SlideShare a Scribd company logo
Red Armor
Network Security Enforcement
Rethinking Network-Based Security
To Protect against DDoS Attacks
• Perfectly simple high performance infrastructure
– Purpose-built high capacity networks
– Our architecture and advanced features set us apart
• Product Innovation with market-leading support
• Customers use this for rapid service creation and delivery
within their networks
– ISP, SP, IX, CDNs, hosting providers and NREN customers worldwide
– Very large networks: Each moving >50Petabytes of data per month
A Bad Trend in DDoS Attacks
BBC – 602Gbps
31/12/2015
Krebs – 665Gbps
20/09/2016
OVH – 1Tbps
20/09/2016
Dyn – 1.2Tbps
21/10/2016
Incapsula– 650Gbps
@ 150Mpps
21/12/2016
Mirai Botnet
Leet Botnet
NWH Botnet
Anatomy of DDoS Attacks
>90% of Attack
Traffic is Volumetric
Verisign Oct.2016
“IoT denial of service attacks ….will be orders of magnitude
greater than what we have seen.
The 2016 IoT DDoS attacks were…merely designed to
calibrate their weaponized software.
2017 will see serious internet outages.”
2017 – Tip of the Iceberg
Today’s Network Security
Scrubbing
Center
Traditional
Router-Based
Security for high volume networks
Insufficient performance against escalating intensity of attacks:
huge # attack sources, massive increase in attack size, multiplying attack types
Mitigation is not keeping pace with detection and analysis
Cost
prohibitive
Not
line-rate
Limited
scale
Restricted
placement
Inadequate
evolution
Too
complex
Red Armor NSE7000 Series
• Installs in 10 minutes within existing architectures
• Operates as a bump on the wire
• Interoperates with every DDoS detection technology
• Provides 100G line rate enforcement at a fraction of the cost
Red Armor Turbo Charges Network Security
Separation of Network Security Functions
An evolved security
architecture:
• Best-of-breed Analysis
• Best-of-breed Inspection
• Line-rate Enforcement
Mitigation/
Enforcement
Inspection
Analysis
Line-rate
Enforcement
Red Armor: Network Security Enforcement
64 Byte line-rate performance:
100Gbps @ 150 Mpps
Ultimate precision to protect
both network and customer
No performance penalty with
small packets or number of rules
Responsive to evolving security
threats
Universal
Solution
Fits in any existing architecture
Distributed or centralized with
ability to scale up AND scale out
Link best of breed inspection and
analysis with best enforcement
Performance monitoring and
reporting for every rule
Right-Sized
Economics
Simplified enforcement
Affordable for building truly
distributed defence
Ability to scale security with
scaling the network
No software licensing fees or
transceiver lock in
Universal enforcement for any size volumetric DDoS attack
Network Security Enforcement for DDoS
BGP Flow Spec
NetFlow Data
Analysis/Detection
Bump in the wire
Red Armor
Line Rate EnforcementAny existing
DDoS detection
such as
Network Routing
 Add to existing architecture
 No shared resources with routing
 No degradation of performance
based on packet size
 No degradation of performance
based on # of rules
Red Armor – How It Works
• Enforcement broken down into simple
security rules
• Packets parsed and matched on any field
at L3 and L4
– TCP Flags, SYN in addition to IP src/dst
and TCP/UDP src/dst
• Rules can be programmed via BGP
FlowSpec, REST API or OpenFlow
• Real-time per rule statistics for extremely
granular performance monitoring and
reporting
Enforcement
Rules
Accept
Drop
Rate-limit
DSCP Remark
NSE Performance: RFC2544 Test
Traffic composition:
100% 64byte packets
Traffic rate:
100Gbps
Performance result:
150Mpps at 100Gbps
Red Armor NSE7000 Series
• Installs in 10 minutes and is additive to existing architectures
• Operates as a bump on the wire
• Interoperates with every DDoS detection technology
• Provides 100G line rate enforcement at a fraction of the cost
Red Armor Turbo Charges Network Security
Red Armor

More Related Content

PDF
Corsa Giga Filter
PDF
Corsa DP2000 Platform
PDF
Corsa Technology DP2000: Open Programmable Networking & Virtualizing Network ...
PPTX
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PPTX
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PPT
Vpn presentation
PPTX
Virtual Private Networks (VPN) ppt
PPT
TFI2014 Session I - State of SDN - Gary Hemminger
Corsa Giga Filter
Corsa DP2000 Platform
Corsa Technology DP2000: Open Programmable Networking & Virtualizing Network ...
PLNOG 17 - Artur Kane - DDoS? You shall not pass!
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
Vpn presentation
Virtual Private Networks (VPN) ppt
TFI2014 Session I - State of SDN - Gary Hemminger

What's hot (20)

PPT
PDF
Wireless Technologies For The Internet Of Things
PPT
V P N
PDF
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
PPTX
VPN (virtual Private Network)
PPTX
Virtual private network, vpn presentation
PPT
VPN presentation - moeshesh
PDF
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...
PPTX
Webinar: The Software Matters in Open Networking
PDF
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...
PPTX
Challenges of Network Optimization in a WAN-Cloud World
PDF
Time for Change
PPTX
Realising the Immediate Benefits of SDN and NFV
PPT
PDF
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
DOC
Virtual private network
PDF
Vpn security
PPTX
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
PPTX
How to use SDN to Innovate, Expand and Deliver for your business
PPTX
SDN/NFV architecture vision and reality
Wireless Technologies For The Internet Of Things
V P N
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
VPN (virtual Private Network)
Virtual private network, vpn presentation
VPN presentation - moeshesh
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...
Webinar: The Software Matters in Open Networking
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...
Challenges of Network Optimization in a WAN-Cloud World
Time for Change
Realising the Immediate Benefits of SDN and NFV
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
Virtual private network
Vpn security
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
How to use SDN to Innovate, Expand and Deliver for your business
SDN/NFV architecture vision and reality
Ad

Similar to Rethinking Security: Corsa Red Armor Network Security Enforcement (20)

PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PDF
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PDF
Stephen Wallo
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PPTX
Scaling service provider business with DDoS-mitigation-as-a-service
PPTX
INSECS: Intelligent networks security system
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PPTX
Security at the Speed of the Network
PPTX
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
PDF
Microsegmentation for enterprise data centers
PPTX
Network Bandwidth management - Mumbai Seminar
PPTX
Ransomware-Recovery-as-a-Service
PPTX
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
PDF
Next-Gen DDoS Detection
PDF
Secure SDN
PPTX
Mellanox Market Leading Solutions
PDF
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Stephen Wallo
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Scaling service provider business with DDoS-mitigation-as-a-service
INSECS: Intelligent networks security system
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Security at the Speed of the Network
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Microsegmentation for enterprise data centers
Network Bandwidth management - Mumbai Seminar
Ransomware-Recovery-as-a-Service
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Next-Gen DDoS Detection
Secure SDN
Mellanox Market Leading Solutions
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf

Rethinking Security: Corsa Red Armor Network Security Enforcement

  • 2. Network Security Enforcement Rethinking Network-Based Security To Protect against DDoS Attacks
  • 3. • Perfectly simple high performance infrastructure – Purpose-built high capacity networks – Our architecture and advanced features set us apart • Product Innovation with market-leading support • Customers use this for rapid service creation and delivery within their networks – ISP, SP, IX, CDNs, hosting providers and NREN customers worldwide – Very large networks: Each moving >50Petabytes of data per month
  • 4. A Bad Trend in DDoS Attacks BBC – 602Gbps 31/12/2015 Krebs – 665Gbps 20/09/2016 OVH – 1Tbps 20/09/2016 Dyn – 1.2Tbps 21/10/2016 Incapsula– 650Gbps @ 150Mpps 21/12/2016 Mirai Botnet Leet Botnet NWH Botnet
  • 5. Anatomy of DDoS Attacks >90% of Attack Traffic is Volumetric Verisign Oct.2016
  • 6. “IoT denial of service attacks ….will be orders of magnitude greater than what we have seen. The 2016 IoT DDoS attacks were…merely designed to calibrate their weaponized software. 2017 will see serious internet outages.” 2017 – Tip of the Iceberg
  • 8. Security for high volume networks Insufficient performance against escalating intensity of attacks: huge # attack sources, massive increase in attack size, multiplying attack types Mitigation is not keeping pace with detection and analysis Cost prohibitive Not line-rate Limited scale Restricted placement Inadequate evolution Too complex
  • 9. Red Armor NSE7000 Series • Installs in 10 minutes within existing architectures • Operates as a bump on the wire • Interoperates with every DDoS detection technology • Provides 100G line rate enforcement at a fraction of the cost Red Armor Turbo Charges Network Security
  • 10. Separation of Network Security Functions An evolved security architecture: • Best-of-breed Analysis • Best-of-breed Inspection • Line-rate Enforcement Mitigation/ Enforcement Inspection Analysis
  • 11. Line-rate Enforcement Red Armor: Network Security Enforcement 64 Byte line-rate performance: 100Gbps @ 150 Mpps Ultimate precision to protect both network and customer No performance penalty with small packets or number of rules Responsive to evolving security threats Universal Solution Fits in any existing architecture Distributed or centralized with ability to scale up AND scale out Link best of breed inspection and analysis with best enforcement Performance monitoring and reporting for every rule Right-Sized Economics Simplified enforcement Affordable for building truly distributed defence Ability to scale security with scaling the network No software licensing fees or transceiver lock in Universal enforcement for any size volumetric DDoS attack
  • 12. Network Security Enforcement for DDoS BGP Flow Spec NetFlow Data Analysis/Detection Bump in the wire Red Armor Line Rate EnforcementAny existing DDoS detection such as Network Routing  Add to existing architecture  No shared resources with routing  No degradation of performance based on packet size  No degradation of performance based on # of rules
  • 13. Red Armor – How It Works • Enforcement broken down into simple security rules • Packets parsed and matched on any field at L3 and L4 – TCP Flags, SYN in addition to IP src/dst and TCP/UDP src/dst • Rules can be programmed via BGP FlowSpec, REST API or OpenFlow • Real-time per rule statistics for extremely granular performance monitoring and reporting Enforcement Rules Accept Drop Rate-limit DSCP Remark
  • 14. NSE Performance: RFC2544 Test Traffic composition: 100% 64byte packets Traffic rate: 100Gbps Performance result: 150Mpps at 100Gbps
  • 15. Red Armor NSE7000 Series • Installs in 10 minutes and is additive to existing architectures • Operates as a bump on the wire • Interoperates with every DDoS detection technology • Provides 100G line rate enforcement at a fraction of the cost Red Armor Turbo Charges Network Security