adding no latency. www.iptp.net The route of an IP packet during a volumetric DDoS attack, when protected by IPTP DMMS Network IPTP NETWORKS IPTP FIREWALL TARGET SERVER WEB-SITE VISITOR IPTP DMMS NETWORK
  • 10. 2.1 Reaction Time It can take from 30 minutes to 1 hour and even longer for the mitigation to begin. www.iptp.net DDoS Detect Report to provider Establish a tunnel CLEAN PIPE OR CLEANING CENTER
  • 11. 2.2 Reaction Time Reaction time is the time from detection of a DDoS attack to a counter-reaction against it. 3600sec up to sec ≈VS Cleaning Center IPTP DMMS Network www.iptp.net 0
  • 12. 2.3 Reaction Timewww.iptp.net Router IPTP firewall Target server Web-site visitor IPTP global MPLS network BOTNET IPTP DMMS NETWORK IPTP Firewall • The traffic is filtered directly at the border of IPTP DMMS Network. • No manual set-up. • No tunnel required
  • 13. www.iptp.net 3.1 Bandwidth • Cleaning Center is normally located within one geographical point, with limited internet capacity. • When the attack size exceeds Cleaning Centers capacity it results in channel aggregation as the ports cease to withstand the traffic load. CLEAN PIPE OR CLEANING CENTER ISP1 ISP2 ISP3 Cleaning Center Target Server ISP4
  • 14. IPTP DMMS NETWORK www.iptp.net 3.2 Bandwidth • Network capacity of over 30 Tb/s allows to withstand heavy-bandwidth DDoS attacks, without the risk of service degradation. • Distribution of traffic among multiple points in our network - no combined volume of traffic on one network node. OVER 150010 Gbps ports total capacity 30Tbps DATA CENTERS IN 22countries
  • 15. • When additional bandwidth is required, the ISP will charge the DDoS Mitigation Service Provider, increasing the mitigation costs. www.iptp.net CLEAN PIPE OR CLEANING CENTER 4.1 Expenses ISP1 ISP2 ISP3 ISP4 $ $ Bill for bandwidth Bill for traffic Cleaning Center Target Server
  • 16. 4.2 Expenseswww.iptp.net IPTP DMMS NETWORK • Can mitigate bandwidth-heavy DDoS attacks while applying no additional charges for the traffic. • Advanced firewalls can handle multi-gigabits of traffic and filter any types of floods (ICMP, UDP, SYN and others).
  • 17. Summary No reaction time. No added latency Bandwidth limits higher by an order of magnitude No extra charges for bandwidth overload No volumetric DDoS Distributed Mitigation Managed Service against DDoS by IPTP Networks is: www.iptp.net Geographical destribution Advanced firewalls Highnetwork capacity Zeroreactiontime Noextra trafficcharges No additional latency IPTP DMMS Network