NSFOCUS Network Traffic Analyzer (NTA)

Size: px
Start display at page:

Download "NSFOCUS Network Traffic Analyzer (NTA)"

Transcription

1 What does it do? x-flow technology Traffic Statistics and analysis Route analysis Abnormal traffic detection Whom to work with? NSFOCUS Anti-DDoS System Overview NSFOCUS Network Traffic Analyzer (NTA) NSFOCUS Network Traffic Analyzer (NSFOCUS NTA) is a traffic analysis and detection product powered by the Flow technology. Supported by NSFOCUS s decades of accumulative experience in traffic analysis, it is oriented to the telecom carrier network, IDC network and other networks. NSFOCUS NTA provides its users with real-time network status monitoring and real-time alerts of network attacks and anomalies, to secure users' network environments. Throughout years of development, NSFOCUS NTA has already established a good reputation among customers with a track of success cases covering China, the USA, EU, South Korea and other regions worldwide. NSFOCUS NTA has multiple models ranging from carrier-grade to Where to use? Carriers Network IDC Enterprise DC enterpriese-grade, which can be deloyed in the MANs and the backbone networks of the ISPs, government agencies, education orgainzations, enterprises and so forth. It is mainly designed for traffic analysis, anomaly traffic dection and route analysis in the Mbps, Gbps and 10Gbps networks, based on the xflow data from the router. Applications With the rapid expansion of the Internet businesses in recent years, higher and higher bandwidth is required for different links on the internet, which lead to increaing investment in network infrastructure. However, alongside the booming development of network infrastructure and the internet businesses, the network security issues grow to be greater concerns. The reduced attack cost and mushroomed easy-to-use attack techniques result in volumetric 1 / 13

2 anomaly traffic with complex compositions. Therefore, it is imperative to Features Real-time Network-wide Monitoring perform an in-depth analysis of the network traffic (including the varied anomaly traffic) to get throuogh insight into the distribution and trends of the network traffic. Accurate and Detailed Traffic Analysis Powerful Anomaly Detection IPV4/V6 Dual-stack Analysis and Detection Flexible and Diverse Reporting 3-in-1 Solution Value-added Operational Benefits Easy Operation and Maintenance Figure 1: The Deployment of NSFOCUS NTA NSFOCUS NTA is always deployed at the egress of the MAN or the intranet, activating the Netfow capability of the core router to send Netflow data to the NTA system. By virtue of the traffic analysis capability, the NTA system performs traffic analysis, anomaly traffic and attack detection, link stress analysis, route analysis and so forth, providing basic information for anomaly traffic mitigation and network optimizaition. Features Real-time Network-wide Monitoring NSFOCUS NTA monitors the overall network status in real time by collecting and analyzing traffic data. This enables network administrators to have a panoramic view of the network load and trends as well as the usage of network application resources. 2 / 13

3 Figure 2: Network-wide Monitoring As shown in Fig 2, NSFOCUS NTA monitors the network-wide status in the following four aspects: 1. NTA device status: The NTA system monitors the CPU usage, memory usage, hard disk usage, interface status, Flow rate and other indicators of itself, with real-time operating information presented. 2. Network anomaly status: The NTA system detects various network anomalies in real time during network operations, identifying network bottlenecks and the root causes of network performance degradation. 3. Network traffic status: The NTA system monitors the traffic status at the network egress, core devices, specific subnets, and other network objects in real time, with multi-dimensional traffic analysis provided. 4. Network device status: The NTA system monitors status of the routers, the interfaces, and the device traffic in real time and informs administrators of the network load and performance. Accurate and Detailed Traffic Analysis NSFOCUS has continuously improved the data analysis algorithms for the NTA system based on years of experience with Flow data detection and analysis. 3 / 13

4 This ensures accurate NTA analysis for existing network environments with differing levels of complexity. NSFOCUS NTA monitors the network traffic for the Internet egress, critical businesses, specific subnets, key servers, etc., which data are analyzed from the dimensions of total traffic volume, TOP IP, TOP ports/applications, etc. Correlation analysis is performed for objects across different dimensions in order to provide visibility of the network composition, flow, and trends in different time frames. With a minimum analysis granularity of only 30 seconds, it is capable of reflecting network traffic changes in real time. The system also provides analysis data storage for up to a year. Relying on such a long-term analysis of historical data, it can track the traffic distribution and trends by time, region, and flow direction. This helps carriers, data centers, and other institutions gain a deep understanding of their business demands, hotspots, and trends, laying network decision-makers a foundation for network planning and designing. Moreover, when an alert about anomaly traffic is triggered, NSFOCUS NTA can rapidly pinpoint the victimized IP address. Throughout the entire attack process, it logs the size, composition, source, and time-based violations of the attack traffic in detail, allowing further full-course forensics. Powerful Anomaly Detection NSFOCUS NTA also possesses a powerful anomaly detection capability with the following features, supported by NSFOCUS' self-developed anomaly detection algorithms. Abundant Detection Types and Full Coverage of Backbone Threats NSFOCUS NTA provides two types of anomaly detection methods: system build-in anomaly detection and custom anomaly detection. In addition to the built-in detection signatures, users can customize alerts for 128 types of self-discovered abnormal network signatures. The anomaly detection guards 4 / 13

5 against excessive traffic, bandwidth saturation, DDoS attacks, abnormal Dark IP, abnormal private IP, etc. NSFOCUS NTA supports warning of up to 14 types DDoS attacks at the network layer and the application layer, such as SYN FLOOD, ACK FLOOD, HTTP FLOOD, and SIP FLOOD, completely covering all threats on the backbone network. Rapid Attack Detection and Thorough Event Record NSFOCUS NTA responds to attacks so rapidly that it can generate an alert in 20 seconds at minimum. The alert levels are predefined as high, medium, or low severity. Different events will trigger different levels of alerts. In the case of network attacks, NTA records the attacks from multiple dimensions, such as network traffic fluctuations, changes of the traffic streaming to the target IP address before and after the attacks. It also analyzes the attack traffic in depth, including the cause, location, strength, type, composition, etc. From this, the system can backtrack the entire attack process and help network administrators locate the attack source. Intranet Security Protection Attacks are becoming more severe and more diverse. They can occur both on the Intranet and the Extranet. Attacks originated from the intranet can congest outbound bandwidth to make a network bottleneck, so it is also demanding to block this type of attacks. Many organizations are already aware of the dangers posed by attacks from Intranet. For instance, data centers have policies that require monitoring of any attacks launched internally against external targets. Carriers require that, in addition to monitoring external attack against their network infrastructure, they must also prevent attacks launched internally. In response to these new requirements, NTA's self-developed intelligent detection system can not only detect inbound attack traffic, but also monitor outbound anomaly traffic in real time. It intelligently determines if the outbound traffic exceeds the predefined threshold value, and accurately locates the TOP IP of any anomaly 5 / 13

6 traffic streaming out of the intranet. The security of the entire network can only be safeguarded by ferreting out the perpetrators of attacks launched from intranet while guarding against external attacks simultaneously. With no question, NSFOCUS NTA's bi-directional detection can secure users' networks with two-layer protections. Intelligent Detection Algorithm Because of the difficulty in configuring static baseline parameters, its accuracy is not high. Therefore, NSFOCUS NTA has developed an intelligent algorithm for generating dynamic baseline. This feature enables the system to intelligently generate multidimensional network characteristics for an object, following a period of traffic characteristics analysis and modeling for the object to be learnt. The technical principle of the baseline auto-learning technology is as follows. When hosts with similar business and traffic are operating in normal network environment, their traffic volumes and characteristics remain stable. From this, the system models the traffic for different characteristics of the host in normal operation, with the upper limits gained over a period of auto-learning. During this process, the system automatically records variations of the network traffic for basic data modeling. It sets a confidence interval based on the trustworthy data range. By analyzing and calculating the historical data within the confidence interval, the system obtains traffic variation trends and model characteristics. In order to ensure the traffic characteristics to be learnt conform to the normal distribution, the system allows users to enable data modeling in calendar mode, such as setting workdays, weekends, and other calendar time for automated modeling. At the same time, the system supports manual adjustment of the dynamic baseline. This, together with the calendar-based auto-learning mode, ensures the accuracy of the dynamic baseline. Flexible and Efficient Detection 6 / 13

7 The program structure of the system's calculation engine adopts framework and plug-in modes. This ensures the structural flexibility and efficiency of the system. Each plug-in is matched with one or a couple of detection algorithms. Users can load the most suitable plug-ins based on their network and business characteristics. The NTA system also provides different preset plug-in templates for different typical users. For example, telecom carriers are not very concerned about application-layer attacks when it comes to the operation and maintenance of their backbone networks. Therefore, the corresponding detection plug-in does not have to be loaded in such a user environment. IPV4/V6 Dual-stack Analysis and Detection The curtain is gradually rising for the IPV6 age. The transition to IPV6 has already implemented. The carriers in China, a major force for commercial IPV6 implementation, have already entered the functional verification phrase. Large Internet enterprises have also set up their own laboratory platforms to test and pilot IPV6 for their various businesses demands. In this backdrop, NSFOCUS NTA totally supports IPV4/IPV6 dual-stack for traffic analysis and detection, to dispel relevant concerns of the users. Flexible and Diverse Reporting In order to present analysis and detection data in a well-rounded way, NSFOCUS NTA has developed a flexible reporting system which can generate varied reports by customized conditional filtering or combining. The system provides both real-time and historical reports, facilitating the users to check out real-time monitoring data and to track history data for forensics. It supports daily/weekly/monthly/yearly/custom reports which present the data in the forms of pie charts, bar graphs, run charts etc. as well as custom area charts and line graph graphics. When presenting network traffic status reports, the system can select different network objects on demand and customize the report generation 7 / 13

8 rules. This allows it to analyze and present traffic data from multiple dimensions and perspectives. For DDoS attacks, the system provides detailed information about the attack target, the number of attack alerts, attack traffic, traffic diversion and so forth. It can filter the data based on attack type, alert level, statistical objects, etc. The system also has a report integration function to help users combine the data they wish to analyze and generate a comprehensive report. This flexible and diverse reporting system fully caters to various needs of the operations staff. A Complete Solution To enable the Anti-DDoS systems to be manageable and operable to the telecom carriers and large data centers, NSFOCUS has released a 3-in-1 solution. This solution is composed of an anomaly traffic detection system (NSFOCUS NTA), an anomaly traffic cleaning system (NSFOCUS ADS), and a management and forensics system (NSFOCUS ADS M). Figure 3: NSFOCUS 3-in-1 Solution 8 / 13

9 NSFOCUS NTA is responsible for network monitoring and DDoS attack detection. When an attack occurs, the NTA system intelligently enables the coordination mechanism with NSFOCUS ADS and immediately notifies ADS of the event alert. Then, the ADS device activates the traffic diversion function, diverting suspicious traffic from the routers and switches to the ADS device. After finishing purging the DDoS attack traffic, ADS injects the "clean" traffic back into the network. NSFOCUS ADS M acts as the anti-ddos management center to perform a centralized monitoring and policy management for NTA and ADS devices deployed at different network points. Diverse reports are provided to display the whole attack traffic detection and cleaning process. ADS M also has a self-service system, allowing carriers to provide Anti-DDoS value-added services. Value-added Operational Benefits NSFOCUS NTA addresses domain-based (such as by router interface or IP/IP group) attack detection and traffic analysis capabilities to major customers and critical business with value-added operations. Coordinating with the ADS M products, the NTA system provides a specialized value-added service platform for operation/maintenance and self-service. Carriers are thereby able to provide value-added security defense services to large security-sensitive customers, such as security companies, jewelry stores, power companies, government agencies, hotels, IPTV providers, etc. Furthermore, large-scale customers can log onto the self-service portal of NSFOCUS ADS M to view their real-time network traffic, application protocol distribution, attack countermeasures, and other key business information. This platform gives large-scale customers more visibility to their system security, and also enhances their service quality. Easy Operation and Maintenance Plug and Play 9 / 13

10 NSFOCUS NTA has a smart configuration system which only requires simply PNPs to run. For example, configuring the IP address range to be monitored does not require manual input, instead the system would automatically select IP address ranges to be monitored from a list of candidate IP addresses extracted from routing tables. Similarly, the system automatically matches the routers' physical port numbers and names. In addition, it only needs simple configuration of the dynamic baseline auto-learning algorithm to generate parameters for various anomalies to be detected. The system provides a deployment toolkit that includes packet capture tools, PING, router interface direction judgment tools, detection range generation tools, etc., to further simplify the deployment process. High Performance, Convenient Operation and Maintenance By using high-performance hardware and optimized calculation engine algorithms, NSFOCUS NTA has a processing capacity of up to 80,000 xflows per second. The administrators only need a single NSFOCUS NTA device to monitor a telecom-grade high-bandwidth network environment. This greatly reduces the workload on operations and maintenance staff. Expert Operation and Maintenance Support NSFOCUS possesses years of field network security experience and a team of certified professionals. This allows it to provide rapid on-site defensive support as well as defense consultation, deployment, training and other services. Customers are benefited with enhanced defense systems and supports, as well as the establishment of a professional security team. At the same time, NSFOCUS NTA also has access to the NSFOCUS Security Cloud platform with which NSFOCUS experts provide 24/7 managed services and real-time attacks response. Specifications 10 / 13

11 Performance Specifications For more information: For more information about NSFOCUS products and services, please contact the NSFOCUS sales U.S. TEL: EMEA TEL: +44 (0) APAC TEL: Japan TEL: info-jp@nsfocus.com China TEL: info@nsfocus.com For more information visit NSFOCUS Website: Feature Specifications Features NTA NX3-2000E Platform OS 64 bit operation system Data Collection Netflow V5/V9 Format Netstream Cflow Sflow V4/V5 Support Sflow sampling rate self-adaption DDoS Attacks SYN-Flood Detection ACK-Flood UDP-Flood ICMP-Flood IGMP-Flood Protocol Null Flood TCP Flag Misuse TCP Flag Null HTTP Flood HTTPS Flood DNS Request Flood DNS Response Flood Land Flood SIP Flood Dark IP Private IP Abnormal Traffic Business Domain Inbound Attack Traffic Business Domainegion Outbound Attack Traffic IP Group Inbound Attack Traffic IP Group Outbound Attack Traffic Cluster Attack Traffic Alert Threshold Self-learning Custom Alert Performance Alert Router Memory andcpu Usages Abnormality Y Traffic Analysis Interface Bandwidth Abnormality Router Interface Traffic Analysis Router Interface Group traffic analysis IP Group Traffic Analysis Business Domain Traffic Y 11 / 13

12 Analysis AS Traffic Analysis, Support TOP 5 Third Party Interface Port and application Traffic Analysis SNMP GET/TRAP SYSLOG Flow Data Forwarding, Support TOP5 Null Route Single IP Null Route ADS Traffic Diversion Group Null Route Null Route Timeout Automatic Release Null Route Information Memo Sending Null Route to Different Routers based on Attack Traffic Volume Sending Diversion Notice To Different Routers based on Traffic Volume Y Y Safety Weak Password Inspection Support Password Dictionary Support Inspection Source IP Login Restrict Support Language English, Chinese, Japanese Support Flow Data Collection Flow Collection Capacity The Number of Monitored Routers The Number of Monitored Router Interface NTA NX3-2000E 80k Flows/s / 13

13 Hardware Specifications NTA NX3-2000E 1* RJ45 serial port, 2* USB2.0 Interface Weight Height Length Width Rack Device Mgt Power MTBF Operating Temperature Non-operating Temperature interface,2* RJ45 mgt. interface, 4*GE copper port, 4* GE SFP fiber port 16.6kg 88mm 512 mm 432 mm 2U HTTPS,CLI 220V,350W 60,000 hours 0~45 (32~113F) -20~65 About NSFOCUS NSFOCUS is a proven global leader in active perimeter network security for service providers, data centers, and corporations. It focuses on providing network security solutions including: carrier-grade Anti-DDoS System, Web Application Firewall, and Network Intrusion Prevention System - all designed to help customers secure their networks and corporate-critical information. More detailed information is available at 13 / 13

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview Faced with increasingly serious network threats and dramatically increased network traffic, carriers' backbone networks,

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Huawei Traffic Cleaning Solution

Huawei Traffic Cleaning Solution Huawei Traffic Cleaning Solution Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

Data Sheet. DPtech Anti-DDoS Series. Overview

Data Sheet. DPtech Anti-DDoS Series. Overview Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to

More information

NSFOCUS Anti-DDoS System White Paper

NSFOCUS Anti-DDoS System White Paper White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to

More information

NSFOCUS Remote Security Assessment System. Overview

NSFOCUS Remote Security Assessment System. Overview NSFOCUS Remote Security Assessment System Overview Network vulnerabilities are an increasingly common issue in today's highly complex computing environments. With exploit attacks appearing faster than

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

AntiDDoS1000 DDoS Protection Systems

AntiDDoS1000 DDoS Protection Systems AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

NSFOCUS Web Application Firewall

NSFOCUS Web Application Firewall NSFOCUS Web Application Firewall 1 / 9 Overview Customer Benefits Mitigate Data Leakage Risk Ensure Availability and QoS of Websites Close the Gap for PCI DSS Compliance Collaborative Security The NSFOCUS

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SecurityDAM On-demand, Cloud-based DDoS Mitigation SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS

More information

TDC s perspective on DDoS threats

TDC s perspective on DDoS threats TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)

More information

SOLARWINDS NETWORK PERFORMANCE MONITOR

SOLARWINDS NETWORK PERFORMANCE MONITOR DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

USG6300 Next-Generation Firewall

USG6300 Next-Generation Firewall USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Eudemon8000E Anti-DDoS SPU

Eudemon8000E Anti-DDoS SPU Today's network attack varieties and intensities grow exponentially. Distributed Denial of Service (DDoS) attacks in 2010 swallowed 100G bandwidths, experiencing a 1000% increase over 2005. The diversified

More information

Arbor s Solution for ISP

Arbor s Solution for ISP Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

First Line of Defense

First Line of Defense First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Cheap and efficient anti-ddos solution

Cheap and efficient anti-ddos solution Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

NSFOCUS Web Vulnerability Scanning System

NSFOCUS Web Vulnerability Scanning System NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia Frank.xialiang@huawei.com Tianfu Fu Futianfu@huawei.com Cheng He Danping He hecheng@huawei.com

More information

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc. TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

NSFOCUS Web Application Firewall White Paper

NSFOCUS Web Application Firewall White Paper White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January 2009. Cristian Velciov. ceo@andrisoft.com (+40) 721 250246

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January 2009. Cristian Velciov. ceo@andrisoft.com (+40) 721 250246 Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard January 2009 Cristian Velciov ceo@andrisoft.com (+40) 721 250246 Andrisoft Solution WANGuard Platform is an enterprise-grade Linux-based software

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

First Line of Defense

First Line of Defense First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive

More information

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with

More information

Cisco IPS 4200 Series Sensors

Cisco IPS 4200 Series Sensors Cisco IPS 4200 Series Sensors In today s busy network environments, business continuity relies on effective network intrusion prevention to stop malicious attacks, worms, and application abuse before they

More information

Take the NetFlow Challenge!

Take the NetFlow Challenge! TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about

More information

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

AntiDDoS8000 DDoS Protection Systems

AntiDDoS8000 DDoS Protection Systems AntiDDoS8000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

Analysis of a DDoS Attack

Analysis of a DDoS Attack Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and

More information

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

Securing data centres: How we are positioned as your ISP provider to prevent online attacks.

Securing data centres: How we are positioned as your ISP provider to prevent online attacks. Securing data centres: How we are positioned as your ISP provider to prevent online attacks. Executive Summary In today s technologically-demanding world, an organisation that experiences any internet

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

DDoS Protection on the Security Gateway

DDoS Protection on the Security Gateway DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

NetFlow Tips and Tricks

NetFlow Tips and Tricks NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

Elevating Data Center Performance Management

Elevating Data Center Performance Management Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

NSFOCUS Anti-DDoS System White Paper

NSFOCUS Anti-DDoS System White Paper White Paper NSFOCUS Anti-DDoS System White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect to

More information

Distributed Denial of Service protection

Distributed Denial of Service protection Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

Are you safe from DDoS attacks?

Are you safe from DDoS attacks? www.harppddos.com HARPP DDoS Mitigator Appliances and DDoS CERT The HARPP DDoS Mitigator s unique DDI (Deep DDoS Inspection) and AVS (Attack Visualization System) provide unparalleled protection of your

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks

More information

DDoS Attack and Its Defense

DDoS Attack and Its Defense DDoS Attack and Its Defense 1 DDoS attacks are weapons of mass disruption. The DDoS attack has long been a big main threat to security of the Internet. It is not expensive and easy to be used for achieving

More information

Pravail 2.0 Technical Overview. Exclusive Networks

Pravail 2.0 Technical Overview. Exclusive Networks Pravail 2.0 Technical Overview Exclusive Networks Pravail Features and Benefits Arbor Pravail APS is the a CPE-based security appliance focused on stopping availability threats Arbor Pravail APS Arbor

More information

Cisco IronPort X1070 Email Security System

Cisco IronPort X1070 Email Security System Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The

More information

DPtech ADX Application Delivery Platform Series

DPtech ADX Application Delivery Platform Series Data Sheet DPtech ADX Series DPtech ADX Application Delivery Platform Series Overview IT requirements for service capability can be summarized as "acceleration", "security" and "reliability". The contradiction

More information

Securing Business-Critical Network and Application Infrastructure NET&COM Feb 2006 Gopala Tumuluri Foundry Networks www.foundrynet.

Securing Business-Critical Network and Application Infrastructure NET&COM Feb 2006 Gopala Tumuluri Foundry Networks www.foundrynet. Securing BusinessCritical Network and Application Infrastructure NET&COM Feb 2006 Gopala Tumuluri Foundry Networks www.foundrynet.com Agenda Security Market and Solutions Overview New NetworkBased Security

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

Gold Support for NetFlow Tracker

Gold Support for NetFlow Tracker Visual Network Systems Gold Support helps you fully leverage your NetFlow Tracker investment and keep it current with regular software upgrades and comprehensive technical assistance. Gold Support for

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Cisco IPS Manager Express

Cisco IPS Manager Express Cisco IPS Manager Express Product Overview Intrusion prevention systems (IPSs) are critical to protecting your network and assets against worms, Trojans, and other malicious attacks. Cisco IPS Manager

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD. HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to

More information

Software. Quidview 56 CAMS 57. XLog NTAS 58

Software. Quidview 56 CAMS 57. XLog NTAS 58 Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information