Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:dpi:dpi_options:opt_ddos:ddos_description [2025/09/23 10:44] – elena.krasnobryzh | en:dpi:dpi_options:opt_ddos:ddos_description [2025/09/24 08:04] (current) – [Organic AntiDDoS System] elena.rudich | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== General Description ====== | ====== General Description ====== | ||
| {{indexmenu_n> | {{indexmenu_n> | ||
| - | **VAS Experts offers a solution to combat | + | **VAS Experts offers a solution to deal with DDoS attacks targeting telecom operators and their infrastructure, |
| - | VAS Experts offers | + | VAS Experts offers |
| - Using only SSG with the auto-protection function against SYN Flood, UDP Flood, and HTTP Flood. Requires SSG with the DDoS Auto-Protection option (option **ddos**). | - Using only SSG with the auto-protection function against SYN Flood, UDP Flood, and HTTP Flood. Requires SSG with the DDoS Auto-Protection option (option **ddos**). | ||
| - | - Using a combination of SSG and QoE to detect all types of DDoS attacks with the capability for complete inbound traffic blocking (**blackhole**) and scrubbing on SSG. Requires SSG with the option for Collection and export of protocol and direction statistics in IPFIX format (option **ipfix**) and QoE with the option for Traffic detection and scrubbing (**blackhole and flowspec**) against BotNet and DDoS attacks (option **antiddos**). For scrubbing, SSG version BASE is required. | + | - Using a combination of SSG and QoE to detect |
| =====Most Common Forms of Attacks on Telecom Operators===== | =====Most Common Forms of Attacks on Telecom Operators===== | ||
| - | - Ingress | + | - Inbound |
| * Amplification attacks (DNS, NTP, UDP flood, and others)\\ Protection: blackholing attacked addresses or applying flowspec on the uplink channel; other protection methods are ineffective. | * Amplification attacks (DNS, NTP, UDP flood, and others)\\ Protection: blackholing attacked addresses or applying flowspec on the uplink channel; other protection methods are ineffective. | ||
| * BotNet attacks — each bot generates relatively small traffic resembling legitimate traffic, but the aggregate traffic exceeds the capacity of the operator' | * BotNet attacks — each bot generates relatively small traffic resembling legitimate traffic, but the aggregate traffic exceeds the capacity of the operator' | ||
| Line 49: | Line 49: | ||
| ====Organic AntiDDoS System==== | ====Organic AntiDDoS System==== | ||
| - | The evolution of the DDoS protection solution aims to scrub traffic even before it enters the internet. Deploying SSG AntiDDoS complexes at multiple telecom operators will allow stopping BotNet traffic inside the operator' | + | The evolution of the DDoS protection solution aims to filter malicious |
| {{ : | {{ : | ||