Distributed Denial of Service

advertisement
Level 3 Security Solutions
Distributed Denial of Service Product Description
Version 01 03 2012
Level 3 Security Solutions Product Description
Version 01 03 2013
Table of Contents
....................................................................................................... 1
LEVEL 3 SECURITY SOLUTIONS .................................................................................................................. 1
DISTRIBUTED DENIAL OF SERVICE ............................................................................................................. 3
1.1. DDoS Overview.............................................................................................................................. 3
1.1.1. Routed Solution ......................................................................................................................... 3
1.1.2. Proxy Solution ........................................................................................................................... 4
1.1.3. Connect Solution ....................................................................................................................... 6
1.1.4. Flow based monitoring ............................................................................................................. 6
1.1.5. Application based monitoring ................................................................................................. 7
1.1.6. Summary of Value Proposition ................................................................................................ 7
Page 2 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
Distributed Denial of Service
1.1.
DDoS Overview
Level 3 offers a Managed DDoS detection and mitigation service that monitors a customer’s connection
for Distributed Denial of Service attack related activity. This service is provided in partnership with
Prolexic. When a DDoS attack is detected, Level 3 routes the attack traffic into a designated "scrubbing
center" where the attack traffic is analyzed and removed. Clean, legitimate traffic is then passed to the
customer. Level 3 DDoS mitigation service is available in three different options based on the type and
amout of clean traffic: Proxy Solution, Routed Solution and Connect Solution. In all of these mitigations
options, traffic is rerouted through on of our 4 scrubbing centers , attack traffic is filtered and the good
traffic is sent back to its intended destination. In Proxy solution, we make a DNS record change to Prolexic
IP and traffic flows through the Prolexic Proxy server, in the Routed Solution, we use GRE tunnels over
the internet and in Connect, we have a dedicated circuit between the customer’s data center and our
mitigation centers. Proxy service is typically used when the customer is under attack, routed offering is
used for protection of large number of IP addresses, and connect is for typically for 1G or higher clean
traffic at a given site.
1.1.1. Routed Solution
The Routed Solution provides the the maximum protection against the broadest range of DDoS attacks
and can protect a clean bandwidth upto 500 Mbps. This is offered as an on-demand service that enables
Level 3 customers to easily activate protection for an entire subnet by redirecting Interent traffic to the
Level 3 mitigation infrastructure during a DDoS attack and routing directly through Customer’s Internet
connection during non-attack periods.
The Routed solution is best suited in the following situations:





Customer needs protection for a large number of destination IP addresses
Customer needs a simpler way to activate DDoS protection for an entire subnet
Customer uses BGP at the interent edge
Customer requires a flexible solution that facilitates making changes to entire subnets
Customer needs to protect multiple service types and protocols, not just HTTP and HTTPS.
With Routed solution, Level 3 on-ramps customer incoming traffic and inspects it for anomalies. Outgoing
traffic is not inspected, but is allowed to take its normal path. The Routed solution uses the GRE protocol
to construct connections between the customer’s router and our routers in the mitigation platform. The
BGP protocol is used to communicate network advertisements from the customer’s network to ours.
Traffic is cleansed and forwarded over the GRE tunnels to the customer’s routers. Outgoing traffic from
the customers servers to the Internet is always forwarded as normal to the customer’s ISP.
The benefits of the Routed solution are




Increased resiliency as route advertisements are propogated from all scrubbing centers.
Rapid and easy activation/deactivation via simple routing changes that enables customer to
manage traffic routing.
Improved visibility and it is not required to “white list” the Level 3 proxy due to source IP visibility.
Protection of a large number of destination IPs.
The on-boarding of this service requires the following shared responsibilities:
Page 3 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
Level 3 Responsibilities







Level 3 will be responsible for providing all necessary IP allocations to build and terminate the
new service to the mitigation platform.
Update Routing Registries.
Assigning the /30 IP allocations.
All router and mitigation device configurations.
Ensure that all access-list (ACL) are updated with any relevant information contained in the
Customer provisioning form.
Level 3 will notify Customer point of contact when configurations have been completed.
Forwarding all necessary IP information to allow Customer to configure their equipment for
tunnel/direct circuit termination.
Customer Responsibilities





Confirm suitability of client routing equipment – all hardware must accept termination of GRE in
hardware.
Customer is responsible for constructing all router and firewall configurations.
Customer to notify Level 3/ Prolexic when the configurations are completed and provide a
suitable date and time to test and optimize the connection.
Customer to confirm that local ISP connections are not configured to uRPF strict mode.
Configure four GRE tunnels per customer router, with each tunnel terminating to a different
Prolexic Scrubbing Centre.
Notes


Level 3 only supports termination of GRE tunnels to a router.
Level 3 will not support termination of GRE tunnels to dedicated Firewalls or LINUX
devices.
Pricing
The Routed Solution is priced based on Bandwidth and number of sites that are to be protected.
There are 3 tiers of Routed solution; 1 – 20 Mbps , 21 – 250 Mbps and 251 – 500 Mpbs.
1.1.2. Proxy Solution
The Proxy Solution is designed to provide rapid mitigation for customers that are currently under
sustained DDoS attacks or Customers who only want protection against HTTP or HTTPS based
DDoS attacks. The proxy solution can restore accessibility to a website brought down by DDoS in
just a few minutes after traffic gets routed through our global scrubbing centers. This service only
protects HTTP and HTTPs traffic.
Proxy is best suited under the following circumstances:



Customer that is currently under attack and needs emergency mitigation services
Customer that is not under attack, but wants to build a first layer of DDoS defense
Customer that requires a mitigation solution that is simple and fast to deploy
This service enables our customers to easily activate protection per domain and redirect internet
traffic to the Level 3/Prolexic network during a DDoS attack and then switch traffic back to their
network during non-attack periods.
Page 4 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
Virtual IP addresses (VIPs) are advertised from each of Level 3’s scrubbing centers. This
configuration enables clean and malicious traffic to be automatically routed to the nearest
scrubbing centers.
The benefits of the Proxy solution are






Resiliency via proxies that are anycast to all of our scrubbing centers.
Quick and easy activation/deactivation via DNS changes that enables customer to manage
its routing.
Simplified deployment that requires minimal changes to the customer’s network.
The Proxy solution can be easily migrated to the Routed Solution for enhancing protection
against a wide-range of DDoS attacks
Rapid deployment that enables mitigation of DDoS attacks in just minutes.
It has minimal impact with redirection of the domain under attack as opposed to the
redirection of the entire subnet.
For the implemention of Proxy service, Level 3 and the customer will have the following shared
responsibilities:
Level 3 Responsibilities

Level 3 will be responsible for providing all necessary Virtual IP (VIP) allocations to build and
terminate the new service to the DDoS mitigation platform. This entails assigning the /32
VIP allocation for DNS redirection and forwarding all necessary VIP information to allow the
customer to configure their DNS and firewall systems for the circuit termination

Ensure that all access-lists (ACLs) are updated with any relevant information contained in
the Customer provisioning form.

Upon completion of all configurations, Level 3 will test the DDoS service with the Clients
web traffic. Level 3’s team will monitor the customer traffic over the Level 3/Prolexic network
and confirm functionality and network performance to Client.
Customer Responsibilities

Customer is responsible for constructing all web-server and firewall configurations for the
proxied connections.

Customer is responsible for restricting connection to their web-server to allow only
connections made by the Prolexic systems.

Upon the completion of all configurations, customer will point their DNS to their assigned
Level 3 VIPs. This will be tested as a part of provisioning. The customer will also liaise with
the Level 3/Prolexic SOC (to ensure that all normal services are functioning as expected).

Ensure that all protected Client web-services are functioning as expected over the Prolexic
network.
.
Pricing
Page 5 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
The Proxy solution is priced based on Bandwidth and web servers to be protected. The protected
web servers correspond to Level 3 Virtual IP Addresses (per block of 5) It is available in the
following tiers;
Bandwith Tiers for Proxy
Solution
Upto 20 Mbps
21 – 250 Mpbs
251 – 500 Mbps
501 – 1.0 Gbps
1.1.3. Connect Solution
The Connect Solution delivers DDoS mitigation services over a direct physical connection
from the customer’s network to the mitigation platform. Just like the routed service, this
connection enables a customer to activate protection for an entire subnet, enabling
redirection of the Internet traffic to the Level 3 network during a DDoS attack and away
from the Level 3 netwrk during non-attack periods.
The Connect solution is best suited in the following situation:



Customer desires a high bandwidth connection to the mitigation infrastructure.
Customer has a complex internet edge deployment using many protocols and
site-to-site VPNs.
Have a clean bandwidth that is greater than 1 Gbps per port.
This service entails a direct physical connection from the customer’s location to the
mitigation center The mitigation service identifies legitimate traffic and drops the attack
traffic.
This service also uses the BGP routing protocol to communicate network
advertisements from the customer’s network to Level 3/Prolexic scrubbing
infrastructure. The customer can use these advertisments to activate and deactivate
the service as needed.
Pricing
The Connect solution provides protection of upto 5 Gbps. The Connect solution requires
a CIR (Committed Information Rate). The CIR is calculated for each region (US, EMEA,
APAC), based on each protected client production site, and is to be based upon the
maximum traffic that could be run through the Prolexic network at one time. The CIR
commit for each region is the sum of these peak values for all 'in-region' client production
sites. Note that a minimum 1 Gbps of CIR is required for all Connect projects.
1.1.4. Flow based monitoring
This service is used for the monitoring and analysis of layer 3 and layer 4 DDoS attacks. The
flow-based monitoring service monitors customer’s edge routers and detects anomalies and
changes in volumetric flows. Level 3/Prolexic 24x7 SOC notifies customers of conditions that
Page 6 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
could threaten the networks. The SOC re-routes traffic to our mitigation platforms should it
detect a threat.
This service is able to detect TCP, UDP and ICMP floods. The customer router must be able
export SNMP and Netflow data to Level 3/Prolexic flow monitoring system. Level 3/Prolexic
SOC technicians tune the flow based monitoring system to determine the profile of
customer’s traffic. This profile is then continually updated so that the technicans can learn
about customer’s traffic patterns at any given time. Once they are knowledgable, they can
instantly recognize deviations fom the baseline, begin immediate analysis and provide alerts.
The benefits of the Flow based monitoring solution include:



This service is non-intrusive. It does not require any hardware to be inserted into the
customer’s network.
24X7 monitoring by Level 3/Proelxic SOC. The SOC provides an alert when a DDoS
attack is detected that would require traffic to be routed to the Level 3/Prolexic mitigation
platform.
Improved analytics into user activity and the applications that traverse the network. Ability
to trend on network attributes such as client source IP addresses, ports, protocols etc.,
to pinpoint suscipious behavior.
1.1.5. Application based monitoring
While Flow-based monitoring is used for detection of layer 3 and 4 attacks, there are DDoS
attacks aimed at the Application layer (Layer 7) which need to be mitigated. Application
based monitoring is a subscription service that leverages an on-premise appliance to provide
24/7 visibility into Later 7 attacks.
Through this service, we can pinpoint exactly where the attack is originating from, even as
signatures change in randomized attacks. Our high performance engine decodes up to
50,000 HTTP requests per second and correlates millions of data points per second. This
allows us to do real-time analysis for Layer 7 attacks.
The Application based monitoring solution requires one appliance per protected router. It
allows a maximum of 1 Gbps of protected traffic and a maximum of 10K connection requests
per second, per appliance.
Benefits of the Application monitoring solution are:





Fast alerting with instantaneous correlation can generate alerts in seconds.
Powerful historical correlation across multiple sensors using historical data and IP
reputation.
Corelation model that protects customer data. Correlation is done at two levels, at each
PLXabm appliance and also in the cloud where historical baselines and stateful
evidence are kept.
Analysis is performed on-premise, but mitigation is performed through the mitigation
platform in the cloud.
Ability to detect GET/POST flood and HTTP/HTTPS flood.
1.1.6. Summary of Value Proposition
Page 7 of 8
Proprietary & Confidential
Level 3 Security Solutions Product Description
Version 01 03 2013
•
Carrier agnostic offer
•
Cloud-based solution that allows mitigation of large attacks that are typically in excess
of 40-50G.
•
Multi-layer attack protection (Layer 7 and SSL)
•
4 Global Scrubbing Centers
•
500 Gbps of bandwidth dedicated to mitigating attacks. No one has a larger network to
absorb DDoS attacks.
•
Distributed global network removes botnets close to source
•
Layer 7 attack analysis
•
Faster response time (5-10 Mins): Within minutes after traffic flows through the
scrubbing network
End-of-Document
Page 8 of 8
Proprietary & Confidential
Download