How NSFOCUS ADS KO’s DDoS Attacks

DDOS Attack text on brick wall background.


What Is DDoS?

Look at the following example:

Assume that you run a shop that is doing well.

Red circular no entry sign with a white horizontal bar.

At this time, your neighbor, Mr. Wang (or whatever his name is), whose business is slack, looks at you as an eyesore.

Red circular no entry sign with a white horizontal bar.

Therefore, he hires a group of hooligans.

Red circular no entry sign with a white horizontal bar.

Then you find that your shop is crowded with customers, who look around and ask lots of questions, but do not buy anything at all. Worse still, they just linger there and do not leave.

Red circular no entry sign with a white horizontal bar.

Your shop is so overcrowded that your real customers cannot get inside there. These fake customers come to the shop for evil intentions, like blocking the door, taking up space, and chatting with shop assistants. This is just what a DDoS attack looks like, which is initiated by hackers through zombies with a Trojan backdoor on the network. It disguises itself as normal traffic data, making it impossible for traditional firewalls or other protective devices to identify which traffic is illegitimate.

Red circular no entry sign with a white horizontal bar.

Therefore, you need a professional to clean up the scene.

Red circular no entry sign with a white horizontal bar.

This is why NSFOCUS Anti-DDoS System (ADS) is launched.

How Does NSFOCUS ADS Accurately Identify Illegitimate Traffic?

  • Anti-spoofing: NSFOCUS ADS checks the authenticity of IP addresses and ports of packets and conducts reverse detection.

Red circular no entry sign with a white horizontal bar.

  • Protocol stack behavior pattern analysis: Each type of packets should conform to the RFC standards which specify a standard method of encapsulating packets. It’s just like the dress code that each employee in the company should abide by. As long as there are packets that fail to comply with such standards, NSFOCUS ADS will identify and filter out them.

Red circular no entry sign with a white horizontal bar.

  • Specific application protection: Illegitimate traffic always has certain characteristics. It seems like you mingle with a group of customers, your illegitimate behavior such as asking the shop assistant the same question too many times and repeating the same action will make you exposed and discovered.

Red circular no entry sign with a white horizontal bar.

  • User behavior pattern analysis: Legitimate traffic is generated by normal users whose behavior has no dramatic characteristics. It just like customers who get into a shop, have a casual look, ask the price, make comparisons or chat with the shop assistantwhen having no idea what to buy. By contrast, all illegitimate traffic is sent to access a certain point in a massive way, acting in concert to accomplish a malicious purpose. Therefore, those illegitimate traffic has distinctive characteristics and can be detected by NSFOCUS ADS.

Red circular no entry sign with a white horizontal bar.

  • Dynamic fingerprint recognition: All legitimate traffic is secured with encryption algorithms. This is just like each packet that is authenticated with an assigned password before being accepted by the server. Packets without a password or with an incorrect password will be directly filtered out by NSFOCUS ADS.

Red circular no entry sign with a white horizontal bar.

  • Bandwidth control: When there is too much access data, NSFOCUS ADS can limit the maximum output traffic to reduce the pressure on the downstream network system.

Red circular no entry sign with a white horizontal bar.

Three-in-One Deployment of NSFOCUS ADS

NSFOCUS ADS can be deployed in out-of-path mode. Generally, it continuously monitors the network and diverts the traffic for cleaning only when abnormal traffic is spotted. After cleaning, ADS inserts the handled traffic back to the network system. NSFOCUS ADS, NSFOCUS NTA, and NSFOCUS ADS M constitute NSFOCUS’s three-in-one cleaning solution.

Red circular no entry sign with a white horizontal bar.

If the customer’s network environment is complicated and suffers an attack characterized by a large number of packets, NSFOCUS’s three-in-one solution can give a good account of itself in such a scenario: In this solution, ADS can generate intelligent cleaning policies which enable it to work to its best and NSFOCUS ADS M can make a correlative analysis of and handle ADS’s status data.

Red circular no entry sign with a white horizontal bar.

In a large-scale network environment such as a Metropolitan Area Network (MAN) or Internet data center (IDC), these devices can be deployed in several groups to handle the volumetric attacks in a load balancing way.

Red circular no entry sign with a white horizontal bar.

Also, NSFOCUS has built a security system integrating the cloud, remote/local experts, and devices. After buying the product, what you get is far beyond the product. The local  or remote security experts can provide prompt response and the policies on the cloud can be synchronized to all security devices timely. In other words, all-round protection is implemented.

Red circular no entry sign with a white horizontal bar.

Postscript

As DDoS attack tools increasingly prevail and grow stronger, more security threats are emerging on the Internet. As the customer business systems rely more on networks, it is predictable that more DDoS attack events will occur on an even large scale and cause more severe losses. Since the losses caused by DDoS attacks are still on the rise, it is an immediate concern for carriers, enterprises or governments to employ protection policies to secure their investments, profits, and services.

NSFOCUS ADS provides industry-leading DDoS attack monitoring and protection capabilities. Via multiple analysis and detection mechanisms and flexible deployment modes, NSFOCUS ADS can effectively block DDoS attacks and ensure proper transmission of legitimate traffic, thereby playing an important role in assuring the continuity and integrity of business systems.

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.