Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:dpi:dpi_options:opt_ddos:ddos_description [2024/09/26 15:29] – external edit 127.0.0.1 | en:dpi:dpi_options:opt_ddos:ddos_description [2025/09/24 08:04] (current) – [Organic AntiDDoS System] elena.rudich | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== General | + | ====== General |
| {{indexmenu_n> | {{indexmenu_n> | ||
| - | DoS attack (for Denial of Service) and DDoS attack (for Distributed Denial of Service) are the types of computer systems | + | **VAS Experts offers a solution to deal with DDoS attacks |
| - | DoS attacks | + | VAS Experts offers two options for protection against DDoS attacks: |
| + | - Using only SSG with the auto-protection function against SYN Flood, UDP Flood, and HTTP Flood. Requires SSG with the DDoS Auto-Protection option (option **ddos**). | ||
| + | - Using a combination | ||
| - | <note important> | + | =====Most Common Forms of Attacks on Telecom Operators===== |
| + | - Inbound Channel Overflow | ||
| + | * Amplification attacks | ||
| + | * BotNet attacks — each bot generates relatively small traffic resembling legitimate traffic, but the aggregate traffic exceeds the capacity of the operator' | ||
| + | - High PPS Attack: | ||
| + | * Flood, SYN flood, usually with source IP spoofing\\ Protection: redirecting traffic | ||
| + | - Compromise of Operator' | ||
| + | =====AntiDDoS Solution Architecture Based on SSG and QoE===== | ||
| + | FastMitigator is an intelligent network attack protection system. It is a distributed traffic analysis module that provides real-time detection and blocking of a wide range of cyber threats. | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | ====Operation Principle==== | ||
| + | - Deep Traffic Analysis (DPI) and Statistics Export | ||
| + | * All traffic passes through DPI (SSG), operating in-line or on a traffic mirror. | ||
| + | * Full NetFlow in IPFIX format is sent to the QoE system for detailed analysis. | ||
| + | - Statistics Analysis and Baseline Formation | ||
| + | * The analyzer processes Full NetFlow and creates a " | ||
| + | * The profile is stored in QoE's distributed tables for fast access. | ||
| + | - Anomaly Detection | ||
| + | * A detector based on neural networks and machine learning algorithms identifies deviations, classifies threats, and determines their sources. | ||
| + | - Traffic Scrubbing Based on Dynamic Rules | ||
| + | * Upon attack detection, QoE forms an Attacks container containing: | ||
| + | * IP addresses of attacking hosts | ||
| + | * Ports used for attacks | ||
| + | * The container is transmitted to the SSG DPI, where special Attacks protocols (or protocol groups) are created for each threat type. It is recommended to use a dedicated SSG in in-line mode, which constantly passes all traffic or receives only a portion of traffic for scrubbing. | ||
| + | * Protection profiles are pre-configured on DPI (e.g., via "18. Session Policing" | ||
| + | * Drop (complete blocking) | ||
| + | * Policing (bandwidth limiting) | ||
| + | * The Attacks container is updated in real-time: if an attack stops, IP hosts are removed from the list. | ||
| + | - Protection via BGP using Blackhole and Flowspec | ||
| + | * In cases where the operator' | ||
| + | * To allow subscribers on blocked public IP addresses to continue accessing the internet, it is necessary to temporarily change their IP address — enable the CG-NAT service on SSG (use a previously announced public address pool). Thus, there is no need to change the IP address on the subscriber' | ||
| + | |||
| + | ====Advantages of FastMitigator==== | ||
| + | - Distributed architecture — high fault tolerance | ||
| + | - Adaptive protection — automatic rule updates | ||
| + | - Deep analytics — neural network algorithms + DPI | ||
| + | - Flexibility — support for various blocking scenarios | ||
| + | |||
| + | ====Organic AntiDDoS System==== | ||
| + | The evolution of the DDoS protection solution aims to filter malicious traffic even before it enters the internet. Deploying SSG AntiDDoS complexes at multiple telecom operators will allow stopping BotNet traffic inside the operator' | ||
| + | |||
| + | {{ : | ||