Pravail 2.0 Technical Overview. Exclusive Networks



Similar documents
Arbor s Solution for ISP

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Security Solutions for the New Threads

INSERT COMPANY LOGO HERE

Arbor Networks DDoS Solutions. Alex Lopez

TDC s perspective on DDoS threats

How Cisco IT Protects Against Distributed Denial of Service Attacks

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Being Ready to Face DDoS Challenge. Vodafone Power to you. DDoS

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

How To Block A Ddos Attack On A Network With A Firewall

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

A Layperson s Guide To DoS Attacks

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Networking for Caribbean Development

Complete Protection against Evolving DDoS Threats

Arbor Networks Enables DDoS Protection for Hosting and Cloud Service Providers

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

RETHINK SECURITY FOR UNKNOWN ATTACKS

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Where every interaction matters.

DDoS Protection on the Security Gateway

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

IndusGuard Web Application Firewall Test Drive User Registration

Firewall Firewall August, 2003

PROFESSIONAL SECURITY SYSTEMS

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Chapter 11 Cloud Application Development

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Firewall Testing Methodology W H I T E P A P E R

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Security. 26 November 2012 Vol.18 No11

NSFOCUS Web Application Firewall White Paper

Understanding and Defending Against the Modern DDoS Threat

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

How To Protect A Dns Authority Server From A Flood Attack

Denial of Service Attacks, What They are and How to Combat Them

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

FortiDDos Size isn t everything

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

CALNET 3 Category 7 Network Based Management Security. Table of Contents

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Zscaler Internet Security Frequently Asked Questions

Application DDoS Mitigation

Fortigate Features & Demo

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

/ Staminus Communications

Architecture Overview

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

DDoS Protection Technology White Paper

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

DDoS Overview and Incident Response Guide. July 2014

INTRODUCTION TO FIREWALL SECURITY

Technical Series. A Prolexic White Paper. 12 Questions to Ask a DDoS Mitigation Provider

How To Sell Security Products To A Network Security Company

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

Why Is DDoS Prevention a Challenge?

Unified Threat Management, Managed Security, and the Cloud Services Model

Importance of Web Application Firewall Technology for Protecting Web-based Resources

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Protection Solution. Strategic White Paper

SecurityDAM On-demand, Cloud-based DDoS Mitigation

10 Things Every Web Application Firewall Should Provide Share this ebook

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Transcription:

Pravail 2.0 Technical Overview Exclusive Networks

Pravail Features and Benefits Arbor Pravail APS is the a CPE-based security appliance focused on stopping availability threats Arbor Pravail APS Arbor Pravail APS Firewall Firewall Load Balancer Load Balancer Public Web Servers Corporate Servers DNS Servers SMTP Servers Data Center Network Out-of-the-Box Protection Immediate protection from threats with more control Advanced DDoS Blocking Introduces new packet-based DDoS detection & mitigation Botnet Threat Mitigation Block dynamic botnet-based DDoS attacks with AIF Simple Deployment Models Easily fits IDC deployment including inline Cloud Signaling Stop volumetric DDoS attacks by signaling upstream MSSPs Page 2 - Company Confidential

ATLAS Intelligence Feed (AIF) Continuously updated feed of botnet threats to service availability Layer 7 fingerprints focused on inbound botnet attack traffic Includes ASERT threat level and confidence assessment Inbound HTTP Botnet Attacks ASERT Severity Levels IP Location Data ASERT tracking hundreds individual botnets in the wild More added nearly every day Page 3 - Company Confidential

Cloud Signaling Utilize Cloud Signaling Coalition members for volumetric protection Gain Volumetric & Application protection from a single console! Subscriber Network Arbor Peakflow SP / TMS-based DDoS Service Data Center Network Arbor Pravail APS Firewall / IPS / WAF Public Facing Servers Subscriber Network Internet Service Provider 1. Service Operating Normally 2. Attack Begins and Initially Blocked by Pravail 3. Attack Grows Exceeding Bandwidth 4. Cloud Signal Launched 5. Customer Fully Protected! Cloud Signaling Status Page 4 - Company Confidential

Pravail 2.0 Availability Protection System Pravail APS FW, IPS, Server Availability Protection System Inline layer-2 deployment (bump in the wire) In front of Firewall, IPS, WAF, load-balancer, etc Including DPI (layer 7) inspection of traffic AIF signatures for detecting complex elements Detect and protect against attacks at customer edge Page 5 - Company Confidential

The Failure of Existing Security Devices Today s CPE-based security devices focus on integrity & confidentiality but not on availability Information Security Triangle Firewalls Product Family Triangle Benefit Intrusion Prevention System Integrity / Confidentiality Integrity Enforce network policy to prevent unauthorized access to data Block break-in attempts causing data theft Firewalls and IPS device do not solve the DDoS problem because they (1) are optimized for other security problems, (2) can t detect or stop distributed attacks, and (3) can not integrate with incloud security solutions. IPS and firewall vendors will not win the arms race against hackers. Stateful device will always be threatened by state-exhausting attacks. Page 6 - Company Confidential DATA CENTER IPS Load Balancer Firewalls and IPS devices are part of the DDoS problem!

What happens to the traffic? Each client is checked by multiple intelligent filters Generic Flood Attacks Protocol Attacks TCP Stack Attacks Generic Application Attacks Intelligent BOTNET Attacks Static & Dynamic Packet Filters Malformed & Behavior Filters Client Verification Filters Application Level Attack Filters BOTNET Attack Filters (AIF-Signatures) Page 7 - Company Confidential

Intelligent Filters some Examples Page 8 - Company Confidential

Welcome to Pravail! Page 9 - Company Confidential

Summary - Page Overview: Protection Group(Group of Servers /Services) Interface Traffic Total Traffic Passed Traffic Blocked Traffic Protection Group Cloud Signaling Status System Status Change Log Page 10 - Company Confidential

Protection Group WebServer example - I A Protection Group is a individual set of IPs of the same Server/Service Type. E.g. WebServer Details: Total Traffic Passed Traffic Blocked Traffic Blocked Hosts Details per Attack Prevention Type Options: Time Period BPS/PPS PDF / EMAIL Page 11 - Company Confidential

Protection Group II URL statistics Domain statistics Option to easily BLOCK Domains / URLs Page 12 - Company Confidential

Protection Group III IP Location statistics Option to easily BLOCK attacking countries Page 13 - Company Confidential

Protection Group IV Protocol statistics Service statistics Page 14 - Company Confidential

Protection Group V Blocked Hosts statistics Option to unblock hosts Page 15 - Company Confidential

Summary Mode, Protection Level, Cloud Help Mode: Active Inactive Protection Level: Low Medium High Cloud Signaling Status Automatic Manually Page 16 - Company Confidential

Prevention Types Details I/VI Page 17 - Company Confidential

Prevention Types Details II/VI Page 18 - Company Confidential

Prevention Types Details III/VI Page 19 - Company Confidential

Prevention Types Details IV/VI Page 20 - Company Confidential

Prevention Types Details V/VI Page 21 - Company Confidential

Prevention Types Details VI/VI Page 22 - Company Confidential

Pravail 2.0 APS - Cloud Signaling Pravail APS FW, IPS, Server Pravail stand-alone inline protection Detects and defends attacks at customer edge Can ask for help to protect from volumetric attacks larger than uplinks mitigation must be performed upstream Page 23 - Company Confidential

ISP - Cloud Signaling as a Managed Service ISP uses Peakflow SP and TMS products in the cloud Peakflow SP and TMS ISP DDoS protection Block volumetric attacks before they reach the customer infrastructure Cloud Signaling DATA CENTER IPS Load Balancer Pravail APS CPE-based DDoS protection Stop DDoS Attacks on the customer premise Trigger Cloud DDoS protection for volumetric attacks with Cloud Signaling Page 24 - Company Confidential

Thank You