SlideShare uma empresa Scribd logo
1 de 18
Radware’s New Attack Mitigation
Platform (DefensePro x4420)
Deivid Toledo
deivid.Toledo@wtrservices.com.br
WTR Services
25 de Setembro 2015
Current Trends
The Rise of the Continuous Attack
Longer, larger and more sophisticated
attacks. Constant attacks on the rise.
In previous years - attacks that were considered
“constant” never exceeded 6%
In 2014 - 19% were considered “constant”
Attack size also increases – 1 of 7 attacks larger
than 10G in 2014.
%
5%
10%
15%
20%
25%
30%
35%
40%
Less than a day 1 hour-1 day 1 day-1 week over a week Constantly
2011 2012 2013 2014
In 2014, 19% of attacks
were considered “constant”
No One is Immune – Unexpected Targets
Threats in new industries, organizational
sizes and technology deployments
Healthcare and Education – unexpected targets
now at risk
Gaming, Hosting and ISP companies – increased
likelihood
2014 Change from 2013
4
Reflective Attacks – the Largest DDoS Headache
Attacks evenly split across network and application
layers
Web-based attacks remain the single most
common attack vector
– 1 in every 4 are HTTPS
Increase reflective attacks cause UDP attacks to
increase
– From 7% in 2013 to 16% in 2014
Reflective attacks represent 2014’s single largest
DDoS “headache”
10%
16%
6%
18%
Network 51%
TCP- Other UDP
IPv6 1% TCP-SYN Flood
ICMP
9%
23%
16%
Application 49%
VoIP 1% Web (HTTP/HTTPS)
SMTP DNS
Complexity of Attacks Continues to Grow
Multi-vector attacks target all layers of the infrastructure
IPS/IDS
“Low & Slow” DoS
attacks (e.g.Sockstress)
Large volume network
flood attacks
Syn
Floods
Network
Scan
HTTP Floods
SSL Floods App Misuse
Brute Force
Cloud DDoS protection DoS protection Behavioral analysis IPS WAF SSL protection
Internet Pipe Firewall Load Balancer/ADC Server Under Attack SQL Server
6
The Need: High Performance with Comprehensive Protection
Protection from both sophisticated and volumetric attacks.
Carriers and cloud providers
- Need to support a growing number of customers with increased complexity and capacity.
- Require high end devices that can handle growth and scale (mitigation, bandwidth, complexity
and number of served customers).
Current competitor offerings today require to chose between high performance and
attack mitigation coverage/quality
7
Platform Offering
DefensePro x4420
Radware’s New Attack Mitigation Platform
Widest range of protections at high mitigation capacity, including UDP reflection attacks,
fragmented and out-of-stack floods
Up to 300Gbps throughput inspection while allowing customers to enjoy the widest range of
simultaneous cyber-attack protection in the industry
230M PPS anti-DDoS along with best-in-class DNS, SIP, SMTP, HTTPS, and other application
protections
Commercial grade out-of-the-box compliance and customer tenancy managing over 1,000
policies in a secure Role-Based Access control format
First dedicated attack mitigation platform to offer 100G interfaces
No compromise: High performance + High mitigation capacity + Widest protection
9
DefensePro x4420 - Technical Highlights
Total throughput up to 300G
- Legit traffic throughput up to 160G
- BW license 50G/100G/160G
High port density (with any port type support)
- 4x100G (QSFP28)
- 4 x 40GbE (QSFP+)
- 20 x 1/10GbE (SFP+)
New ‘Performance’ mode - up to 230M Attack
PPS (supports SYN protection, packet anomaly,
BL/WL)
Up to 1,000 active policies
Space conservative - only 2U of rack space
DefensePro x4420
DefensePro Layers of Defense
Behavioral-based protections
DME
DDoS Mitigation Engine
(230M PPS)
L7 Regex Acceleration
ASIC
Multi Purpose Multi Cores CPU’s
& Reputation Engine
Hardware Architecture – Tailored for Attack Mitigation
11
Multi Tenancies Support
Separate processing capabilities per tenant
Role based access control for management permissions per policy
Each tenant can view and monitor only the resources that are relevant for them
Personalized, per tenant, historical reporting, dashboards and event management
12
DefensePro x4420 - Summary
Highest rate mitigation with widest coverage - up to 230M PPS
Any port connectivity - including 100G ports
Designed for multi tenancy (MSSP/Carriers/Cloud) - Up to 1000 policies
New scalable SW Architecture
Compact form factor – 2U only
Technical Specs
DefensePro x4420 Technical Specification
Features DefensePro x4420
DefensePro Model DP model 504420 – 50 Gbps
DP model 1004420 – 100 Gbps
DP model 1604420 – 160 Gbps
Network Location Core Network
Hardware Platform OnDemand Switch HT
Performance
Capacity 300 Gbps
Max Legit Throughput 160 Gbps
Max Concurrent Sessions 25,000,000
Maximum DDoS Flood Attack
Prevention Rate
230,000,000 packets per second
Latency 60 micro seconds
Real time signatures Detect and protect attacks in less than 18 seconds
Physical Ports
Traffic Ports 4x 100 GbE QSFP28
4 x 40 GbE QSFP+
20 x 10GbE SFP+
Management Ports 2 * 1 Gbe Copper, out of band
RS-232 RJ-45 Serial Connection
16
DefensePro x4420 Technical Specification – Cont.
Features DefensePro x4420
Operation Mode
Network Operation Transparent L2 Forwarding, IP Forwarding
Deployment Modes In-line; SPAN Port Monitoring; local out-of-path; Out-of-path mitigation (scrubbing center
solution)
Tunneling protocols support VLAN Tagging, L2TP, MPLS, GRE, GTP, IPinIP
IPv6 Full IPv6 support for detection and mitigation
Policy Action Block & Report, Report Only
Block Actions Drop packet, reset (source, destination, both), suspend (source, src port, destination, dest
port or any combination), Challenge-Response for TCP, HTTP and DNS suspicious traffic
High Availability
Dual Power Supply Yes
Advanced internal overload
mechanism
Yes
High Availability deployment -
Active-Passive
Yes
17
DefensePro x4420 Technical Specification – Cont.
Features DefensePro x4420
Physical
Dimensions (W x D x H) mm 2U: 424x600x88 mm
EIA Rack or Standalone: 482 mm (19 in)
Weight (kg, lb) 18.7Kg
Power Supply Auto-range supply:
AC: 100-240 V, 47-63 Hz
DC: -36~-72 V
Dual power supply (AC/DC)
Power Consumption 890W
Heat Dissipation (BTU/h) 2930 BTU/hr
Operating Temperature 0-40°C (32-104°F)
Humidity (non-condensing) Humidity: 5% to 95% non-condensing
Certifications Safety: CE LVD( EN 60950-1), CB - IEC 60950-1, CCC, cTUVus, C-Tick
EMC: CE EMC (EU directive 2004/108/EC), FCC Part 15B Class A, ICES-003, VCCI
RoHS Compliant (EU directive 2011/65/EC)
18

Mais conteúdo relacionado

Mais procurados

2021 二月 Kasten K10 介紹與概觀
2021 二月 Kasten K10 介紹與概觀2021 二月 Kasten K10 介紹與概觀
2021 二月 Kasten K10 介紹與概觀Wales Chen
 
Alphorm.com Formation FortiManager : Installation et configuration
Alphorm.com Formation FortiManager : Installation et configurationAlphorm.com Formation FortiManager : Installation et configuration
Alphorm.com Formation FortiManager : Installation et configurationAlphorm
 
Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm
 
Mise en place d’un serveur radius
Mise en place d’un serveur radiusMise en place d’un serveur radius
Mise en place d’un serveur radiusJeff Hermann Ela Aba
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Migration d’une solution de sécurité réseau vers la solution Fortigate
Migration d’une solution de sécurité réseau vers la solution Fortigate  Migration d’une solution de sécurité réseau vers la solution Fortigate
Migration d’une solution de sécurité réseau vers la solution Fortigate Youcef Aliarous
 
Alphorm.com : Formation Active directory 2008 R2 (70-640)
Alphorm.com : Formation Active directory 2008 R2 (70-640)Alphorm.com : Formation Active directory 2008 R2 (70-640)
Alphorm.com : Formation Active directory 2008 R2 (70-640)Alphorm
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureCisco Canada
 
cours-supcom-virt.pptx
cours-supcom-virt.pptxcours-supcom-virt.pptx
cours-supcom-virt.pptxManellansari
 

Mais procurados (20)

Forti web
Forti webForti web
Forti web
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
2021 二月 Kasten K10 介紹與概觀
2021 二月 Kasten K10 介紹與概觀2021 二月 Kasten K10 介紹與概觀
2021 二月 Kasten K10 介紹與概觀
 
Alphorm.com Formation FortiManager : Installation et configuration
Alphorm.com Formation FortiManager : Installation et configurationAlphorm.com Formation FortiManager : Installation et configuration
Alphorm.com Formation FortiManager : Installation et configuration
 
Fortinet
FortinetFortinet
Fortinet
 
Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016
 
Mise en place d’un serveur radius
Mise en place d’un serveur radiusMise en place d’un serveur radius
Mise en place d’un serveur radius
 
VPN
VPNVPN
VPN
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Migration d’une solution de sécurité réseau vers la solution Fortigate
Migration d’une solution de sécurité réseau vers la solution Fortigate  Migration d’une solution de sécurité réseau vers la solution Fortigate
Migration d’une solution de sécurité réseau vers la solution Fortigate
 
SD WAN
SD WANSD WAN
SD WAN
 
Alphorm.com : Formation Active directory 2008 R2 (70-640)
Alphorm.com : Formation Active directory 2008 R2 (70-640)Alphorm.com : Formation Active directory 2008 R2 (70-640)
Alphorm.com : Formation Active directory 2008 R2 (70-640)
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 Architecture
 
Nagios
NagiosNagios
Nagios
 
cours-supcom-virt.pptx
cours-supcom-virt.pptxcours-supcom-virt.pptx
cours-supcom-virt.pptx
 

Destaque

Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
 
Radware Solutions for MSSPs
Radware Solutions for MSSPsRadware Solutions for MSSPs
Radware Solutions for MSSPsRadware
 
Business Continuity Management - Que se vislumbra para 2016 ¿?
Business Continuity Management - Que se vislumbra para 2016 ¿?Business Continuity Management - Que se vislumbra para 2016 ¿?
Business Continuity Management - Que se vislumbra para 2016 ¿?Carlos R.
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security ArchitectureCisco Canada
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 

Destaque (7)

Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
Radware Solutions for MSSPs
Radware Solutions for MSSPsRadware Solutions for MSSPs
Radware Solutions for MSSPs
 
Business Continuity Management - Que se vislumbra para 2016 ¿?
Business Continuity Management - Que se vislumbra para 2016 ¿?Business Continuity Management - Que se vislumbra para 2016 ¿?
Business Continuity Management - Que se vislumbra para 2016 ¿?
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 

Semelhante a DDoS Mitigation - DefensePro - RADWARE

DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersCorero Network Security
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...Sergiy Pitel
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersStephanie Weagle
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPROIDEA
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsVertexMon VertexMon
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100DHoai Duyen
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSCristian Garcia G.
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREDeivid Toledo
 
Fg One Sho 1109 R4
Fg One Sho 1109 R4Fg One Sho 1109 R4
Fg One Sho 1109 R4fmesmeriii
 

Semelhante a DDoS Mitigation - DefensePro - RADWARE (20)

DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
DDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customersDDoS Defense for the Hosting Provider - Protection for you and your customers
DDoS Defense for the Hosting Provider - Protection for you and your customers
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
Fg One Sho 1109 R4
Fg One Sho 1109 R4Fg One Sho 1109 R4
Fg One Sho 1109 R4
 

Último

Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...
Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...
Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...Sheetaleventcompany
 
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...noida100girls
 
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service 🧥
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service  🧥CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service  🧥
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service 🧥anilsa9823
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Sales Pitch Structure Digital Marketing as a Service.pdf
Sales Pitch Structure Digital Marketing as a Service.pdfSales Pitch Structure Digital Marketing as a Service.pdf
Sales Pitch Structure Digital Marketing as a Service.pdfsystreatwork
 
Call girls in Jalandhar 8264406502 escort service in Jalandhar
Call girls in Jalandhar 8264406502 escort service in JalandharCall girls in Jalandhar 8264406502 escort service in Jalandhar
Call girls in Jalandhar 8264406502 escort service in JalandharSheetaleventcompany
 
Call girls in Jaipur 9358660226 escort service in Jaipur
Call girls in Jaipur 9358660226 escort service in JaipurCall girls in Jaipur 9358660226 escort service in Jaipur
Call girls in Jaipur 9358660226 escort service in Jaipurrahul222jai
 
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779Best VIP Call Girls Noida Sector 49 Call Me: 8448380779
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779Delhi Call girls
 
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779Best VIP Call Girls Noida Sector 73 Call Me: 8448380779
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779Delhi Call girls
 
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779Best VIP Call Girls Noida Sector 62 Call Me: 8448380779
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual serviceanilsa9823
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...Delhi Call girls
 
Call Girls in Calangute Beach 8588052666 Goa Escorts
Call Girls in Calangute Beach 8588052666 Goa EscortsCall Girls in Calangute Beach 8588052666 Goa Escorts
Call Girls in Calangute Beach 8588052666 Goa Escortsnishakur201
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnmkojalkojal131
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moorehf8803863
 
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...Delhi Call girls
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779Best VIP Call Girls Noida Sector 63 Call Me: 8448380779
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779Delhi Call girls
 

Último (19)

Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...
Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...
Maya❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Mohal...
 
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...
Russian ​❤️ Call Girls In Radisson Blu MBD Hotel, Noida ✔️ 9871031762 ✔️ Esco...
 
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service 🧥
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service  🧥CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service  🧥
CALL ON ➥8923113531 🔝Call Girls Vikas Nagar Lucknow best Female service 🧥
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
 
Sales Pitch Structure Digital Marketing as a Service.pdf
Sales Pitch Structure Digital Marketing as a Service.pdfSales Pitch Structure Digital Marketing as a Service.pdf
Sales Pitch Structure Digital Marketing as a Service.pdf
 
Call girls in Jalandhar 8264406502 escort service in Jalandhar
Call girls in Jalandhar 8264406502 escort service in JalandharCall girls in Jalandhar 8264406502 escort service in Jalandhar
Call girls in Jalandhar 8264406502 escort service in Jalandhar
 
Call girls in Jaipur 9358660226 escort service in Jaipur
Call girls in Jaipur 9358660226 escort service in JaipurCall girls in Jaipur 9358660226 escort service in Jaipur
Call girls in Jaipur 9358660226 escort service in Jaipur
 
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779Best VIP Call Girls Noida Sector 49 Call Me: 8448380779
Best VIP Call Girls Noida Sector 49 Call Me: 8448380779
 
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779Best VIP Call Girls Noida Sector 73 Call Me: 8448380779
Best VIP Call Girls Noida Sector 73 Call Me: 8448380779
 
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779Best VIP Call Girls Noida Sector 62 Call Me: 8448380779
Best VIP Call Girls Noida Sector 62 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
 
Call Girls in Calangute Beach 8588052666 Goa Escorts
Call Girls in Calangute Beach 8588052666 Goa EscortsCall Girls in Calangute Beach 8588052666 Goa Escorts
Call Girls in Calangute Beach 8588052666 Goa Escorts
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
 
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf Cyber City Gurgaon >༒8448380779 Escort Service
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
 
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779Best VIP Call Girls Noida Sector 63 Call Me: 8448380779
Best VIP Call Girls Noida Sector 63 Call Me: 8448380779
 

DDoS Mitigation - DefensePro - RADWARE

  • 1. Radware’s New Attack Mitigation Platform (DefensePro x4420) Deivid Toledo deivid.Toledo@wtrservices.com.br WTR Services 25 de Setembro 2015
  • 3. The Rise of the Continuous Attack Longer, larger and more sophisticated attacks. Constant attacks on the rise. In previous years - attacks that were considered “constant” never exceeded 6% In 2014 - 19% were considered “constant” Attack size also increases – 1 of 7 attacks larger than 10G in 2014. % 5% 10% 15% 20% 25% 30% 35% 40% Less than a day 1 hour-1 day 1 day-1 week over a week Constantly 2011 2012 2013 2014 In 2014, 19% of attacks were considered “constant”
  • 4. No One is Immune – Unexpected Targets Threats in new industries, organizational sizes and technology deployments Healthcare and Education – unexpected targets now at risk Gaming, Hosting and ISP companies – increased likelihood 2014 Change from 2013 4
  • 5. Reflective Attacks – the Largest DDoS Headache Attacks evenly split across network and application layers Web-based attacks remain the single most common attack vector – 1 in every 4 are HTTPS Increase reflective attacks cause UDP attacks to increase – From 7% in 2013 to 16% in 2014 Reflective attacks represent 2014’s single largest DDoS “headache” 10% 16% 6% 18% Network 51% TCP- Other UDP IPv6 1% TCP-SYN Flood ICMP 9% 23% 16% Application 49% VoIP 1% Web (HTTP/HTTPS) SMTP DNS
  • 6. Complexity of Attacks Continues to Grow Multi-vector attacks target all layers of the infrastructure IPS/IDS “Low & Slow” DoS attacks (e.g.Sockstress) Large volume network flood attacks Syn Floods Network Scan HTTP Floods SSL Floods App Misuse Brute Force Cloud DDoS protection DoS protection Behavioral analysis IPS WAF SSL protection Internet Pipe Firewall Load Balancer/ADC Server Under Attack SQL Server 6
  • 7. The Need: High Performance with Comprehensive Protection Protection from both sophisticated and volumetric attacks. Carriers and cloud providers - Need to support a growing number of customers with increased complexity and capacity. - Require high end devices that can handle growth and scale (mitigation, bandwidth, complexity and number of served customers). Current competitor offerings today require to chose between high performance and attack mitigation coverage/quality 7
  • 9. Radware’s New Attack Mitigation Platform Widest range of protections at high mitigation capacity, including UDP reflection attacks, fragmented and out-of-stack floods Up to 300Gbps throughput inspection while allowing customers to enjoy the widest range of simultaneous cyber-attack protection in the industry 230M PPS anti-DDoS along with best-in-class DNS, SIP, SMTP, HTTPS, and other application protections Commercial grade out-of-the-box compliance and customer tenancy managing over 1,000 policies in a secure Role-Based Access control format First dedicated attack mitigation platform to offer 100G interfaces No compromise: High performance + High mitigation capacity + Widest protection 9
  • 10. DefensePro x4420 - Technical Highlights Total throughput up to 300G - Legit traffic throughput up to 160G - BW license 50G/100G/160G High port density (with any port type support) - 4x100G (QSFP28) - 4 x 40GbE (QSFP+) - 20 x 1/10GbE (SFP+) New ‘Performance’ mode - up to 230M Attack PPS (supports SYN protection, packet anomaly, BL/WL) Up to 1,000 active policies Space conservative - only 2U of rack space DefensePro x4420
  • 11. DefensePro Layers of Defense Behavioral-based protections DME DDoS Mitigation Engine (230M PPS) L7 Regex Acceleration ASIC Multi Purpose Multi Cores CPU’s & Reputation Engine Hardware Architecture – Tailored for Attack Mitigation 11
  • 12. Multi Tenancies Support Separate processing capabilities per tenant Role based access control for management permissions per policy Each tenant can view and monitor only the resources that are relevant for them Personalized, per tenant, historical reporting, dashboards and event management 12
  • 13. DefensePro x4420 - Summary Highest rate mitigation with widest coverage - up to 230M PPS Any port connectivity - including 100G ports Designed for multi tenancy (MSSP/Carriers/Cloud) - Up to 1000 policies New scalable SW Architecture Compact form factor – 2U only
  • 14.
  • 16. DefensePro x4420 Technical Specification Features DefensePro x4420 DefensePro Model DP model 504420 – 50 Gbps DP model 1004420 – 100 Gbps DP model 1604420 – 160 Gbps Network Location Core Network Hardware Platform OnDemand Switch HT Performance Capacity 300 Gbps Max Legit Throughput 160 Gbps Max Concurrent Sessions 25,000,000 Maximum DDoS Flood Attack Prevention Rate 230,000,000 packets per second Latency 60 micro seconds Real time signatures Detect and protect attacks in less than 18 seconds Physical Ports Traffic Ports 4x 100 GbE QSFP28 4 x 40 GbE QSFP+ 20 x 10GbE SFP+ Management Ports 2 * 1 Gbe Copper, out of band RS-232 RJ-45 Serial Connection 16
  • 17. DefensePro x4420 Technical Specification – Cont. Features DefensePro x4420 Operation Mode Network Operation Transparent L2 Forwarding, IP Forwarding Deployment Modes In-line; SPAN Port Monitoring; local out-of-path; Out-of-path mitigation (scrubbing center solution) Tunneling protocols support VLAN Tagging, L2TP, MPLS, GRE, GTP, IPinIP IPv6 Full IPv6 support for detection and mitigation Policy Action Block & Report, Report Only Block Actions Drop packet, reset (source, destination, both), suspend (source, src port, destination, dest port or any combination), Challenge-Response for TCP, HTTP and DNS suspicious traffic High Availability Dual Power Supply Yes Advanced internal overload mechanism Yes High Availability deployment - Active-Passive Yes 17
  • 18. DefensePro x4420 Technical Specification – Cont. Features DefensePro x4420 Physical Dimensions (W x D x H) mm 2U: 424x600x88 mm EIA Rack or Standalone: 482 mm (19 in) Weight (kg, lb) 18.7Kg Power Supply Auto-range supply: AC: 100-240 V, 47-63 Hz DC: -36~-72 V Dual power supply (AC/DC) Power Consumption 890W Heat Dissipation (BTU/h) 2930 BTU/hr Operating Temperature 0-40°C (32-104°F) Humidity (non-condensing) Humidity: 5% to 95% non-condensing Certifications Safety: CE LVD( EN 60950-1), CB - IEC 60950-1, CCC, cTUVus, C-Tick EMC: CE EMC (EU directive 2004/108/EC), FCC Part 15B Class A, ICES-003, VCCI RoHS Compliant (EU directive 2011/65/EC) 18

Notas do Editor

  1. Cyber-attacks have reached a tipping point in terms of quantity, length, complexity and targets. Extra-large attacks are seen on a daily basis—and these attacks are targeting all types of organizations. In 2014, one in seven attacks was larger than 10G. And we've seen attacks in the 100Gbps+ size range. Attacks are evolving to become longer, larger and more sophisticated. Beyond just the growth in high-volume attacks, we are seeing constant attacks on the rise. In Radware's 2014-2015 report on the threat landscape, almost 20% of respondents report that they were continuously under attacks in 2014.
  2. Threats have expanded to a broader range of industries, organizational sizes and technology deployments.
  3. Continuing a four-year trend, cyber-attacks were again split evenly between the network and application levels. That’s because attackers’ “interest” lies in multi-sector blended attacks. Web attacks remain the single most common attack vector; for every four web-based attacks, three target HTTP and one is an HTTPS attack. Reflective attacks started heating up in 2013 and remained a persistent threat throughout 2014. While most of 2013’s reflected attacks targeted DNS, we saw more UDP based (NTP, CHARGEN) reflective attacks in 2014. Which is why we see UDP attacks in general increased from 7% in 2013 to 16% in 2014. What makes reflective attacks effective is the ease with which they can be generated— and the impact they can have on a network. Reflected attacks make it comparatively easy not only to generate an extra-large attack but also to sustain it for an extended period.
  4. Attackers are deploying multi-vulnerability attack campaigns by increasing the number of attack VECTORS they launch in parallel. To target your blind spot, different attack vectors target different layers of the network and data center, for example Net DDoS, App DDoS, Low & slow, SSL attacks and Web attacks. Even If only one vector will go undetected then the attack is successful and the result is highly destructive To effectively mitigate all type of DoS/DDoS attacks you need to go beyond protection at the network layer and implement a solution that gives you protection from the wide range of attacks types across all layers of the infrastructure.  DoS protection to detect and mitigate all type of network DDoS attacks  Behavioral Analysis to protect against application DDoS and misuse attacks. Behavioral-based real-time signatures and challenge-response mechanism can block the attack traffic accurately without blocking legitimate user traffic.  IPS to block known attack tools and the low and slow attacks  SSL protection to protect against encrypted flood attacks  WAF, web application firewall, to prevent web application vulnerability exploitations
  5. Organizations need comprehensive protection and high performance to protect from both sophisticated and volumetric attacks. Carriers and cloud providers today Need to support a growing number of customers with increased complexity and capacity. Require high end devices that can handle all the scale items (mitigation, bandwidth, complexity and number of served customers). Current competitor offerings today require to chose between high performance and attack mitigation coverage/quality A10 (Thunder 6630 ADC or 6435 TPS) – relatively strong performance but limited attack coverage (only SYN floods on the ADC device, no behavioral on the TPS) F5 (BIG-IP 10250) – high/medium performance (80Gbps, 850M CPS) with limited attack coverage (L3 only) Arbor (Peakflow TMS) – good attack coverage but limited performance (40 Gbps, 40 Mpps + 10G ports)
  6. The industry's most advanced and highest performance attack mitigation platform. You no longer have to choose between performance and quality of protection. Attack mitigation platform that goes beyond just SYN flood protection to offer a wide range of protections at high mitigation capacity, including UDP reflection attacks, fragmented and out-of-stack floods. Industry leading defense breadth: Up to 300Gbps throughput inspection while allowing customers to enjoy the widest range of simultaneous cyber-attack protection in the industry. Industry leading defense depth: 230M PPS anti-DDoS along with best-in-class DNS, SIP, SMTP, HTTPS, and other application protections. Commercial grade out-of-the-box compliance and customer tenancy managing over 1,000 policies in a secure Role-Based Access control format. First dedicated attack mitigation platform to offer 100G interfaces – providing best in class attack detection and mitigation in the most demanding operational environments.