Network Protection Solution. Toni Ala-Mutka.
|
|
|
- Belinda Holmes
- 10 years ago
- Views:
Transcription
1 Network Protection Solution Toni Ala-Mutka
2 New Offering Solution Products Synergy Enhances Service Gateway solution with security services: Based on Esphion s netdeflect TM Automated DDoS detection and prevention system System to identify/manage infected subscribers (Zombies) New detection probe NetDeflecter Will also be implemented on Service Gateway blade New centralized threat processing server NetDeflecter provides detection NetEnforcer provides mitigation 2 4 June 2010
3 Addressable Market Targets service provider market Covering security needs Network protection Attacks that risk service availability Propagation of worms Attacks on subscribers and high value customers Mitigation by filtering/limiting bad traffic Infected subscribers Subscriber-generating attacks, SPAM etc. Mitigation by filtering/limiting or isolating to captive portal for cleaning 3 4 June 2010
4 Benefits to Customers Risk Management Reduce network service disruption/outages Prevent blacklisting and brand damage Opex/Capex Savings International bandwidth Infrastructure upgrade MTA, router, peering links Call center complaints Opportunity for Value-Added Services New revenues from protection services 4 4 June 2010
5 Deployment and System Components NetXplorer NetDeflecter Controller Peering Partners NetDeflecter probe Subscribers xdsl NetEnforcer Core IP Network NetEnforcer NetEnforcer MAN Enterprise Clients NetDeflecter probe NetDeflecter probe NetDeflecter probe 5 4 June 2010 IDC
6 System Architecture NetDeflecter Controller Presentation and Configuration (Web GUI / CLI) Notification subsystem ( , syslog, SNMP trap, SOAP/XML) Anomaly Event logging (SQL db) Operator NetXplorer Signature Identification and Presentation (Currently NBAD only. Snort,/Cisco/Fortinet) Packet sample NetDeflecter Probe Behavioural modelling and Detection NBAD HBAD TCP/IP header packet parsing NetEnforcer / Service Gateway Network 4xGE 2x10GE 6 4 June 2010
7 DDoS Attack Starts Alert Operator ISP Victim Peering Partners Peering Partners Peering Partners 7 4 June 2010
8 Issue Command to Block/Rate-Limit Operator Victim Command NetXplorer ISP Peering Partners Peering Partners Peering Partners 8 4 June 2010
9 Case Study: DDoS Network Protection Leading Asian ISP >1million BB subscribers 12 x GE probes and 1 x Controller Deployed on GE peering links and subscriber links Use router ACLs to mitigate DDoS DDoS attacks affected many customers Difficulty identifying and tracking down attacks Too many false alarms from IDS Esphion didn t require flow from routers Low false positive rate, high true positive rate Enabled unprecedented 10 minute (internal) SLA 9 4 June 2010
10 Case Study: Isolating Zombie Subscribers Leading Asian ISP > 500K BB subscribers 4 x 10GE probes and 1 x Controller Deployed on 10GE aggregation links RedBack BRAS to quarantine subscribers Problems with subscriber zombies Esphion was the only available 10GE solution False alarms from IDS Antivirus gateways were unsuitable 10 4 June 2010
11 Customer Success Stories Customer Before After Hong Kong Service outage, degradation and collateral damage to customer network services. Difficulty identifying and isolating DDoS attacks quickly and efficiently Unprecedented SLAs for mitigating attacks. Pre-emptive blocking, reduced frequency and duration of outages Australia Loss of network services to key hosting clients during DDoS attacks. Previously difficult to identify and isolate DDoS attacks quickly Saved A$750K/year in SLA penalties and network engineering costs Thailand SPAM, DOS and other zombie activity leading to loss of services, performance degrade, brand damage, excessive international Internet costs, OPEX costs Automatic identification and management of undesirable subscriber network behavior 11 4 June 2010
12 Esphion and DDoS Competition Esphion Today Main DDoS Competition High performance Low network disruption High reliability Low false positives High quality signatures 12 4 June 2010
13 Competitive Advantage Esphion HIGH PERFORMANCE 10GE in production today. Full line rate 4GE. LOW NETWORK DISRUPTION Does NOT require flows from routers. HIGH RELIABILITY Independent of router no CPU loading. Speed improves with attack magnitude. LOW FALSE POSITIVES <5% false alarms >95% rate true positives HIGH QUALITY SIGNATURES Produced in real-time on n/w. Very accurate June 2010 Arbor, Cisco, IPSs Arbor/Cisco don have a DDoS solution for 10GE networks! IPS s - lack performance required for SP networks. Arbor/Cisco - require flows output from routers for detection. Off and on-ramp cleansing requires significant implementation. Cisco - is limited for heterogeneous networks. Arbor/Cisco number of flows can increase with attack size. Collector overload, network congestion, router failure. IPS s latency and dropped-packets increase during heavy attacks Arbor - too many false positives and missed legitimate attacks Cisco - detection is not traditionally used with Cisco mitigation. IPS s - suffer from too many false alarms on SP networks Arbor/Cisco filters/fingerprints lack accuracy and will block both good and bad traffic. IPS s new signatures takes days and weeks to publish and lack accuracy. Inadequate for new or Zero Day attacks.
14 Integration with Allot Available Now External probe Manual transfer of Esphion rule to NetXplorer/NetEnforcer policy Roadmap Automated transfer of Esphion rule (under operator control) Detection blade inside Service Gateway Integration of management systems
15 Target Customers New and current SPs using Allot AC-1000, AC-2500 or SG-Omega customers Tier 1 and Tier 2 SPs with more than 100,000 subscribers or with significant number of business customers SPs looking for DPI and DDoS capabilities Pure DDoS solution (detect and mitigate) Subscriber SPAM, subscriber zombies DNS attacks SPs offering managed services Online gaming, banks/finance, content portals, government SPs with internal/external SLA problems due to DDoS 15 4 June 2010
16 Sales Process Identify telco/isp needs Experiencing/recent PAIN? Planning new products or services? PROBLEMS driving upgrade/expansion? Presentation focus points Proof of concept 1-2 month high-touch fine-tuned exercise Simulate attacks if they don t occur naturally Objections/competitors 16 4 June 2010
17 Identify Needs Experiencing/recent PAIN? Widespread high profile outages High profile victims Planning new PRODUCTS or services? DDoS protection services Tiered subscriber services PROBLEMS driving upgrade/expansion? International bandwidth costs Call center Opex Capex 17 4 June 2010
18 Presentation Points Focus on needs Namely Reduce Opex Manage/delay Capex Manage risk Increase revenue from value added services Refer to Benefits slide 18 4 June 2010
19 Proof of Concept (POC) Identify ideal POC location Installation and tuning: 1-2 days Product test/familiarization time: 1-2 months Assurances of stability See real-life attacks Simulate attacks if not naturally occurring Demonstrate mitigation with NetEnforcer Fine-tune for low alarm rate and high reliability High contact with stakeholders 19 4 June 2010
20 Typical Objections Company stability/longevity Technology credibility speed, accuracy, 10GE Scalability Integrated solution for detection and mitigation After-sales in-country support GUI user friendliness We already use X We are a Cisco shop 20 4 June 2010
21 Questions and Answers
22 BACKUP SLIDES 22 4 June 2010
23 Full Packet Attack Signature 23 4 June 2010
24 Esphion Filter Commands 24 4 June 2010
25 Alert Is Sent 25 4 June 2010
26 Attack Details 26 4 June 2010
27 About Esphion Pronounced [es-fee-un] Launched 2002, VC funded, R&D HQ in Auckland, New Zealand Primarily focused on APAC Customers in Australia, NZ, China, Hong Kong, Thailand, JV in Japan Mainly focus on large, mature, mission-critical Internet businesses and IP networks Telcos, ISPs, IDCs, ICPs - also enterprise success stories! 27 4 June 2010
28 Typical DDoS Resolution Process Typically hours elapse. Can be days if repeated sporadically for short periods! 20 mins 30 minutes minimum if lucky! 10 minutes 1 2 Denial of Service Attack/s are launched Customer complaint to helpdesk about poor network performance. Helpdesk performs preliminary investigation and troubleshooting. 3 Helpdesk escalates to 2 nd /3 rd tier support. 2 nd /3 rd tier begin their own troubleshooting. For example, enabling IP accounting (flows), connecting network analyzer to capture packets, checking logs. 4 Engineer forms a decision. Approval. Elapsed time 5 Mitigation applied ACL, null route, disconnect, call upstream, call offending customer Customer suffers for hours Perhaps over many days 1 hour from the call before resolution. If they are lucky! 28 4 June 2010
29 Process Enabled by Esphion Detect and alert within 1 minute 3 Mitigation applied Elapsed time 2 1 Helpdesk receives pre-qualified and quantified alarm. 2 nd tier quickly validates details and response is accelerated. Denial of Service Attack/s are launched Attack mitigated in minutes - customer is unaware 29 4 June 2010
30 Problems with Current Solutions Manual approaches (Sniffer, flow /log analysis) are reactive and too SLOW and INCONSISTENT to meet internal/external SLAs Flow-based detection is UNRELIABLE during attacks due to router deprioritization of flow generation, flow congestion on network and overload of flow collector IDS/IPS packet signature detection approaches often fail to detect ad hoc attacks such as DDoS and Zero Day worms Stateful/application level systems are not intended for network level flooding attacks introducing potential choke point or point of failure 30 4 June 2010
31 DDoS Protection with NetDeflecter + NetEnforcer DDoS/Worm attack Internet 1 NetEnforcer 3 Esphion Agent 2 Esphion Controller Core IP network 1. Detect DoS/DDoS/Zero Day worm 2. Quick creation of detailed packet filter to apply on NetEnforcer 3. Rate-limits or blocks IP and/or protocol+port to limit/block impact Residential 31 4 June 2010
32 Isolate Subscriber Zombies 1. Detect zombie activity - worm/dos/spam 2. Esphion triggers filter/rate-limit on NetEnforcer applies policy to IP address or IP range 3. Undesirable traffic is blocked or rate-limited Internet Zombie activity DSL network 1 3 NetEnforcer Core IP Network Residential BRAS Esphion Agent Esphion Controller June 2010
33 Data Sheet 33 4 June 2010
34 Performance Specifications 34 4 June 2010
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Allot Security Solution Suite
Allot Security Solution Suite 09/2014 2014 Allot Communications Ltd. All rights reserved. Specifications are subject to change without notice. Allot Communications, Sigma and NetEnforcer and the Allot
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
Distributed Denial of Service protection
Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
Putting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Monitoring Log Management and Alerting
Monitoring Log Management and Alerting Services Description February 2009 1 / 24 Contents Monitoring Log Management and Alerting... 1 1. Centralized Management... 3 1.1. Centralized management :... 3 1.2.
DEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Data Sheet. DPtech Anti-DDoS Series. Overview
Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to
CaptIO Policy-Based Security Device
The Leader in Denial of Service Prevention CaptIO Policy-Based Security Device The CaptIO Policy-Based Security Device automatically detects, identifies, validates, and stops Denial of Service attacks
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION
AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION Overview Distributed Denial of Service (DDoS) attacks saturate target networks with service requests that consume the capacity
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between
Der Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities
Service Provider Solutions Enabling Clean Pipes Capabilities June 2005 1 Service Provider Security Highlights Security is the heart of internetworking s future A secure infrastructure forms the foundation
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation
Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation Bernhard Plattner, ETH ZürichZ Joint work with Matthias Bossardt and Thomas Dübendorfer TIK ETH Zürich UK ProgNet Workshop, 1st December
Kaspersky DDoS Prevention
Kaspersky DDoS Prevention The rapid development of the online services industry and remote customer service systems forces entrepreneurs to consider how they can protect and ensure access to their resources.
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Log Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
AntiDDoS1000 DDoS Protection Systems
AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Secure Pipes with Network Security Technology Showcase
Technology Showcase Contents Executive Summary... 1 Introduction to Secure Pipes... 2 Network Security... 3 Clean and Secure Pipes From Within the CSP Network... 3 Behavioral Threat Detection... 4 DDoS
JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE
WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Technical Series. A Prolexic White Paper. 12 Questions to Ask a DDoS Mitigation Provider
A Prolexic White Paper 12 Questions to Ask a DDoS Mitigation Provider Introduction Distributed Denial of Service (DDoS) attacks continue to make global headlines, but an important facet of each incident
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
APPLICATION PERFORMANCE MONITORING
APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
THE VALUE OF NETWORK MONITORING
THE VALUE OF NETWORK MONITORING Why It s Essential to Know Your Network Sponsored by Ipswitch I. Introduction All companies are different, but the value of their network to their business varies little.
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com To the Management of NTT America, Inc.: Report of Independent Auditors We have
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Security. 26 November 2012 Vol.18 No11
Security 26 November 2012 Vol.18 No11 DDoS attacks: The impact DDoS experts explain how to try to prevent DDoS attacks and what the impact is of an attack on an enterprise The cost of a Distributed Denial
State of California California Department of Technology Statewide Technology Procurement Division
A PROPOSAL TO State of California California Department of Technology Statewide Technology Procurement Division for Best and Final Offer Resubmission Volume 2 Category 7 Network Based Managed Security
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
