DDos Solution PDF
DDos Solution PDF
SECURITY
Enabling Terabit DDoS Defense for your
Juniper Network
Louis Chan
Sr Consulting Engineer, APAC
Jun 2019
https://www.technadu.com/largest-ever-recorded-
ddos-attack-broken/66428/amp/
Last for 15 sec
?
• Cloud / Hosting / DCs
Solutions Deployed 1Tb – 10Tb
• Digital Enterprise
> 100G
10-100
Transit +
Peering
networks
or sites
< 100G
PoPs +
<5 SitesDCs > 5 Sites
© 2018 Juniper Networks
MITIGATION STYLE VS. ATTACK SIZE AND EDGE
CAPACITY
Size of
Attack
Blackhole
Zone
(some flowspec)
Partial
Protection
Provider Scrubbing Capacity
10%
Scrubbing Zone
Number of Attacks
© 2018 Juniper Networks
MITIGATION STYLE VS. ATTACK SIZE AND EDGE
CAPACITY
Size of
Attack
Blackhole
Provider Edge Capacity Zone 100%
Typically multiple Terabits/sec Edge Protection
Scales to >10
Provider Edge Mitigation
Leverage real-time data and analytics Terabits DDoS
to deliver intelligent automation Provider Edge Protection
Mitigation
Zone
rovider Scrubbing Capacity
>90% attacks mitigated at Provider Edge
<10% redirected to scrubbing Scrubbing Zone
Number of Attacks
© 2018 Juniper Networks
PROBLEMS OF LEGACY ‘DETECT AND REDIRECT’
SOLUTION
e.g. Arbor, Radware, A10
ingress from
transit/peering
Netflow
1) Aggregation delay
Detect
(out-of-band)
2) Header only
3) Detection delay
Service
egress to Provider
subscribers
ingress from
transit/peering
BGP redirect
Netflow
Detect
4) BGP propagation
(out-of-band)
5) Backhaul large
Scrubbing
Capacity
DDoS traffic in core
Service (<10% edge
6) Costly scrubber
Provider
capacity)
egress to
7) Limited capacity
subscribers
8) Low visibility
Good traffic Good traffic
tunneled to tunneled to
edge or cust edge or cust
SUCCESS
© 2018 Juniper Networks
ENHANCED ACCURACY + SPEED OF DDOS
DETECTION/MITIGATION
Attackers
Mirror Streaming
(1:1000) Telemetry Dynamic Filter
(Tuple + Payload)
1. Peace-Time Operation
2. Attack Starts
3. Automatic Mitigation
Begins
ingress from
Threat Defense Director (TDD) transit/peering
netconf
Service
Provider egress to
subscribers
ingress from
transit/peering
Threat Defense Director (TDD)
DC/Cloud
Provider
netconf
Good traffic to
server/service
SP
SP
MX
peering MX
MPLS peering
MX PE MX PE
IP camera / IoT
IP/PPPo compromised
E
Subscribers
© 2018 Juniper Networks
COMPETITIVE SUMMARY
Juniper TDD Arbor, Radware, A10… Remarks
SmartWall TDD
Flex match:
start from layer 4 (UDP)
Byte-offset 11 means the 12th Byte
Match for 8 bits
Mask = 0xFF = 1111 1111 (compare all bits)
Pattern = DEC 42 = HEX 2a
© 2018 Juniper Networks 23
MX FIREWALL FILTER FLEXIBLE MATCH (CONT)
EXAMPLE: TCP SYN ACK FLAG SET
0001 0010
Flex match:
start from layer 4 (TCP)
Byte-offset 13 means the 14th Byte
Match for 8 bits
Mask = 0x17 = 0001 0111 (only to compare the set position)
Pattern = DEC 18 = HEX 12 = 0001 0010
© 2018 Juniper Networks 24
ONE CUSTOMER (ATTACKS IN ONE MONTH)