SlideShare a Scribd company logo
1 of 19
redGuardian DP100
large scale DDoS mitigation
revision: 2017.08.04
Introduction
1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming
serious issue for network operators and their customers.
2. DDoS mitigation at this scale is considered complex and
expensive task.
3. We wold like to show you we can mitigate such attacks in a
cost-effective way.
redGuardian DP100 (1)
• DDoS scrubber for terabit scale DDoS attack mitigation
• 100Gbit+ scrubbing capacity per 1RU node
• DPI, lightweight unidirectional states, regexps
redGuardian DP100 (2)
• multi tenancy
• line rate speed
• runs on x86 platform
DDoS attacks
source: Akamai „State of the Internet”, Q4 2016
Notice, almost all high volume attacks are:
• reflected and amplified UDP, including
fragmented responses
• various TCP floods
It is the same and well known for years.
redGuardian – some of mitigated attacks
Protocol Name
UDP Chargen reflected response flood
UDP DNS reflected response flood
UDP Echo reflected response flood
UDP LDAP query flood
UDP LDAP reflected response flood
UDP MSSQL reflected response flood
UDP NetBIOS reflected response flood
UDP NTP reflected response flood
UDP QOTD reflected response flood
UDP RIP reflected response flood
UDP RPC Portmap reflected response flood
UDP Sentinel reflected response flood
UDP SNMP reflected response flood
UDP SSDP reflected response flood
UDP Steam query flood
UDP Steam reflected response flood
UDP fragment flood
TCP SYN flood
TCP ACK flood
TCP FIN flood
TCP RST flood
TCP fragment flood
TCP invalid flags
ICMP PING Flood
ICMP obsolete/legacy messages
ICMP fragment flood
GRE destination address validation
HTTP Wordpress botnet flood
IP invalid checksum
IP invalid fragment offset
IP packet length mismatch
IP source address from private address space
IP source address spoofed as myself
Comparison
Legacy DDoS solutions redGuardian
D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive
S/RTBH blocks source hosts, pushes thousands of entries into FIB,
may block legitimate users (spoofed source IPs)
logic does not rely on blocking source IPs, as these can be spoofed!
manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if
needed
installing Flowspec rules by DDoS detection system introduce
pressure on network equipment (thousands of rules pushed) when
facing large botnets and multi vector attacks, reaction is too slow
(dozen of seconds) and may block legitimate users (spoofed source
IPs)
does not require instrumentation from anomaly detection system,
blocks instantly; can match using more criterias than Flowspec,
including packet payload patterns
stateless ACL rules have limited functionality, while stateful engines
can be easily exhausted by installing millions of states
with lightweight states one can maintain billions of states with useful
metadata, thanks to that terabit scale inspection does not have to be
stateless
dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit
DDoS solutions price is very high
x86 hardware is fast, low cost and may already be installed in your
datacenter
Inside redGuardian x86 scrubber
• redGuardian dataplane
• 100G capacity
• 12 x 10G SFP+ port
or
1 x 100G QSFP28 port
• Xeon V3/V4 CPU
• 64GB RAM
• GNU/Linux OS
Inside redGuardian x86 scrubber: Ops perspective (1)
17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
// sniff sampled packets on received, transmitted or dropped side
# tcpdump -ni sampler-drop
# service dataplane status
● dataplane.service - Dataplane service
Loaded: loaded (/lib/systemd/system/dataplane.service; enabled)
Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago
Docs: man:dataplane(1)
man:dataplane.conf(5)
Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS)
Main PID: 37932 (dataplane)
CGroup: /system.slice/dataplane.service
└─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
Inside redGuardian x86 scrubber: Ops perspective (2)
# dpkg -l | grep dataplane
ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service
ii dataplane-collectd 280.0 amd64 dataplane collectd integration
// easy 3rd party performance management systems integration like Grafana
redGuardian capabilities (1)
• stateless ACL match L3/L4 and payload
– drop based on provided or custom sigantures
– drop udp sport 1434 data u64 0x5365727665724e61 at 3
– drop udp dport 389 data str "objectclass0" at 34
– drop frag single-or-first icmp type 0 code 1:255
• lightweight, unidirectional state filters
– suitable for asymmetric routing scenarios
– enforce retries, drop fragment chains
– billions of entries
redGuardian capabilities (2)
• rate-limiting
– enforce pps per flow with billions of policers
– enforce Mbps per rule or per customer on exit
• regexp engine
– drop packets with payload maching regular expressions
– match domain names in DNS query section
• source IP tagging for ACL rules
– each /24 of global IPv4 space can have one of 16 tags
– each /32 of global IPv4 space can have up to 8 marks
– drop udp srctag $bad_country
– drop udp marked $bad_ips
Performance
CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled)
Note: only one CPU core used for packet fowarding!
Scenario Mpps 10G line rate %
ACL basic drop 14,88 100%
ACL long drop 8,72 59%
TCP SYN state filter 10,04 67%
hashed rate-limit 10,44 70%
redGuardian can handle 100G line rate on modern multicore Xeon server.
Deployment (on-prem, off-path)
1. Place redGuardian scrubbers
nearby transit and peering routers
for effective traffic hijacking.
2. Connect directly to routers or core
switches using n×10G or 100G
ports (LAG), assign /31 p2p for
scrubber.
3. Use 3rd party opensource
(pmacct+ExaBGP, FastNetMon) or
commercial flow-based analytics
tools to detect IP under attack and
divert its incoming traffic (change
next-hop to scrubber or move
packets into special VRF).
4. Ensure injected /32 routes or
Flowspec rules are active at transit
router tables or transit interfaces
only (loop prevention).
redGuardian
scrubber
IP core
transit/peering VRF
flow-based
analytics
IP core
flows or SPAN
BGP /32 injection,
Flowspec rules, PBR
DDoS
victim
diverted traffic to
/32 victim
cleaned traffic
injected into IP core
normal traffic,
other customers
Deployment (on-prem, inline)
redGuardian
scrubber
protected networkupstream
1. Place redGuardian scrubbers between protected network and
upstream providers/transit links, using 2n×10G or 2n×100G ports.
2. Scrubber acts like filtering bridge between pairs of ports.
Availability
• physical 100G appliance
• software license
– use your own x86 hardware
– scale capacity between PoPs as needed
• service (BGP scrubbing center)
Conclusion
redGuardian provides:
1. performance typical for specialised hardware
2. elasticity typical for software
3. working solution for large scale DDoS attacks problem
Additional resources
1. twitter: @redguardianeu
2. https://www.slideshare.net/atendesoftware/presentations
3. https://www.redguardian.eu/
4. http://www.atendesoftware.pl/
5. e-mail: info @ redguardian.eu
DDoS shall not pass!
https://twitter.com/redguardianeu

More Related Content

What's hot

What's hot (20)

High Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing CommunityHigh Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing Community
 
Cilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPFCilium - API-aware Networking and Security for Containers based on BPF
Cilium - API-aware Networking and Security for Containers based on BPF
 
DevConf 2014 Kernel Networking Walkthrough
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking Walkthrough
 
TRex Realistic Traffic Generator - Stateless support
TRex  Realistic Traffic Generator  - Stateless support TRex  Realistic Traffic Generator  - Stateless support
TRex Realistic Traffic Generator - Stateless support
 
DPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabDPDK in Containers Hands-on Lab
DPDK in Containers Hands-on Lab
 
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro NakajimaDPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
 
Dpdk performance
Dpdk performanceDpdk performance
Dpdk performance
 
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
 
Vigor 3910 docker firmware quick start
Vigor 3910 docker firmware quick startVigor 3910 docker firmware quick start
Vigor 3910 docker firmware quick start
 
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
DPDK summit 2015: It's kind of fun  to do the impossible with DPDKDPDK summit 2015: It's kind of fun  to do the impossible with DPDK
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
 
Enable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zunEnable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zun
 
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThe Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
DPDK Summit 2015 - RIFT.io - Tim MortsolfDPDK Summit 2015 - RIFT.io - Tim Mortsolf
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
 
Linux Native, HTTP Aware Network Security
Linux Native, HTTP Aware Network SecurityLinux Native, HTTP Aware Network Security
Linux Native, HTTP Aware Network Security
 
Tc basics
Tc basicsTc basics
Tc basics
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)
 
Performance challenges in software networking
Performance challenges in software networkingPerformance challenges in software networking
Performance challenges in software networking
 
Open vSwitch - Stateful Connection Tracking & Stateful NAT
Open vSwitch - Stateful Connection Tracking & Stateful NATOpen vSwitch - Stateful Connection Tracking & Stateful NAT
Open vSwitch - Stateful Connection Tracking & Stateful NAT
 

Viewers also liked (8)

Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka Ishizaki
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_fl
 
DeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSDeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPS
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 

Similar to redGuardian DP100 large scale DDoS mitigation solution

TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
sector-sphere
sector-spheresector-sphere
sector-sphere
xlight
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 

Similar to redGuardian DP100 large scale DDoS mitigation solution (20)

9534715
95347159534715
9534715
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
 
Postgres clusters
Postgres clustersPostgres clusters
Postgres clusters
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
 
Inside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable CloudInside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable Cloud
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
Sector Sphere 2009
Sector Sphere 2009Sector Sphere 2009
Sector Sphere 2009
 
sector-sphere
sector-spheresector-sphere
sector-sphere
 
Practice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China MobilePractice of large Hadoop cluster in China Mobile
Practice of large Hadoop cluster in China Mobile
 
Dpdk applications
Dpdk applicationsDpdk applications
Dpdk applications
 
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
 
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure WebLinux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Oracle Drivers configuration for High Availability, is it a developer's job?
Oracle Drivers configuration for High Availability, is it a developer's job?Oracle Drivers configuration for High Availability, is it a developer's job?
Oracle Drivers configuration for High Availability, is it a developer's job?
 
Automate Oracle database patches and upgrades using Fleet Provisioning and Pa...
Automate Oracle database patches and upgrades using Fleet Provisioning and Pa...Automate Oracle database patches and upgrades using Fleet Provisioning and Pa...
Automate Oracle database patches and upgrades using Fleet Provisioning and Pa...
 
Advanced RAC troubleshooting: Network
Advanced RAC troubleshooting: NetworkAdvanced RAC troubleshooting: Network
Advanced RAC troubleshooting: Network
 

More from Redge Technologies

More from Redge Technologies (11)

[PL] DDoS na sieć ISP (KIKE 2023)
[PL] DDoS na sieć ISP (KIKE 2023)[PL] DDoS na sieć ISP (KIKE 2023)
[PL] DDoS na sieć ISP (KIKE 2023)
 
BGP zombie routes
BGP zombie routesBGP zombie routes
BGP zombie routes
 
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
 
BGP hijacks and leaks
BGP hijacks and leaksBGP hijacks and leaks
BGP hijacks and leaks
 
Stress your DUT
Stress your DUTStress your DUT
Stress your DUT
 
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
 
100Mpps czyli jak radzić sobie z atakami DDoS?
100Mpps czyli jak radzić sobie z atakami DDoS?100Mpps czyli jak radzić sobie z atakami DDoS?
100Mpps czyli jak radzić sobie z atakami DDoS?
 
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa ITSCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
 
Na froncie walki z DDoS
Na froncie walki z DDoSNa froncie walki z DDoS
Na froncie walki z DDoS
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
 
100 M pakietów na sekundę dla każdego.
100 M pakietów na sekundę dla każdego. 100 M pakietów na sekundę dla każdego.
100 M pakietów na sekundę dla każdego.
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

redGuardian DP100 large scale DDoS mitigation solution

  • 1. redGuardian DP100 large scale DDoS mitigation revision: 2017.08.04
  • 2. Introduction 1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming serious issue for network operators and their customers. 2. DDoS mitigation at this scale is considered complex and expensive task. 3. We wold like to show you we can mitigate such attacks in a cost-effective way.
  • 3. redGuardian DP100 (1) • DDoS scrubber for terabit scale DDoS attack mitigation • 100Gbit+ scrubbing capacity per 1RU node • DPI, lightweight unidirectional states, regexps
  • 4. redGuardian DP100 (2) • multi tenancy • line rate speed • runs on x86 platform
  • 5. DDoS attacks source: Akamai „State of the Internet”, Q4 2016 Notice, almost all high volume attacks are: • reflected and amplified UDP, including fragmented responses • various TCP floods It is the same and well known for years.
  • 6. redGuardian – some of mitigated attacks Protocol Name UDP Chargen reflected response flood UDP DNS reflected response flood UDP Echo reflected response flood UDP LDAP query flood UDP LDAP reflected response flood UDP MSSQL reflected response flood UDP NetBIOS reflected response flood UDP NTP reflected response flood UDP QOTD reflected response flood UDP RIP reflected response flood UDP RPC Portmap reflected response flood UDP Sentinel reflected response flood UDP SNMP reflected response flood UDP SSDP reflected response flood UDP Steam query flood UDP Steam reflected response flood UDP fragment flood TCP SYN flood TCP ACK flood TCP FIN flood TCP RST flood TCP fragment flood TCP invalid flags ICMP PING Flood ICMP obsolete/legacy messages ICMP fragment flood GRE destination address validation HTTP Wordpress botnet flood IP invalid checksum IP invalid fragment offset IP packet length mismatch IP source address from private address space IP source address spoofed as myself
  • 7. Comparison Legacy DDoS solutions redGuardian D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive S/RTBH blocks source hosts, pushes thousands of entries into FIB, may block legitimate users (spoofed source IPs) logic does not rely on blocking source IPs, as these can be spoofed! manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if needed installing Flowspec rules by DDoS detection system introduce pressure on network equipment (thousands of rules pushed) when facing large botnets and multi vector attacks, reaction is too slow (dozen of seconds) and may block legitimate users (spoofed source IPs) does not require instrumentation from anomaly detection system, blocks instantly; can match using more criterias than Flowspec, including packet payload patterns stateless ACL rules have limited functionality, while stateful engines can be easily exhausted by installing millions of states with lightweight states one can maintain billions of states with useful metadata, thanks to that terabit scale inspection does not have to be stateless dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit DDoS solutions price is very high x86 hardware is fast, low cost and may already be installed in your datacenter
  • 8. Inside redGuardian x86 scrubber • redGuardian dataplane • 100G capacity • 12 x 10G SFP+ port or 1 x 100G QSFP28 port • Xeon V3/V4 CPU • 64GB RAM • GNU/Linux OS
  • 9. Inside redGuardian x86 scrubber: Ops perspective (1) 17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast // sniff sampled packets on received, transmitted or dropped side # tcpdump -ni sampler-drop # service dataplane status ● dataplane.service - Dataplane service Loaded: loaded (/lib/systemd/system/dataplane.service; enabled) Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago Docs: man:dataplane(1) man:dataplane.conf(5) Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS) Main PID: 37932 (dataplane) CGroup: /system.slice/dataplane.service └─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
  • 10. Inside redGuardian x86 scrubber: Ops perspective (2) # dpkg -l | grep dataplane ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service ii dataplane-collectd 280.0 amd64 dataplane collectd integration // easy 3rd party performance management systems integration like Grafana
  • 11. redGuardian capabilities (1) • stateless ACL match L3/L4 and payload – drop based on provided or custom sigantures – drop udp sport 1434 data u64 0x5365727665724e61 at 3 – drop udp dport 389 data str "objectclass0" at 34 – drop frag single-or-first icmp type 0 code 1:255 • lightweight, unidirectional state filters – suitable for asymmetric routing scenarios – enforce retries, drop fragment chains – billions of entries
  • 12. redGuardian capabilities (2) • rate-limiting – enforce pps per flow with billions of policers – enforce Mbps per rule or per customer on exit • regexp engine – drop packets with payload maching regular expressions – match domain names in DNS query section • source IP tagging for ACL rules – each /24 of global IPv4 space can have one of 16 tags – each /32 of global IPv4 space can have up to 8 marks – drop udp srctag $bad_country – drop udp marked $bad_ips
  • 13. Performance CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled) Note: only one CPU core used for packet fowarding! Scenario Mpps 10G line rate % ACL basic drop 14,88 100% ACL long drop 8,72 59% TCP SYN state filter 10,04 67% hashed rate-limit 10,44 70% redGuardian can handle 100G line rate on modern multicore Xeon server.
  • 14. Deployment (on-prem, off-path) 1. Place redGuardian scrubbers nearby transit and peering routers for effective traffic hijacking. 2. Connect directly to routers or core switches using n×10G or 100G ports (LAG), assign /31 p2p for scrubber. 3. Use 3rd party opensource (pmacct+ExaBGP, FastNetMon) or commercial flow-based analytics tools to detect IP under attack and divert its incoming traffic (change next-hop to scrubber or move packets into special VRF). 4. Ensure injected /32 routes or Flowspec rules are active at transit router tables or transit interfaces only (loop prevention). redGuardian scrubber IP core transit/peering VRF flow-based analytics IP core flows or SPAN BGP /32 injection, Flowspec rules, PBR DDoS victim diverted traffic to /32 victim cleaned traffic injected into IP core normal traffic, other customers
  • 15. Deployment (on-prem, inline) redGuardian scrubber protected networkupstream 1. Place redGuardian scrubbers between protected network and upstream providers/transit links, using 2n×10G or 2n×100G ports. 2. Scrubber acts like filtering bridge between pairs of ports.
  • 16. Availability • physical 100G appliance • software license – use your own x86 hardware – scale capacity between PoPs as needed • service (BGP scrubbing center)
  • 17. Conclusion redGuardian provides: 1. performance typical for specialised hardware 2. elasticity typical for software 3. working solution for large scale DDoS attacks problem
  • 18. Additional resources 1. twitter: @redguardianeu 2. https://www.slideshare.net/atendesoftware/presentations 3. https://www.redguardian.eu/ 4. http://www.atendesoftware.pl/ 5. e-mail: info @ redguardian.eu
  • 19. DDoS shall not pass! https://twitter.com/redguardianeu