Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:dpi:dpi_options:opt_ddos:ddos_description [2024/09/26 15:29] – external edit 127.0.0.1 | en:dpi:dpi_options:opt_ddos:ddos_description [2026/02/19 13:24] (current) – elena.krasnobryzh | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ======Description of Tools and Architecture====== |
| {{indexmenu_n> | {{indexmenu_n> | ||
| - | DoS attack (for Denial of Service) and DDoS attack (for Distributed Denial of Service) are the types of computer systems attacks. Their goal is to prevent or complicate legit users to access the resources provided by the system. | ||
| - | DoS attacks can be performed by a hacker using one computer. | + | **VAS Experts offers |
| - | < | + | VAS Experts provides several options for DDoS protection: |
| + | - Using SSG only with auto-protection against SYN Flood, UDP Flood, and HTTP Flood. Requires SSG with the Anti-DDoS Auto-protection option (**ddos**). **[[en: | ||
| + | - Using a combination of SSG and QoE to detect all types of DDoS attacks with the ability to fully block incoming traffic (**blackhole**) and clean it on SSG. Requires SSG with the option to collect and export protocol and direction statistics in IPFIX format (**ipfix**) and QoE with the option Traffic detection and cleaning (**blackhole and flowspec**) from BotNet and DDoS attacks (**antiddos**). For traffic cleaning, existing SSGs can be used (available in versions: BASE, BNG with mark and channels options, COMPLETE), or a dedicated SSG BASE server can be deployed to handle part of the traffic. **[[en: | ||
| + | |||
| + | < | ||
| + | Licensing of the AntiDDoS option within SSG and QoE is described [[en: | ||
| + | Requirements: | ||
| + | * QoE and GUI latest version. QoE license — any, AntiDDoS purchased as a separate | ||
| + | * SSG license BASE / COMPLETE / BNG with additional options [[en: | ||
| + | * QoE installed on a separate server or VM, **NOT on the SSG server** | ||
| + | * For 1Gb/s peak incoming traffic, 8.4 GB is required for statistics storage | ||
| + | </ | ||
| + | |||
| + | =====Most Common Forms of Attacks on Telecom Operators===== | ||
| + | - Input channel saturation | ||
| + | * Amplification attacks | ||
| + | * BotNet attacks — each bot generates relatively small traffic similar to legitimate traffic, but cumulatively the traffic exceeds | ||
| + | - High PPS attack: | ||
| + | * Flood, SYN flood, usually with source IP spoofing\\ Protection: use source IP spoofing | ||
| + | - Compromise of operator network elements: detected by the presence of SSH and other sessions from operator service addresses, which are pre-configured and not in the whitelist\\ Protection: detect such sessions and block by external address | ||
| + | |||
| + | =====AntiDDoS Solution Architecture Based on SSG and QoE===== | ||
| + | FastMitigator — an intelligent network attack protection system. It is a distributed traffic analysis module providing real-time detection and mitigation of a wide range of cyber threats. | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | ====Operation Principle==== | ||
| + | - Deep traffic analysis (DPI) and statistics export | ||
| + | * All traffic passes through DPI (SSG), operating in-line or on a traffic mirror. | ||
| + | * Full NetFlow in IPFIX format is sent to QoE for detailed analysis. | ||
| + | - Statistical analysis and baseline creation | ||
| + | * Analyzer processes Full NetFlow and creates a " | ||
| + | * Profile is stored in distributed QoE tables for fast access. | ||
| + | - Anomaly detection | ||
| + | * Detector based on neural networks and machine learning algorithms identifies deviations, classifies threats, and determines their sources. | ||
| + | - Traffic cleaning based on dynamic rules | ||
| + | * When an attack is detected, QoE creates an Attacks container containing: | ||
| + | * IP addresses of attacking hosts | ||
| + | * Ports used for attacks | ||
| + | * Container is sent to SSG DPI, where special Attack protocols (or protocol groups) are created | ||
| + | * DPI pre-configures protection profiles (e.g., via "18. Session Policing" | ||
| + | * Drop (full block) | ||
| + | * Policing (bandwidth limitation) | ||
| + | * Attacks container is updated in real-time: if the attack stops, IP hosts are removed from the list. | ||
| + | - Protection via BGP using blackhole and flowspec | ||
| + | * If operator channel capacity is exhausted, Attacks container can be sent to a special script that automatically adds subscriber IPs to blackhole, ensuring maximum infrastructure protection. Incoming traffic to these subscribers is dropped on the uplink channel. | ||
| + | * To allow subscribers on blocked public IPs to access the internet, their IP can be temporarily replaced — enable CG-NAT on SSG (using the previously announced public IP pool). This avoids changing the subscriber device IP during the attack. Access is temporarily via a different public IP, and after the attack ends, the original IP is restored — disable CG-NAT on SSG. | ||
| + | |||
| + | ====FastMitigator Advantages==== | ||
| + | - Distributed architecture — high fault tolerance | ||
| + | - Adaptive protection — automatic rule updates | ||
| + | - Deep analytics — neural network algorithms + DPI | ||
| + | - Flexibility — supports different blocking scenarios | ||
| + | |||
| + | ====Organic AntiDDoS System==== | ||
| + | The development | ||
| + | |||
| + | {{ : | ||
| + | |||
| + | <note tip> | ||