SlideShare a Scribd company logo
1 of 62
Download to read offline
www.huawei.com
HUAWEI TECHNOLOGIES CO., LTD.
Pawel Wachelka
IP Product Manager
Huawei Enterprise Business Group, CEE & Nordic Region
Email: Pawel.Wachelka@huawei.com
Network protection against DoS/DDoS attacks
HUAWEI TECHNOLOGIES CO., LTD. Page 2
Contents
Threats of DDoS Attacks1
Huawei Anti-DDoS Solution
2
3
4
Defense Principle
Products and Deployments
HUAWEI TECHNOLOGIES CO., LTD. Page 3
Severe Losses to Customers
IDC
Trading sites
Enterprise
customers
Devouring bandwidth
Compromising services
Expenses in capacity expansion
Financial losses: $30,000,000 in the IDC industry
Loss of reputation
Src: http://www.securelist.com
HUAWEI TECHNOLOGIES CO., LTD. Page 4
Evolving DDoS Attacks — Application-Layer Attacks,
Rendering Conventional Flow Devices Ineffective
• January 2012
Various Polish Government
Web sites were paralyzed by
DDoS attacks.
MoneyBookerID: Cyxymu Egypt MOI GOV
• October 2010
The official Web site of
Moneybooker was paralyzed
by DDoS attacks for a whole
morning.
• June 2009
Many social networking Web
sites were paralyzed by DDoS
attacks and were
unresponsive to legitimate
users.
• January 2011
DDoS (application-layer attacks
such as HTTP, TCP, and
connection floods) attacks to
Egypt.
HUAWEI TECHNOLOGIES CO., LTD. Page 5
Evolving DDoS Attacks — Larger Scale, 100+ Gbit/s
- Statistics about the attacks on the backbone network of Telco A the
attack traffic on a single IP E1000E-D exceeds 10 Gbit/s.
- The longest attack recorded in the second half of the 2011 year
targeted a travel company and lasted for 80 days, 19 hours, 13
minutes and 5 seconds, and the average duration of DDOS attacks
was 9 hours and 29 minutes.
In the last year, huge attacks have been
of more than 120 gigabits per second, If
you are on the receiving end of that
much punch. It's not a pleasant place to
be.
— Andy Ellis, CSO of Akamai
HUAWEI TECHNOLOGIES CO., LTD. Page 6
Contents
Threats of DDoS Attacks1
Huawei Anti-DDoS Solution
2
3
4
Defense Principle
Products and Deployments
HUAWEI TECHNOLOGIES CO., LTD. Page 7
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 8
• Conventional firewalls can defend against common DDoS or DoS attacks, but will
be the first victim in more complicated and severe DDoS attacks.
• IPS identifies and defends against intrusion behaviors based on the signature
database; however, DDoS or DoS attacks are launched through legitimate data
packets, which do not meet the behavior features of intrusion.
• Based on NetFlow traffic sampling and analysis, conventional anti-DDoS or anti-
DoS devices can defend against common flood attacks but cannot cope with light
traffic and application-layer attacks. Moreover, conventional anti-DDoS or anti-DoS
devices are slow in detecting and traffic diversion.
• Conventional anti-DDoS devices cannot cope with evolving DDoS attacks and
cannot meet the requirements of customers.
Conventional Security Devices Are Hopeless and
Customers Need New Solutions
HUAWEI TECHNOLOGIES CO., LTD. Page 9
Defending Against DDoS Attacks on the Upstream Network
Huawei anti-DDoS solution should relieve the congestion of carriers' networks first. It cleans the heavy
traffic of bandwidth flood attacks .
HUAWEI TECHNOLOGIES CO., LTD. Page 10
Refined Defense for VIPs' Services — Defense at the Egress of
the Downstream Network
The dedicated cleaning device is deployed at the egress of the access network to deliver refined defense
for application servers. It mainly targets at application layer attacks and light traffic attacks.
HTTP service
HTTPS service
DNS service
Mail service
DPI-based
cleaning center
FW
HUAWEI TECHNOLOGIES CO., LTD. Page 11
Defense Filters
Defense based on
Interface
Defense based on
destination IP range
Defense based on
destination IP
Defense based on
source IP
syn flood
syn-ack flood
ack flood
fin flood
rst flood
tcp fragment flood
tcp abnormal flood
http flood
dns request flood
dns reply flood
Icmp flood
syn flood
syn-ack flood
ack flood
fin flood
rst flood
tcp fragment flood
dns request flood
dns reply flood
syn flood
syn-ack flood
ack flood
fin flood
rst flood
IP fragment flood
tcp abnormal flood
http flood
CC
https flood
dns request flood
dns reply flood
DNS Amplification Attacks
DNS cache-poisoning attack
http hijacking
udp flood
Icmp flood
SSL-DoS
SSL-DDoS
Defense based on
services
syn flood
syn-ack flood
ack flood
fin flood
rst flood
IP fragment flood
tcp abnormal flood
http flood
CC
https flood
dns request flood
dns reply flood
DNS Amplification Attacks
DNS cache poisoning attack
http hijacking
udp flood
Icmp flood
SSL-DoS
SSL-DDoS
syn flood
syn-ack flood
ack flood
fin flood
rst flood
tcp fragment flood
tcp abnormal flood
DNS flood
Second FilterFirst Filter Third Filter
1. Defends against 19% attack traffic after source authentication
is performed.
2. Uses the IP address of the protected network as the attack
source, resulting in reflection packet leak.
HUAWEI TECHNOLOGIES CO., LTD. Page 12
Detecting Technology: Dynamic Traffic Baseline
Currently, most anti-DDoS systems employ the single-traffic threshold for identifying attacks. The threshold should be
manually configured by users according to the actual traffic on the live network. However, users experience trouble in
configuring such a threshold. Under this scenario, Huawei DPI system offers the dynamic traffic baseline, through
which learnt dynamic thresholds replace static ones. In so doing, detecting accuracy is improved.
Static traffic baseline
Dynamic traffic baseline
Traffic
Time
HUAWEI TECHNOLOGIES CO., LTD. Page 13
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 14
Spoofed Source Attacks: SYN Flood
Attack Character:
1. Spoofed source attack;
2. Defense can fail when those
attack packets' source IP exist;
3. The discontinuous attack can
evade the detecting.
Defense Principle: First-packet-drop can defend and report spoofing_packets log.
HUAWEI TECHNOLOGIES CO., LTD. Page 15
Defense against SYN Flood based on
Application Layer-based Source Authentication
Client: RST
Client: SYN
SYN Flood Traffic
WEB Server
WEB Server
User
Attacker: SYN
Bot
Following Request will pass
Cleaning Center : SYN+ACK with error ack sequence
Cleaning Center : SYN+ACK with error ack sequence
Anti-DDoS Device
Anti-DDoS Device
HUAWEI TECHNOLOGIES CO., LTD. Page 16
Principle of Defense against TCP Flood
Whitelist
Checking
First-
packet-
drop
Source
Authentic
ation
Checking
Source IP
1、Reputation IP list;
2、White-list by source
authentication;
Feature-
based
filtering
1、Filtering the
malformed packets;
2、Filtering packets
by fingerprint;
Defense may fail when
those attack packets'
source IP exist.
Defending this attack by
checking the source IP’s
TCP packets ratio.
Session-
checking
Drop packets without
valid session.
1. Spoofed source attack packets must been dropped before building session;
2. Reputation is used to avoid affection from defense.
Traffic
Shaping
If the traffic is still heavy
and exceeds the actual
bandwidth of users
after previous steps,
traffic shaping is used to
ensure available
network bandwidths.
First-packet-drop
can mitigate up-link
stress caused by
source
authentication by
retransmission of
TCP protocol.
Defense against
spoofed source
attacks. Those
authenticated sources
are allowed to go into
the following process.
HUAWEI TECHNOLOGIES CO., LTD. Page 17
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 18
Spoofed Source Attacks: UDP Flood without fingerprint
Attack Character:
1. The source IP address and source port change.
2. The packet payload changes.
3. The packet length also changes.
Defense Principle:
1. If network service-based defense, especially, access-layer defense is employed, packets not complying with
the service model are directly discarded. As shown in the figure, attack packets are upon ports 21 to 24 and are
directly discarded because no such services exist. If static filtering is used to discard these attack packets,
the system displays "User_defined_filter".
2. If attacks are upon service ports, TCP authentication must be performed over UDP data transmission such as
online games. In this case, TCP association can be used to defend against UDP flood attacks. The device
displays "Spoofing_packets" for packet loss.
3. If traffic limiting is applied, the device displays "Overflow_packets" for packet loss.
HUAWEI TECHNOLOGIES CO., LTD. Page 19
Spoofed Source Attacks: UDP Flood with fingerprint
Attack Character:
1. The source IP address and source port change.
2. The packet length also changes.
3. Packet payloads can be either the same such as Aladdin attacks or different in
the case that payload bytes for the same packet are identical.
Defense Principle:
1. Such attacks can be filtered out through dynamic fingerprint learning. In this case,
the device displays "Dynamic_filter" for packet loss.
2. If the locations of attack features vary randomly, you can use refined packet filtering
in the case of manually extracting the attack feature of each attack. In this case, the
device displays "User_defined_filter" for packet loss.
HUAWEI TECHNOLOGIES CO., LTD. Page 20
Protected network
Defense against UDP Flood with Fingerprints
based on Dynamic Fingerprint Learning
Attacker
Controller
Controller
Agent
Controller
Agent
Agent
Agent
Agent
Agent
Zombie army
Victim
•Ha, the packets you sent
have the same features. So I
will not let you go through.
•
Cleaning center
HUAWEI TECHNOLOGIES CO., LTD. Page 21
Principle of Defense against UDP Flood
This method only for
those UDP services
needing TCP
authentication first.
Those sources
authenticated are
allowed to go into the
following process.
Behavior
Analysis
Dynamic Fingerprint
Learning
Filtering packets by
fingerprint.
1. UDP-based data transmission must pass TCP authentication. Therefore, TCP association is recommeded for defending against UDP flood attacks.
2. On the live network, UDP flood attacks are mainly at four layers, because key UDP data is transmitted in encryption mode. Therefore, adding refined packet-
filtering rules meets the requirements on UDP flood cleaning, except for manual intervention upon attacks. The change of each attack packet brings
challenges. To resolve such a problem, use packet features as filtering ones and set the action to whilisting the source IP address if matched.
3. Many attacks bear features on the live netowrk. In this case, static filtering or dynamic fingerprint learning is recommended.
Whitelist
Checking
First-packet-
drop
Source
Authenticati
on
Feature-
based
filtering
Traffic Shaping
If the traffic is still heavy and
exceeds the actual bandwidth
of users after previous steps,
traffic shaping is used to ensure
available network bandwidths.
Drop the first packet from
the source IP based on
retransmission of UDP
application.
HUAWEI TECHNOLOGIES CO., LTD. Page 22
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 23
Spoofed Source Attacks: ICMP Flood
Attack Character: Spoofing source attack.
Defense Principle: First-packet-drop can defend and report spoofing_packets log.
HUAWEI TECHNOLOGIES CO., LTD. Page 24
Principle of Defense against ICMP Flood
First-packet-drop Traffic Shaping
If service traffic exists
between the client and the
protected network, ICMP
packets between them are
allowed through; otherwise,
ICMP packets enter the first
packet discarding procedure.
Feature-
based
Filtering
Whitelist
Checking
If the traffic is still heavy and
exceeds the actual
bandwidth of users after
previous steps, traffic
shaping is used to ensure
available network
bandwidths.
Drop the first packet from
the source IP.
Filtering packets by
fingerprint.
HUAWEI TECHNOLOGIES CO., LTD. Page 25
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 28
DNS Query and Reply Flood Attacks
SP DNS
1. what’s the IP for abc.google.com?
Root Server
2. what’s the IP for abc.google.com?
Attacker
DNS Query Flood
3. The IP is XXX.XXX.XXX for news.google.com
DNS Reply Flood
Attacker
HUAWEI TECHNOLOGIES CO., LTD. Page 29
Defense against DNS Query Flood for DNS Cache Server
based on Application Layer-based Source Authentication
DNS Query : www.google.com (TCP)
DNS Reply : 200.72.x.x (TCP)
DNS Query : www.google.com (UDP)
DNS Reply : re-send with tcp please
DNS Query Traffic
DNS Cache Server
DNS Cache Server
DNS Query : www.google.com (UDP)
DNS Reply : 200.72.x.x (UDP)
User
Bot
DNS Query : www.google.com (UDP)
DNS Reply : re-send with tcp please
Following Query Request will pass
Anti-DDoS Device
Anti-DDoS Device
HUAWEI TECHNOLOGIES CO., LTD. Page 30
Defense against DNS Query Flood for DNS Authoritative Server based on Application
Layer-based Source Authentication
DNS Query : security.google.com
DNS Reply : re-query for news.google.com, please
DNS Query : news.google.com
DNS Reply : re-query for security.google.com, please
DNS Query Traffic
DNS Authoritative
Server
DNS Authoritative
Server
DNS Reply : 200.72.x.x
DNS cache Server
Bot
DNS Query : abc.google.com
DNS Reply : re-query for security.google.com, please
Following Query Request will pass
Anti-DDoS
Device
Anti-DDoS
Device
DNS Query : news.google.com
HUAWEI TECHNOLOGIES CO., LTD. Page 31
Malformed DNS Domain Attack
Attack Character: uses the forged source or real IP address on the live network as the source IP address to send massive requests for non-existent domain
names. This leads to the server's continuous sending of DNS requests and exerts severe impacts.
Defense Principle: uses rate limiting based on domain name matching to filter out attacks. The device displays "User_defined_filter" for packet loss.
HUAWEI TECHNOLOGIES CO., LTD. Page 33
DNS Cache Poisoning — Malformed_connections
SP DNS
1. what’s the IP aaa.google.com?
(huge number of queries)
google.com Server
3. what’s the IP for aaa.google.com?
2. The IP of aaa.google.com is YYY.YYY.YYY
(huge number of fake replies)
4. Cache is poisoned
Queries 150 200 250 300 350 400 500 550 650 750
Chances 16% 26% 38% 50% 61% 70% 85% 90% 96% 99%
Chances of guessing the Query ID
Attacker
Attack Character: uses the DNS session to send massive spoofed packets to match the session at possibilities within the short period. DNS cache poisoning attacks are forged
source ones. This mode avoids the weakness of TCP three-way handshake.
HUAWEI TECHNOLOGIES CO., LTD. Page 34
Defense against DNS Cache Poisoning
based on Session-check
DNS Reply : 200.72.x.x
User
Bot
More DNS Reply : 200.72.x.x
DNS Query : abc.baidu.com
Check the Session Table, if no hit, delete the session
immediately
Check the Session Table, if hit, forward
Anti-DDoS Device DNS Cache Server
HUAWEI TECHNOLOGIES CO., LTD. Page 35
Principle of Defense against DNS Flood
First-
packet-
drop
Source
Authenticat
ing
Source IP
Rate
Limiting
1、Reputation IP list;
2、White-list by source
authentication;
First-packet-drop
can mitigate up-link
stress caused by
source
authentication by
retransmission of
DNS protocol.
Defense against
spoofed source
attacks. Those
authenticated sources
are allowed to go into
the following process.
Malformed
packet Filtering
Filtering malformed
DNS packets.
Limiting the DNS
request rate on
source IP.
Malformed
Domain Filtering
Defense against
malformed DNS
request flood from
real IP.
Session-
Checking
Defense against DNS
cache poisoning and
DNS reflection attack
based on session-
check
1. Spoofed source attack packets must been dropped before building session;
2. Reputation is used to avoid affection from defense.
Principle of Defense against
DNS query flood/reply flood
Whitelist
Checking
HUAWEI TECHNOLOGIES CO., LTD. Page 36
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 37
TCP Retransmission Attack—Client_attacks
Attack Character:
1、 Real source of attack, attack the client and server to establish a connection, a limited number of attacks on
the client to send fewer messages, and as far as possible to hide the attack side; this is a common feature of
Client_attacks;
2、 The same session, the attacker client kept send retransmission request message, the server that the message
transmission process have discarded, non-stop to the client retransmission "discarded" message;
3、 The client IP is 118.250.201.68, the server IP is 222.240.187.37, packet capture analysis can be seen a small
number of packets of the attack sent by the client, and the packet length, and the server responds with a
messagerelatively large number of packets generally are larger, thus giving rise to attack the client to use a small
downlink bandwidth in exchange for large upstream bandwidth overhead, leading to serious uplink congestion.
Retransmission
Packets
Retransmission
request
Retransmi-
ssion
packets
HUAWEI TECHNOLOGIES CO., LTD. Page 38
Defense against TCP Retransmission Attack
based on Session-checking
get search1.google.com
response
HTTP get packets
WEB Server
session is OK, go on
User
Bot
get search1.google.com
response
Anti-DDoS Device
WEB Server
Anti-DDoS Device
get search2.google.com
response
retransmit, please
reply the lose packets
retransmit, please
reply the lose packets
… …
Find out those source IPs that it’s session is illegal and put it
to blacklist
Response packets from Server
HUAWEI TECHNOLOGIES CO., LTD. Page 39
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 40
SSL-DoS Attack on SSL Server
HUAWEI TECHNOLOGIES CO., LTD. Page 41
Defense against SSL-DDoS
 Attack Character
 Instead it exhausts the server resources from a single host requiring only a single TCP/IP socket. This
attack is a Distributed Denial of Service (DDOS) by botnet.
 A single server can perform between 150-300 handshakes per second. While a single client can request
up to 1000 handshakes per second.
 If the botnet is consist of 1,000 hosts, it’s attack result is obvious. And because a single host’s
connections is few, this attack can evade detecting from network security devices.
 Defense Principle
 A legal host sets up a ssl session to transmit data, but a illegal host only set up session to exhaust SSL
handshakes. Check session and put those source IPs whose session is illegal to blacklist.
 Limit the connection from IPs which doesn’t exist in reputation list.
HUAWEI TECHNOLOGIES CO., LTD. Page 42
2 Defense Principle
Defense Principle of DNS Flood
Defense Principle of HTTPS Flood
Defense Principle of HTTP Flood
Anti-DDoS MSS
Defense Principle of TCP Flood
Defense Principle of UDP Flood
Defense Principle of ICMP Flood
Basic Defense Principle
Defense Principle of TCP Connection Flood
HUAWEI TECHNOLOGIES CO., LTD. Page 43
HTTP Flood—Client_attacks
Attack Character: Attack Character: This attack is a kind of http flood by botnet using a lot of open proxies. Sessions from single proxy are few to avoid detecting from
security devices. The attack result is obvious when the attacked URI exhausts lots of CPU capability. “P57” directory is the attack aim.
Defense Principle: Redirection check code is used to defend against CC attack. Attacks are launched by botnet. As a result, there is no response to authentication
requests and access traffic fails to be transparently transmitted to the server. The cleaning device reports client_attacks log.
HUAWEI TECHNOLOGIES CO., LTD. Page 44
CC Attack—HTTP Flood by Botnet using Proxy
Attack Character: This attack is a kind of http flood by botnet using a lot of
open proxies. Sessions from single proxy are few to avoid detecting from
security devices. The attack result is obvious when the attacked URI exhausts
lots of CPU capability.
Open
Proxy Attack destination
The target can’t
response now.
Defense Principle: Redirection check code is used to defend against CC attack. Attacks are
launched by botnet. As a result, there is no response to authentication requests and access
traffic fails to be transparently transmitted to the server. The cleaning device reports
client_attacks log.
HUAWEI TECHNOLOGIES CO., LTD. Page 45
Defense against HTTP Flood
based on Application Layer-based Source Authentication
I want to visit: search2.taobao.com
I want to visit: search1.taobao.com
HTTP packets
WEB Server
WEB Server
User
I want to visit: search1.taobao.com
Bot
Following Request will pass
search1.taobao.com do not exist, please visit: search2.taobao.com
search1.taobao.com do not exist, please visit: search2.taobao.com
Anti-DDoS Device
Anti-DDoS Device
search2.taobao.com do not exist, please visit: search1.taobao.com
I want to visit: search2.taobao.com
Please enter the verification code
Please enter verification code to verify, add the white list
HUAWEI TECHNOLOGIES CO., LTD. Page 46
Contents
Threats of DDoS Attacks1
Huawei Anti-DDoS Solution
2
3
4
Defense Principle
Products and Deployments
HUAWEI TECHNOLOGIES CO., LTD. Page 47
Huawei Anti-DDoS Solution
Anti-DDoS
Solution
Detecting
center
Cleaning
center
Internet
Intranet
Botnet
Anti-DDoS solution
Application scenario
Deployed at the
egress of an IDC,
enterprise network, or
server network
to prevent flood and
application-layer
attacks.
Solution objectives
Ensuring efficient
bandwidth usage;
Ensuring service
continuity;
Providing ease of
management.
ATIC
management
center
HUAWEI TECHNOLOGIES CO., LTD. Page 48
Huawei Anti-DDoS Solution
ATIC mgmt.
center
Detecting
center
Cleaning
center
Detecting center
The detecting center
implements the detecting
policies delivered by the
ATIC management center
to identify abnormal traffic
and sends the detecting
results to the ATIC
management center.
NetFlow Box
Detection center
NetFlow
or
 Provides detection at fine-grained, near real-time scale
 Can detect application-layer attacks, but cannot detect
routing information such as AS and next hop
information
 Provides highly accurate detection, in-depth packet
detection, signature matching, and session table
establishment
 Centrally deployed, and difficult to scale
 Off-line deployment has no impact on network devices
 Provides detection at medium-grained time scale and
introduces noticeable delay
 Supports the collection and analysis of septet
information, including routing information, but cannot
detect application-layer attacks
 Provides low accurate detection based on sampling
septet information
 Easy to deploy and scale
 Requires network devices to send NetFlow traffic to
the analysis devices and has some impact on network
devices
Basic and coarse-grained network-wide traffic detectionFine-grained real-time in-depth inspection
HUAWEI TECHNOLOGIES CO., LTD. Page 49
Huawei Anti-DDoS Solution
ATIC mgmt.
centerDetecting center Cleaning center
Cleaning center
The cleaning center receives instructions from the ATIC management center,
delivers traffic diversion policies, and implement traffic cleaning. The cleaning
center provides accurate protection through layered protection procedures
to prevent malformed packet, DoS, and DDoS attacks
with low latency.
Static filtering
Malformed packet
filtering
Special control
packet filtering
Source validity
authentication
Session-based
cleaning
Signature
recognition
Traffic shaping
Whitelist
Blacklist
LAND attack
Fraggle attack
Winnuke
Ping of Death
Tear Drop
Invalid TCP flag attack
Super large ICMP attack
IP Option
ICMP redirect message
ICMP unreachable
message
Tracert
Packets with IP Source
Routing option
Packets with IP
Timestamp option
Packets with IP Record
Route option
TCP Fragment Flood
SYN Flood
SYN-ACK Flood
HTTP Get Flood
HTTP Post Flood
HTTPS Flood
DNS Query Flood
DNS Reply Flood
SIP Flood
TCP Flood
UDP Flood
ICMP Flood
Connection Flood
UDP Flood
UDP Fragment Flood
ICMP Flood
CC
HTTP Get Flood
HTTP Post Flood
Avoid congestion
to the targetSeven-layer filtering against
attacks of all types
HUAWEI TECHNOLOGIES CO., LTD. Page 50
Huawei Anti-DDoS Solution
ATIC mgmt
center
Detecting
center
Cleaning
center
ATIC management center
The ATIC management center is the brain
of the whole solution. It provides
customized detecting and cleaning
policies, controls the detecting and
cleaning devices, and generates attack
reports and cleaning logs for query.
Sampling and analysis
Summary reports
Configuration
management
Reports query
ATIC management server
Collector Collector Collector
Anti-DDoS Device Anti-DDoS Device Anti-DDoS Device
Monitoring Traffic
Management Traffic
Syslog traffic
HUAWEI TECHNOLOGIES CO., LTD. Page 51
Page 51
Page 51
Layer operation mode—layer cleaning
Pipe-line level Anti-DDoS
Provider can deploy netflow detection+ E8000E-X cleaning in MAN or
upper level , this can not only protect link-layer safe for provider but
also give extra MSS
Defense police is default configure and not related to application
level;
report function ;
Charging mode:
•A:charging on defense times, on demand cleaning mode;
•B: charging on month, providing real-time defense;
Shared-link layer Anti-DDoS
Provider deploy E8000E-X in Metro net using static traffic diversion
Customized defense policy based on application,and provide
detailed defense in application level;
Shared cleaning device and cleaning bandwidth,in this
situation, cleaning device share MAN access device;
Report function;
Charging mode: XX$/mode/100 Mbps ,or XX$/ month/
100Mbs ;
Target user : SME(Small and medium enterprises, like NSP、
IDC;
Owned link-layer Anti-DDoS
Provider deploy E1000E-D in customer’s access point of metro net by using in-line
or static traffic diversion mode,This can provide fined application level defense by
customized defense policy;
Providing fined application level defense by customized defense policy ;
Owned cleaning device and cleaning bandwidth,detection and cleaning
device can be deployed in Provider side of customer’s network;
Report function ;
Charging mode : XX$/month ;
Target user : Key accounts,result is that provider take care of the security
issue for Key accounts,for example ,customer sold out their Anti-DDoS
security to provider ,such as bank ;
A Mode
Charging on cleaning times, providing on demand cleaning mode ,
three modes : manual cleaning、auto cleaning、interactive cleaning;
Charging mode:XX$/IP/each cleaning or XX$/100Mbps/ IP/each
cleaning
Target user:SME(Small and medium enterprises)
B Mode
Charge rated fee;
Customized defense policy ,providing auto cleaning;
Charging mode: XX$/month/per IP,or XX$/ month/ 100Mbs;
Target user : Key accounts,like IDC,NSP;
Currently, Turkey telecom,
United Arab Emirates DU
have been the customers
of HUAWEI Anti-DDoS
MSS solution
HUAWEI TECHNOLOGIES CO., LTD. Page 52
Provides Up to 200 Gbit/s Performance
High
performance
High
availability
High detection
rate
Rapid
response
Industry-leading architecture: Built on the network processor (NP), multi-core CPU, and
distributed architecture, breaks the performance bottleneck, and provides online capacity expansion
capability.
High performance: Delivers a maximum of 160 Gbit/s processing speed per chassis, which is an
industry-leading level and can cope with large scale attacks
High capacity: Supports differentiated protection for a maximum of 2000 Zones; provides fine-
grained protection for 10,000 IP AMS1500 resses and common protection for 1,000,000 IP AMS1500 resses
HUAWEI TECHNOLOGIES CO., LTD. Page 53
High
performance
High
availability
High detection
rate
Rapid
response
Delivers 500,000 hours of MTBF and 99.9999% availability with less than 1 minute of down time each year and
less than 0.1 second failover time, ensuring service continuity
 1+1 main processing
engines
 3+1 switching boards
Delivers core-router
level stability and
availability
Dual-MPU
multiple switching
boards
Load balancing
between
service boards
Dual-system
hot backup
Component
redundancy
Cross-board interface
binding
VRP
platform
Service board
Service board
backup
 Intelligent load
balancing
Avoids the impact of
single-board failure
 Multiple HA
implementations
 Provides multiple
paths
Accommodates to
different HA
implementations
 Power
redundancy
 Fan redundancy
 Hot-swappable
parts
Ensures online
insertion and
removal of parts
 Evenly distributes
traffic among links
 Seamlessly failover,
with no impact on data
forwarding
Improves link availability
and increases total
bandwidth
 Modules are
independent of each other
to avoid interference
 Manages 4 million
devices on live networks
Provides stable and
reliable software platform
Delivers the industry's longest MTBF: 500,0000 hours
99.9999% Availability to Ensure Service Continuity
HUAWEI TECHNOLOGIES CO., LTD. Page 54
Full-scale IPv6 attack defense
High
performance
High
availability
High detection
rate
Rapid
response
IPv6 Attack Defense to Secure IPv4-to-IPv6 Transition
Trojan Horses DDoSWorms
IPv6 IPv4
IPv6/IPv4 dual stack, seven-layer defense structure
Static IPv6 filtering
Malformed IPv6 packet filtering
Transport layer IPv6 source validity authentication
Application-layer IPv6 source validity authentication
Session-based IPv6 cleaning
IPv6 behavior analysis
IPv6 traffic shaping
Defends against IPv4 and IPv6 attacks simultaneously
IPv6 attack defense
IPv6
IPv6
IPv4
Backbone network
Branch 1
Branch 2
Representative
office
HQ
IPv6
IPv4/
IPv6
6to4 router/
6rd CE
ISATAP
router
6to4 router/
6rd CE
DS host
6to4 router/
6rd CE
IPv4/IPv6
Internet
IPv6
IPv4
IPv6
IPv4
NodeB RNC SGSN GGSN
NAT64
Initiates massive sessions
to consume NAT64
resources
INTERNET
Threats in IPv4-to-IPv6 Transition Schemes
HUAWEI TECHNOLOGIES CO., LTD. Page 55
High
performance
High
availability
High detection
rate
Rapid
response
Detecting and Cleaning Within Seconds
DPI technology Conventional NetFlow technology
Detecting speed Performs DPI packet by packet, detects
attacks within seconds
Performs flow-based and interface-specific
inspection; detects attacks within minutes or
tens of minutes
Response speed Leverages session and detection
information synchronization; responds to
attacks within seconds
Diverts traffic minutes or tens of minutes
after attacks
HUAWEI TECHNOLOGIES CO., LTD. Page 56
Contents
Threats of DDoS Attacks1
Huawei Anti-DDoS Solution
2
3
4
Defense Principle
Products and Deployments
HUAWEI TECHNOLOGIES CO., LTD. Page 57
Detection and cleaning
Detection and cleaning
In off-line DPI deployment, the DPI
devices analyze the traffic of the
entire network, automatically deliver
traffic diversion policies to the core
routing devices to divert the traffic for
cleaning upon detecting abnormal
traffic, and provide reports on attack
events and cleaning results.
During deployment:
Detecting devices can be deployed
outside of the cleaning devices to
detect all traffic;
Detecting devices can be deployed
inside of the cleaning devices to
detect traffic in smaller scale to
reduce costs.
Customer network
Upstream network
Network edge
Off-line DPI and dynamic traffic diversion and cleaning
Detection center
Cleaning center
Mirrored traffic
ATIC management center
Traffic after cleaning
Traffic before cleaning
Management traffic
Logs on traffic statistics and attacks
Suitable for refined defense on large networks
HUAWEI TECHNOLOGIES CO., LTD. Page 58
Independent Cleaning
Customer network
Upstream network
Network edge
Static traffic diversion and
independent cleaning
Cleaning center
Traffic after cleaning
Management traffic
Logs on traffic statistics and attacks
ATIC management center
Traffic before cleaning
Independent cleaning
Detect specified traffic based on
static rules and dynamically learn
the normal traffic baseline to
prevent abnormal traffic.
Independent cleaning supports
the following two deployment
modes:
1) In-line deployment: All traffic
goes through the cleaning
devices to be cleaned. In-line
deployment inspects traffic in
wider range, but requires high-
performance hardware and is
expensive.
2) Off-line deployment provides
refined protection for specific
customers. Off-line deployment
is cheap to deploy, but inspects
traffic in a smaller range.
Suitable for refined defense on small and
medium-sized networks
HUAWEI TECHNOLOGIES CO., LTD. Page 59
Proportional Sampling and Cleaning
Proportional sampling and
cleaning
In off-line deployment, NetFlow
devices sample traffic for
analysis, automatically deliver
traffic diversion policies to the
core routing devices to divert
traffic to the cleaning center for
cleaning upon detecting
abnormal traffic, and provide
reports on attacks and cleaning
results.
Pros: Low deployment cost
Cons: Slow response, low
detection rate in application-
layer attacks
Customer network
Upstream network
Network edge
Off-line sampling and dynamic
traffic diversion and cleaning
Proportional sampling and detecting center
Cleaning center
NetFlow Box
ATIC management center
Traffic after cleaning
Management traffic
Logs on traffic statistics and attacks
Traffic before cleaning
Proportionally sampled traffic
Suitable for network-wide traffic cleaning
HUAWEI TECHNOLOGIES CO., LTD. Page 60
Load Balancing Cleaning Mode
Client Network
Trust zoneDMZ
Web
Mail
… OA
FirewallFirewall
AMS1550
ATIC management center
In-Line Mode (Load Balancing)
Switch Switch
Upper-level network
Post-cleaning traffic
Pre-cleaning traffic
Management center
Traffic and attack log
HUAWEI TECHNOLOGIES CO., LTD. Page 61
Super-network
Processing Flow of Anti-DDoS Solution
Cleaning Center
Management Center
1 Attack traffic
arrives the
protected network,
so that the
bandwidth is
congestive and the
services is out of
service.
2 Detects the mirrored or optically
split traffic and locates anomalies.
3 Finds out the attacked aim and reports
exception logs to the ATIC management
center
4 Delivers traffic diversion policy to the cleaning center.
5 Diverts the traffic to the zone to
the cleaning center by BGP
announcing host router.
7 Reports the cleaning logs
to the ATIC management
center for collection and
report statistics.
BGP
Detecting Center
Protected Network
6 Injects the cleaned traffic by PBR,
MPLS VPN,MPLS LSP,GRE.
Mirrored/Optically Split Traffic
Management Traffic
Cleaning Logs
Traffic Logs
Capture Packets
Pre-Cleaning Traffic
Post-Cleaning Traffic
---Using Dynamic Traffic Diversion in Off-Line Mode as an Example
HUAWEI TECHNOLOGIES CO., LTD. Page 62
Flexible Deployments to Accommodate to Your Needs
Deployment
Method
Network-wide traffic policing
Link congestion prevention
Customer channel cleaning
Refined defense
Easy to operate
Refined defense
Low-cost deployment
Proportional sampling and cleaning
DPI and cleaning
Pros:
Cost-effective, suitable for backbone
networks and large MANs to prevent
flood attacks.
Cons:
Causes severe delay, requires the
NetFlow sampling; cannot prevent
application-layer attacks and light-
traffic attacks.
Pros and cons
Pros:
Cheap to deploy; capable of detecting and
preventing flood and application-layer attacks in
fine-grained scale and learning traffic model;
rapid in response to attacks and causing small
delay.
Cons:
Static protection, suitable for only small networks.
Pros and cons
Pros:
Effective to detect and prevent flood and
application-layer attacks; capable of learning
traffic model and delivering fine-grained
detection and cleaning; rapid in response to
attacks and causing small delay
Cons:
Expensive.
Pros and cons
Independent Cleaning
HUAWEI TECHNOLOGIES CO., LTD. Page 64
Huawei Anti-DDoS Operation solution components
DDoS Detecting Center DDoS Cleanning Center Management Center
AMS8000E-XAMS1500
AMS8000E-X
AMS1500
AMS1500-D
ATIC/VSM
DetectionDeeppacketdetection
<=5G
<=200G
<=5G
<=200G
Management Center
Including servers and software
HUAWEI TECHNOLOGIES CO., LTD. Page 65
Huawei Anti-DDoS Product
AMS1500-D
( detecting device)
AMS1520-AMS1550
2-5Gbps
(cleaning device)
10G
detecting board
20G
Cleaning board
20G
detecting board
200G
5G
For enterprise customers For IDC/MAN/backbone network
AMS8030 AMS8080 AMS8160
High performance: Provides a maximum of 200 Gbit/s processing
speed per chassis to cope with large scale attacks
High availability: Delivers 500,000 hours of MTBFand 99.9999%
reliability
High detection rate: Provides application-layer attacks and IPv6
attacks
Rapid response: Capable of detecting and cleaning within seconds
to ensure service continuity
10G
Cleaning board
HUAWEI TECHNOLOGIES CO., LTD. Page 66
Zapraszamy do Huawei
Demo Truck
ORAZ NA PREZENTACJE:
 Poniedziałek 14:55 – 16:20
Protokół IETF TRILL – Donald E. Eastlake 3rd
 Wtorek 12:30 – 13:15
DataCenter Interconnect – Sam Aldrin
 Wtorek 14:15 – 14:45
Budowa przełączników modularnych – Piotr Głaska

More Related Content

What's hot

Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksOmer Coskun
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersStephanie Weagle
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS AttacksSymantec
 
internet applications
 internet applications internet applications
internet applicationsSrinivasa Rao
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...ijsptm
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Infradata
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Labfrcarlson
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]RootedCON
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilitiesPrakhar Bansal
 

What's hot (18)

Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
2 phishing
2 phishing2 phishing
2 phishing
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customers
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
internet applications
 internet applications internet applications
internet applications
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
 
TCP Vulnerabilities
TCP VulnerabilitiesTCP Vulnerabilities
TCP Vulnerabilities
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilities
 

Similar to Huawei Anti-DDoS Solution Defends Against Evolving Attacks

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
Why the Edge Isn't an Edge Case.pdf
Why the Edge Isn't an Edge Case.pdfWhy the Edge Isn't an Edge Case.pdf
Why the Edge Isn't an Edge Case.pdfWP Engine
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptxdawitTerefe5
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSSuzanne Aldrich
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival GuideDSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival GuideAndris Soroka
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1DSorensenCPR
 

Similar to Huawei Anti-DDoS Solution Defends Against Evolving Attacks (20)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Why the Edge Isn't an Edge Case.pdf
Why the Edge Isn't an Edge Case.pdfWhy the Edge Isn't an Edge Case.pdf
Why the Edge Isn't an Edge Case.pdf
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
L1803046876
L1803046876L1803046876
L1803046876
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival GuideDSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
 
Defining Cyber Crime
Defining Cyber CrimeDefining Cyber Crime
Defining Cyber Crime
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1
 

Recently uploaded

call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 

Huawei Anti-DDoS Solution Defends Against Evolving Attacks

  • 1. www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. Pawel Wachelka IP Product Manager Huawei Enterprise Business Group, CEE & Nordic Region Email: Pawel.Wachelka@huawei.com Network protection against DoS/DDoS attacks
  • 2. HUAWEI TECHNOLOGIES CO., LTD. Page 2 Contents Threats of DDoS Attacks1 Huawei Anti-DDoS Solution 2 3 4 Defense Principle Products and Deployments
  • 3. HUAWEI TECHNOLOGIES CO., LTD. Page 3 Severe Losses to Customers IDC Trading sites Enterprise customers Devouring bandwidth Compromising services Expenses in capacity expansion Financial losses: $30,000,000 in the IDC industry Loss of reputation Src: http://www.securelist.com
  • 4. HUAWEI TECHNOLOGIES CO., LTD. Page 4 Evolving DDoS Attacks — Application-Layer Attacks, Rendering Conventional Flow Devices Ineffective • January 2012 Various Polish Government Web sites were paralyzed by DDoS attacks. MoneyBookerID: Cyxymu Egypt MOI GOV • October 2010 The official Web site of Moneybooker was paralyzed by DDoS attacks for a whole morning. • June 2009 Many social networking Web sites were paralyzed by DDoS attacks and were unresponsive to legitimate users. • January 2011 DDoS (application-layer attacks such as HTTP, TCP, and connection floods) attacks to Egypt.
  • 5. HUAWEI TECHNOLOGIES CO., LTD. Page 5 Evolving DDoS Attacks — Larger Scale, 100+ Gbit/s - Statistics about the attacks on the backbone network of Telco A the attack traffic on a single IP E1000E-D exceeds 10 Gbit/s. - The longest attack recorded in the second half of the 2011 year targeted a travel company and lasted for 80 days, 19 hours, 13 minutes and 5 seconds, and the average duration of DDOS attacks was 9 hours and 29 minutes. In the last year, huge attacks have been of more than 120 gigabits per second, If you are on the receiving end of that much punch. It's not a pleasant place to be. — Andy Ellis, CSO of Akamai
  • 6. HUAWEI TECHNOLOGIES CO., LTD. Page 6 Contents Threats of DDoS Attacks1 Huawei Anti-DDoS Solution 2 3 4 Defense Principle Products and Deployments
  • 7. HUAWEI TECHNOLOGIES CO., LTD. Page 7 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 8. HUAWEI TECHNOLOGIES CO., LTD. Page 8 • Conventional firewalls can defend against common DDoS or DoS attacks, but will be the first victim in more complicated and severe DDoS attacks. • IPS identifies and defends against intrusion behaviors based on the signature database; however, DDoS or DoS attacks are launched through legitimate data packets, which do not meet the behavior features of intrusion. • Based on NetFlow traffic sampling and analysis, conventional anti-DDoS or anti- DoS devices can defend against common flood attacks but cannot cope with light traffic and application-layer attacks. Moreover, conventional anti-DDoS or anti-DoS devices are slow in detecting and traffic diversion. • Conventional anti-DDoS devices cannot cope with evolving DDoS attacks and cannot meet the requirements of customers. Conventional Security Devices Are Hopeless and Customers Need New Solutions
  • 9. HUAWEI TECHNOLOGIES CO., LTD. Page 9 Defending Against DDoS Attacks on the Upstream Network Huawei anti-DDoS solution should relieve the congestion of carriers' networks first. It cleans the heavy traffic of bandwidth flood attacks .
  • 10. HUAWEI TECHNOLOGIES CO., LTD. Page 10 Refined Defense for VIPs' Services — Defense at the Egress of the Downstream Network The dedicated cleaning device is deployed at the egress of the access network to deliver refined defense for application servers. It mainly targets at application layer attacks and light traffic attacks. HTTP service HTTPS service DNS service Mail service DPI-based cleaning center FW
  • 11. HUAWEI TECHNOLOGIES CO., LTD. Page 11 Defense Filters Defense based on Interface Defense based on destination IP range Defense based on destination IP Defense based on source IP syn flood syn-ack flood ack flood fin flood rst flood tcp fragment flood tcp abnormal flood http flood dns request flood dns reply flood Icmp flood syn flood syn-ack flood ack flood fin flood rst flood tcp fragment flood dns request flood dns reply flood syn flood syn-ack flood ack flood fin flood rst flood IP fragment flood tcp abnormal flood http flood CC https flood dns request flood dns reply flood DNS Amplification Attacks DNS cache-poisoning attack http hijacking udp flood Icmp flood SSL-DoS SSL-DDoS Defense based on services syn flood syn-ack flood ack flood fin flood rst flood IP fragment flood tcp abnormal flood http flood CC https flood dns request flood dns reply flood DNS Amplification Attacks DNS cache poisoning attack http hijacking udp flood Icmp flood SSL-DoS SSL-DDoS syn flood syn-ack flood ack flood fin flood rst flood tcp fragment flood tcp abnormal flood DNS flood Second FilterFirst Filter Third Filter 1. Defends against 19% attack traffic after source authentication is performed. 2. Uses the IP address of the protected network as the attack source, resulting in reflection packet leak.
  • 12. HUAWEI TECHNOLOGIES CO., LTD. Page 12 Detecting Technology: Dynamic Traffic Baseline Currently, most anti-DDoS systems employ the single-traffic threshold for identifying attacks. The threshold should be manually configured by users according to the actual traffic on the live network. However, users experience trouble in configuring such a threshold. Under this scenario, Huawei DPI system offers the dynamic traffic baseline, through which learnt dynamic thresholds replace static ones. In so doing, detecting accuracy is improved. Static traffic baseline Dynamic traffic baseline Traffic Time
  • 13. HUAWEI TECHNOLOGIES CO., LTD. Page 13 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 14. HUAWEI TECHNOLOGIES CO., LTD. Page 14 Spoofed Source Attacks: SYN Flood Attack Character: 1. Spoofed source attack; 2. Defense can fail when those attack packets' source IP exist; 3. The discontinuous attack can evade the detecting. Defense Principle: First-packet-drop can defend and report spoofing_packets log.
  • 15. HUAWEI TECHNOLOGIES CO., LTD. Page 15 Defense against SYN Flood based on Application Layer-based Source Authentication Client: RST Client: SYN SYN Flood Traffic WEB Server WEB Server User Attacker: SYN Bot Following Request will pass Cleaning Center : SYN+ACK with error ack sequence Cleaning Center : SYN+ACK with error ack sequence Anti-DDoS Device Anti-DDoS Device
  • 16. HUAWEI TECHNOLOGIES CO., LTD. Page 16 Principle of Defense against TCP Flood Whitelist Checking First- packet- drop Source Authentic ation Checking Source IP 1、Reputation IP list; 2、White-list by source authentication; Feature- based filtering 1、Filtering the malformed packets; 2、Filtering packets by fingerprint; Defense may fail when those attack packets' source IP exist. Defending this attack by checking the source IP’s TCP packets ratio. Session- checking Drop packets without valid session. 1. Spoofed source attack packets must been dropped before building session; 2. Reputation is used to avoid affection from defense. Traffic Shaping If the traffic is still heavy and exceeds the actual bandwidth of users after previous steps, traffic shaping is used to ensure available network bandwidths. First-packet-drop can mitigate up-link stress caused by source authentication by retransmission of TCP protocol. Defense against spoofed source attacks. Those authenticated sources are allowed to go into the following process.
  • 17. HUAWEI TECHNOLOGIES CO., LTD. Page 17 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 18. HUAWEI TECHNOLOGIES CO., LTD. Page 18 Spoofed Source Attacks: UDP Flood without fingerprint Attack Character: 1. The source IP address and source port change. 2. The packet payload changes. 3. The packet length also changes. Defense Principle: 1. If network service-based defense, especially, access-layer defense is employed, packets not complying with the service model are directly discarded. As shown in the figure, attack packets are upon ports 21 to 24 and are directly discarded because no such services exist. If static filtering is used to discard these attack packets, the system displays "User_defined_filter". 2. If attacks are upon service ports, TCP authentication must be performed over UDP data transmission such as online games. In this case, TCP association can be used to defend against UDP flood attacks. The device displays "Spoofing_packets" for packet loss. 3. If traffic limiting is applied, the device displays "Overflow_packets" for packet loss.
  • 19. HUAWEI TECHNOLOGIES CO., LTD. Page 19 Spoofed Source Attacks: UDP Flood with fingerprint Attack Character: 1. The source IP address and source port change. 2. The packet length also changes. 3. Packet payloads can be either the same such as Aladdin attacks or different in the case that payload bytes for the same packet are identical. Defense Principle: 1. Such attacks can be filtered out through dynamic fingerprint learning. In this case, the device displays "Dynamic_filter" for packet loss. 2. If the locations of attack features vary randomly, you can use refined packet filtering in the case of manually extracting the attack feature of each attack. In this case, the device displays "User_defined_filter" for packet loss.
  • 20. HUAWEI TECHNOLOGIES CO., LTD. Page 20 Protected network Defense against UDP Flood with Fingerprints based on Dynamic Fingerprint Learning Attacker Controller Controller Agent Controller Agent Agent Agent Agent Agent Zombie army Victim •Ha, the packets you sent have the same features. So I will not let you go through. • Cleaning center
  • 21. HUAWEI TECHNOLOGIES CO., LTD. Page 21 Principle of Defense against UDP Flood This method only for those UDP services needing TCP authentication first. Those sources authenticated are allowed to go into the following process. Behavior Analysis Dynamic Fingerprint Learning Filtering packets by fingerprint. 1. UDP-based data transmission must pass TCP authentication. Therefore, TCP association is recommeded for defending against UDP flood attacks. 2. On the live network, UDP flood attacks are mainly at four layers, because key UDP data is transmitted in encryption mode. Therefore, adding refined packet- filtering rules meets the requirements on UDP flood cleaning, except for manual intervention upon attacks. The change of each attack packet brings challenges. To resolve such a problem, use packet features as filtering ones and set the action to whilisting the source IP address if matched. 3. Many attacks bear features on the live netowrk. In this case, static filtering or dynamic fingerprint learning is recommended. Whitelist Checking First-packet- drop Source Authenticati on Feature- based filtering Traffic Shaping If the traffic is still heavy and exceeds the actual bandwidth of users after previous steps, traffic shaping is used to ensure available network bandwidths. Drop the first packet from the source IP based on retransmission of UDP application.
  • 22. HUAWEI TECHNOLOGIES CO., LTD. Page 22 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 23. HUAWEI TECHNOLOGIES CO., LTD. Page 23 Spoofed Source Attacks: ICMP Flood Attack Character: Spoofing source attack. Defense Principle: First-packet-drop can defend and report spoofing_packets log.
  • 24. HUAWEI TECHNOLOGIES CO., LTD. Page 24 Principle of Defense against ICMP Flood First-packet-drop Traffic Shaping If service traffic exists between the client and the protected network, ICMP packets between them are allowed through; otherwise, ICMP packets enter the first packet discarding procedure. Feature- based Filtering Whitelist Checking If the traffic is still heavy and exceeds the actual bandwidth of users after previous steps, traffic shaping is used to ensure available network bandwidths. Drop the first packet from the source IP. Filtering packets by fingerprint.
  • 25. HUAWEI TECHNOLOGIES CO., LTD. Page 25 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 26. HUAWEI TECHNOLOGIES CO., LTD. Page 28 DNS Query and Reply Flood Attacks SP DNS 1. what’s the IP for abc.google.com? Root Server 2. what’s the IP for abc.google.com? Attacker DNS Query Flood 3. The IP is XXX.XXX.XXX for news.google.com DNS Reply Flood Attacker
  • 27. HUAWEI TECHNOLOGIES CO., LTD. Page 29 Defense against DNS Query Flood for DNS Cache Server based on Application Layer-based Source Authentication DNS Query : www.google.com (TCP) DNS Reply : 200.72.x.x (TCP) DNS Query : www.google.com (UDP) DNS Reply : re-send with tcp please DNS Query Traffic DNS Cache Server DNS Cache Server DNS Query : www.google.com (UDP) DNS Reply : 200.72.x.x (UDP) User Bot DNS Query : www.google.com (UDP) DNS Reply : re-send with tcp please Following Query Request will pass Anti-DDoS Device Anti-DDoS Device
  • 28. HUAWEI TECHNOLOGIES CO., LTD. Page 30 Defense against DNS Query Flood for DNS Authoritative Server based on Application Layer-based Source Authentication DNS Query : security.google.com DNS Reply : re-query for news.google.com, please DNS Query : news.google.com DNS Reply : re-query for security.google.com, please DNS Query Traffic DNS Authoritative Server DNS Authoritative Server DNS Reply : 200.72.x.x DNS cache Server Bot DNS Query : abc.google.com DNS Reply : re-query for security.google.com, please Following Query Request will pass Anti-DDoS Device Anti-DDoS Device DNS Query : news.google.com
  • 29. HUAWEI TECHNOLOGIES CO., LTD. Page 31 Malformed DNS Domain Attack Attack Character: uses the forged source or real IP address on the live network as the source IP address to send massive requests for non-existent domain names. This leads to the server's continuous sending of DNS requests and exerts severe impacts. Defense Principle: uses rate limiting based on domain name matching to filter out attacks. The device displays "User_defined_filter" for packet loss.
  • 30. HUAWEI TECHNOLOGIES CO., LTD. Page 33 DNS Cache Poisoning — Malformed_connections SP DNS 1. what’s the IP aaa.google.com? (huge number of queries) google.com Server 3. what’s the IP for aaa.google.com? 2. The IP of aaa.google.com is YYY.YYY.YYY (huge number of fake replies) 4. Cache is poisoned Queries 150 200 250 300 350 400 500 550 650 750 Chances 16% 26% 38% 50% 61% 70% 85% 90% 96% 99% Chances of guessing the Query ID Attacker Attack Character: uses the DNS session to send massive spoofed packets to match the session at possibilities within the short period. DNS cache poisoning attacks are forged source ones. This mode avoids the weakness of TCP three-way handshake.
  • 31. HUAWEI TECHNOLOGIES CO., LTD. Page 34 Defense against DNS Cache Poisoning based on Session-check DNS Reply : 200.72.x.x User Bot More DNS Reply : 200.72.x.x DNS Query : abc.baidu.com Check the Session Table, if no hit, delete the session immediately Check the Session Table, if hit, forward Anti-DDoS Device DNS Cache Server
  • 32. HUAWEI TECHNOLOGIES CO., LTD. Page 35 Principle of Defense against DNS Flood First- packet- drop Source Authenticat ing Source IP Rate Limiting 1、Reputation IP list; 2、White-list by source authentication; First-packet-drop can mitigate up-link stress caused by source authentication by retransmission of DNS protocol. Defense against spoofed source attacks. Those authenticated sources are allowed to go into the following process. Malformed packet Filtering Filtering malformed DNS packets. Limiting the DNS request rate on source IP. Malformed Domain Filtering Defense against malformed DNS request flood from real IP. Session- Checking Defense against DNS cache poisoning and DNS reflection attack based on session- check 1. Spoofed source attack packets must been dropped before building session; 2. Reputation is used to avoid affection from defense. Principle of Defense against DNS query flood/reply flood Whitelist Checking
  • 33. HUAWEI TECHNOLOGIES CO., LTD. Page 36 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 34. HUAWEI TECHNOLOGIES CO., LTD. Page 37 TCP Retransmission Attack—Client_attacks Attack Character: 1、 Real source of attack, attack the client and server to establish a connection, a limited number of attacks on the client to send fewer messages, and as far as possible to hide the attack side; this is a common feature of Client_attacks; 2、 The same session, the attacker client kept send retransmission request message, the server that the message transmission process have discarded, non-stop to the client retransmission "discarded" message; 3、 The client IP is 118.250.201.68, the server IP is 222.240.187.37, packet capture analysis can be seen a small number of packets of the attack sent by the client, and the packet length, and the server responds with a messagerelatively large number of packets generally are larger, thus giving rise to attack the client to use a small downlink bandwidth in exchange for large upstream bandwidth overhead, leading to serious uplink congestion. Retransmission Packets Retransmission request Retransmi- ssion packets
  • 35. HUAWEI TECHNOLOGIES CO., LTD. Page 38 Defense against TCP Retransmission Attack based on Session-checking get search1.google.com response HTTP get packets WEB Server session is OK, go on User Bot get search1.google.com response Anti-DDoS Device WEB Server Anti-DDoS Device get search2.google.com response retransmit, please reply the lose packets retransmit, please reply the lose packets … … Find out those source IPs that it’s session is illegal and put it to blacklist Response packets from Server
  • 36. HUAWEI TECHNOLOGIES CO., LTD. Page 39 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 37. HUAWEI TECHNOLOGIES CO., LTD. Page 40 SSL-DoS Attack on SSL Server
  • 38. HUAWEI TECHNOLOGIES CO., LTD. Page 41 Defense against SSL-DDoS  Attack Character  Instead it exhausts the server resources from a single host requiring only a single TCP/IP socket. This attack is a Distributed Denial of Service (DDOS) by botnet.  A single server can perform between 150-300 handshakes per second. While a single client can request up to 1000 handshakes per second.  If the botnet is consist of 1,000 hosts, it’s attack result is obvious. And because a single host’s connections is few, this attack can evade detecting from network security devices.  Defense Principle  A legal host sets up a ssl session to transmit data, but a illegal host only set up session to exhaust SSL handshakes. Check session and put those source IPs whose session is illegal to blacklist.  Limit the connection from IPs which doesn’t exist in reputation list.
  • 39. HUAWEI TECHNOLOGIES CO., LTD. Page 42 2 Defense Principle Defense Principle of DNS Flood Defense Principle of HTTPS Flood Defense Principle of HTTP Flood Anti-DDoS MSS Defense Principle of TCP Flood Defense Principle of UDP Flood Defense Principle of ICMP Flood Basic Defense Principle Defense Principle of TCP Connection Flood
  • 40. HUAWEI TECHNOLOGIES CO., LTD. Page 43 HTTP Flood—Client_attacks Attack Character: Attack Character: This attack is a kind of http flood by botnet using a lot of open proxies. Sessions from single proxy are few to avoid detecting from security devices. The attack result is obvious when the attacked URI exhausts lots of CPU capability. “P57” directory is the attack aim. Defense Principle: Redirection check code is used to defend against CC attack. Attacks are launched by botnet. As a result, there is no response to authentication requests and access traffic fails to be transparently transmitted to the server. The cleaning device reports client_attacks log.
  • 41. HUAWEI TECHNOLOGIES CO., LTD. Page 44 CC Attack—HTTP Flood by Botnet using Proxy Attack Character: This attack is a kind of http flood by botnet using a lot of open proxies. Sessions from single proxy are few to avoid detecting from security devices. The attack result is obvious when the attacked URI exhausts lots of CPU capability. Open Proxy Attack destination The target can’t response now. Defense Principle: Redirection check code is used to defend against CC attack. Attacks are launched by botnet. As a result, there is no response to authentication requests and access traffic fails to be transparently transmitted to the server. The cleaning device reports client_attacks log.
  • 42. HUAWEI TECHNOLOGIES CO., LTD. Page 45 Defense against HTTP Flood based on Application Layer-based Source Authentication I want to visit: search2.taobao.com I want to visit: search1.taobao.com HTTP packets WEB Server WEB Server User I want to visit: search1.taobao.com Bot Following Request will pass search1.taobao.com do not exist, please visit: search2.taobao.com search1.taobao.com do not exist, please visit: search2.taobao.com Anti-DDoS Device Anti-DDoS Device search2.taobao.com do not exist, please visit: search1.taobao.com I want to visit: search2.taobao.com Please enter the verification code Please enter verification code to verify, add the white list
  • 43. HUAWEI TECHNOLOGIES CO., LTD. Page 46 Contents Threats of DDoS Attacks1 Huawei Anti-DDoS Solution 2 3 4 Defense Principle Products and Deployments
  • 44. HUAWEI TECHNOLOGIES CO., LTD. Page 47 Huawei Anti-DDoS Solution Anti-DDoS Solution Detecting center Cleaning center Internet Intranet Botnet Anti-DDoS solution Application scenario Deployed at the egress of an IDC, enterprise network, or server network to prevent flood and application-layer attacks. Solution objectives Ensuring efficient bandwidth usage; Ensuring service continuity; Providing ease of management. ATIC management center
  • 45. HUAWEI TECHNOLOGIES CO., LTD. Page 48 Huawei Anti-DDoS Solution ATIC mgmt. center Detecting center Cleaning center Detecting center The detecting center implements the detecting policies delivered by the ATIC management center to identify abnormal traffic and sends the detecting results to the ATIC management center. NetFlow Box Detection center NetFlow or  Provides detection at fine-grained, near real-time scale  Can detect application-layer attacks, but cannot detect routing information such as AS and next hop information  Provides highly accurate detection, in-depth packet detection, signature matching, and session table establishment  Centrally deployed, and difficult to scale  Off-line deployment has no impact on network devices  Provides detection at medium-grained time scale and introduces noticeable delay  Supports the collection and analysis of septet information, including routing information, but cannot detect application-layer attacks  Provides low accurate detection based on sampling septet information  Easy to deploy and scale  Requires network devices to send NetFlow traffic to the analysis devices and has some impact on network devices Basic and coarse-grained network-wide traffic detectionFine-grained real-time in-depth inspection
  • 46. HUAWEI TECHNOLOGIES CO., LTD. Page 49 Huawei Anti-DDoS Solution ATIC mgmt. centerDetecting center Cleaning center Cleaning center The cleaning center receives instructions from the ATIC management center, delivers traffic diversion policies, and implement traffic cleaning. The cleaning center provides accurate protection through layered protection procedures to prevent malformed packet, DoS, and DDoS attacks with low latency. Static filtering Malformed packet filtering Special control packet filtering Source validity authentication Session-based cleaning Signature recognition Traffic shaping Whitelist Blacklist LAND attack Fraggle attack Winnuke Ping of Death Tear Drop Invalid TCP flag attack Super large ICMP attack IP Option ICMP redirect message ICMP unreachable message Tracert Packets with IP Source Routing option Packets with IP Timestamp option Packets with IP Record Route option TCP Fragment Flood SYN Flood SYN-ACK Flood HTTP Get Flood HTTP Post Flood HTTPS Flood DNS Query Flood DNS Reply Flood SIP Flood TCP Flood UDP Flood ICMP Flood Connection Flood UDP Flood UDP Fragment Flood ICMP Flood CC HTTP Get Flood HTTP Post Flood Avoid congestion to the targetSeven-layer filtering against attacks of all types
  • 47. HUAWEI TECHNOLOGIES CO., LTD. Page 50 Huawei Anti-DDoS Solution ATIC mgmt center Detecting center Cleaning center ATIC management center The ATIC management center is the brain of the whole solution. It provides customized detecting and cleaning policies, controls the detecting and cleaning devices, and generates attack reports and cleaning logs for query. Sampling and analysis Summary reports Configuration management Reports query ATIC management server Collector Collector Collector Anti-DDoS Device Anti-DDoS Device Anti-DDoS Device Monitoring Traffic Management Traffic Syslog traffic
  • 48. HUAWEI TECHNOLOGIES CO., LTD. Page 51 Page 51 Page 51 Layer operation mode—layer cleaning Pipe-line level Anti-DDoS Provider can deploy netflow detection+ E8000E-X cleaning in MAN or upper level , this can not only protect link-layer safe for provider but also give extra MSS Defense police is default configure and not related to application level; report function ; Charging mode: •A:charging on defense times, on demand cleaning mode; •B: charging on month, providing real-time defense; Shared-link layer Anti-DDoS Provider deploy E8000E-X in Metro net using static traffic diversion Customized defense policy based on application,and provide detailed defense in application level; Shared cleaning device and cleaning bandwidth,in this situation, cleaning device share MAN access device; Report function; Charging mode: XX$/mode/100 Mbps ,or XX$/ month/ 100Mbs ; Target user : SME(Small and medium enterprises, like NSP、 IDC; Owned link-layer Anti-DDoS Provider deploy E1000E-D in customer’s access point of metro net by using in-line or static traffic diversion mode,This can provide fined application level defense by customized defense policy; Providing fined application level defense by customized defense policy ; Owned cleaning device and cleaning bandwidth,detection and cleaning device can be deployed in Provider side of customer’s network; Report function ; Charging mode : XX$/month ; Target user : Key accounts,result is that provider take care of the security issue for Key accounts,for example ,customer sold out their Anti-DDoS security to provider ,such as bank ; A Mode Charging on cleaning times, providing on demand cleaning mode , three modes : manual cleaning、auto cleaning、interactive cleaning; Charging mode:XX$/IP/each cleaning or XX$/100Mbps/ IP/each cleaning Target user:SME(Small and medium enterprises) B Mode Charge rated fee; Customized defense policy ,providing auto cleaning; Charging mode: XX$/month/per IP,or XX$/ month/ 100Mbs; Target user : Key accounts,like IDC,NSP; Currently, Turkey telecom, United Arab Emirates DU have been the customers of HUAWEI Anti-DDoS MSS solution
  • 49. HUAWEI TECHNOLOGIES CO., LTD. Page 52 Provides Up to 200 Gbit/s Performance High performance High availability High detection rate Rapid response Industry-leading architecture: Built on the network processor (NP), multi-core CPU, and distributed architecture, breaks the performance bottleneck, and provides online capacity expansion capability. High performance: Delivers a maximum of 160 Gbit/s processing speed per chassis, which is an industry-leading level and can cope with large scale attacks High capacity: Supports differentiated protection for a maximum of 2000 Zones; provides fine- grained protection for 10,000 IP AMS1500 resses and common protection for 1,000,000 IP AMS1500 resses
  • 50. HUAWEI TECHNOLOGIES CO., LTD. Page 53 High performance High availability High detection rate Rapid response Delivers 500,000 hours of MTBF and 99.9999% availability with less than 1 minute of down time each year and less than 0.1 second failover time, ensuring service continuity  1+1 main processing engines  3+1 switching boards Delivers core-router level stability and availability Dual-MPU multiple switching boards Load balancing between service boards Dual-system hot backup Component redundancy Cross-board interface binding VRP platform Service board Service board backup  Intelligent load balancing Avoids the impact of single-board failure  Multiple HA implementations  Provides multiple paths Accommodates to different HA implementations  Power redundancy  Fan redundancy  Hot-swappable parts Ensures online insertion and removal of parts  Evenly distributes traffic among links  Seamlessly failover, with no impact on data forwarding Improves link availability and increases total bandwidth  Modules are independent of each other to avoid interference  Manages 4 million devices on live networks Provides stable and reliable software platform Delivers the industry's longest MTBF: 500,0000 hours 99.9999% Availability to Ensure Service Continuity
  • 51. HUAWEI TECHNOLOGIES CO., LTD. Page 54 Full-scale IPv6 attack defense High performance High availability High detection rate Rapid response IPv6 Attack Defense to Secure IPv4-to-IPv6 Transition Trojan Horses DDoSWorms IPv6 IPv4 IPv6/IPv4 dual stack, seven-layer defense structure Static IPv6 filtering Malformed IPv6 packet filtering Transport layer IPv6 source validity authentication Application-layer IPv6 source validity authentication Session-based IPv6 cleaning IPv6 behavior analysis IPv6 traffic shaping Defends against IPv4 and IPv6 attacks simultaneously IPv6 attack defense IPv6 IPv6 IPv4 Backbone network Branch 1 Branch 2 Representative office HQ IPv6 IPv4/ IPv6 6to4 router/ 6rd CE ISATAP router 6to4 router/ 6rd CE DS host 6to4 router/ 6rd CE IPv4/IPv6 Internet IPv6 IPv4 IPv6 IPv4 NodeB RNC SGSN GGSN NAT64 Initiates massive sessions to consume NAT64 resources INTERNET Threats in IPv4-to-IPv6 Transition Schemes
  • 52. HUAWEI TECHNOLOGIES CO., LTD. Page 55 High performance High availability High detection rate Rapid response Detecting and Cleaning Within Seconds DPI technology Conventional NetFlow technology Detecting speed Performs DPI packet by packet, detects attacks within seconds Performs flow-based and interface-specific inspection; detects attacks within minutes or tens of minutes Response speed Leverages session and detection information synchronization; responds to attacks within seconds Diverts traffic minutes or tens of minutes after attacks
  • 53. HUAWEI TECHNOLOGIES CO., LTD. Page 56 Contents Threats of DDoS Attacks1 Huawei Anti-DDoS Solution 2 3 4 Defense Principle Products and Deployments
  • 54. HUAWEI TECHNOLOGIES CO., LTD. Page 57 Detection and cleaning Detection and cleaning In off-line DPI deployment, the DPI devices analyze the traffic of the entire network, automatically deliver traffic diversion policies to the core routing devices to divert the traffic for cleaning upon detecting abnormal traffic, and provide reports on attack events and cleaning results. During deployment: Detecting devices can be deployed outside of the cleaning devices to detect all traffic; Detecting devices can be deployed inside of the cleaning devices to detect traffic in smaller scale to reduce costs. Customer network Upstream network Network edge Off-line DPI and dynamic traffic diversion and cleaning Detection center Cleaning center Mirrored traffic ATIC management center Traffic after cleaning Traffic before cleaning Management traffic Logs on traffic statistics and attacks Suitable for refined defense on large networks
  • 55. HUAWEI TECHNOLOGIES CO., LTD. Page 58 Independent Cleaning Customer network Upstream network Network edge Static traffic diversion and independent cleaning Cleaning center Traffic after cleaning Management traffic Logs on traffic statistics and attacks ATIC management center Traffic before cleaning Independent cleaning Detect specified traffic based on static rules and dynamically learn the normal traffic baseline to prevent abnormal traffic. Independent cleaning supports the following two deployment modes: 1) In-line deployment: All traffic goes through the cleaning devices to be cleaned. In-line deployment inspects traffic in wider range, but requires high- performance hardware and is expensive. 2) Off-line deployment provides refined protection for specific customers. Off-line deployment is cheap to deploy, but inspects traffic in a smaller range. Suitable for refined defense on small and medium-sized networks
  • 56. HUAWEI TECHNOLOGIES CO., LTD. Page 59 Proportional Sampling and Cleaning Proportional sampling and cleaning In off-line deployment, NetFlow devices sample traffic for analysis, automatically deliver traffic diversion policies to the core routing devices to divert traffic to the cleaning center for cleaning upon detecting abnormal traffic, and provide reports on attacks and cleaning results. Pros: Low deployment cost Cons: Slow response, low detection rate in application- layer attacks Customer network Upstream network Network edge Off-line sampling and dynamic traffic diversion and cleaning Proportional sampling and detecting center Cleaning center NetFlow Box ATIC management center Traffic after cleaning Management traffic Logs on traffic statistics and attacks Traffic before cleaning Proportionally sampled traffic Suitable for network-wide traffic cleaning
  • 57. HUAWEI TECHNOLOGIES CO., LTD. Page 60 Load Balancing Cleaning Mode Client Network Trust zoneDMZ Web Mail … OA FirewallFirewall AMS1550 ATIC management center In-Line Mode (Load Balancing) Switch Switch Upper-level network Post-cleaning traffic Pre-cleaning traffic Management center Traffic and attack log
  • 58. HUAWEI TECHNOLOGIES CO., LTD. Page 61 Super-network Processing Flow of Anti-DDoS Solution Cleaning Center Management Center 1 Attack traffic arrives the protected network, so that the bandwidth is congestive and the services is out of service. 2 Detects the mirrored or optically split traffic and locates anomalies. 3 Finds out the attacked aim and reports exception logs to the ATIC management center 4 Delivers traffic diversion policy to the cleaning center. 5 Diverts the traffic to the zone to the cleaning center by BGP announcing host router. 7 Reports the cleaning logs to the ATIC management center for collection and report statistics. BGP Detecting Center Protected Network 6 Injects the cleaned traffic by PBR, MPLS VPN,MPLS LSP,GRE. Mirrored/Optically Split Traffic Management Traffic Cleaning Logs Traffic Logs Capture Packets Pre-Cleaning Traffic Post-Cleaning Traffic ---Using Dynamic Traffic Diversion in Off-Line Mode as an Example
  • 59. HUAWEI TECHNOLOGIES CO., LTD. Page 62 Flexible Deployments to Accommodate to Your Needs Deployment Method Network-wide traffic policing Link congestion prevention Customer channel cleaning Refined defense Easy to operate Refined defense Low-cost deployment Proportional sampling and cleaning DPI and cleaning Pros: Cost-effective, suitable for backbone networks and large MANs to prevent flood attacks. Cons: Causes severe delay, requires the NetFlow sampling; cannot prevent application-layer attacks and light- traffic attacks. Pros and cons Pros: Cheap to deploy; capable of detecting and preventing flood and application-layer attacks in fine-grained scale and learning traffic model; rapid in response to attacks and causing small delay. Cons: Static protection, suitable for only small networks. Pros and cons Pros: Effective to detect and prevent flood and application-layer attacks; capable of learning traffic model and delivering fine-grained detection and cleaning; rapid in response to attacks and causing small delay Cons: Expensive. Pros and cons Independent Cleaning
  • 60. HUAWEI TECHNOLOGIES CO., LTD. Page 64 Huawei Anti-DDoS Operation solution components DDoS Detecting Center DDoS Cleanning Center Management Center AMS8000E-XAMS1500 AMS8000E-X AMS1500 AMS1500-D ATIC/VSM DetectionDeeppacketdetection <=5G <=200G <=5G <=200G Management Center Including servers and software
  • 61. HUAWEI TECHNOLOGIES CO., LTD. Page 65 Huawei Anti-DDoS Product AMS1500-D ( detecting device) AMS1520-AMS1550 2-5Gbps (cleaning device) 10G detecting board 20G Cleaning board 20G detecting board 200G 5G For enterprise customers For IDC/MAN/backbone network AMS8030 AMS8080 AMS8160 High performance: Provides a maximum of 200 Gbit/s processing speed per chassis to cope with large scale attacks High availability: Delivers 500,000 hours of MTBFand 99.9999% reliability High detection rate: Provides application-layer attacks and IPv6 attacks Rapid response: Capable of detecting and cleaning within seconds to ensure service continuity 10G Cleaning board
  • 62. HUAWEI TECHNOLOGIES CO., LTD. Page 66 Zapraszamy do Huawei Demo Truck ORAZ NA PREZENTACJE:  Poniedziałek 14:55 – 16:20 Protokół IETF TRILL – Donald E. Eastlake 3rd  Wtorek 12:30 – 13:15 DataCenter Interconnect – Sam Aldrin  Wtorek 14:15 – 14:45 Budowa przełączników modularnych – Piotr Głaska