Anti-spyware Tutorials Antivirus Firewall Tutorials Firewalls Security

Using FortiDDoS Equipment to Prevent DDoS Attacks – Part I

Attacks Distributed Denial of Service , or DDoS for short, constantly changing and is still regarded as one of the biggest threats to IT security, and even at times, causing disabling online services are vital. It should be noted that there has been no such dynamic and widespread problem, which is at the same time related to certain technologies. There is a long and almost unlimited list of tools that hackers and cyber criminals can block users from accessing the network. Complex DDoS attacks target services in layer 7 applications that are virtually impossible to detect due to their very small size through traditional ISP-based security practices.

To combat these threats, a solution that is as dynamic and widespread as it is must be presented. Appliance of  FortiDDoS  to mitigate DDoS attacks by Fortinet introduced, using reconnaissance effort on behavioral and processors that are fully based on ASIC respectively, to provide the most advanced and fastest way to reduce this type of attack in today’s market pay .

A superior and different approach to reducing DDoS attacks

Only Fortinet has the capability to apply a 100% ASIC approach to DDoS products without the overhead and risks of the CPU or the CPU / ASIC hybrid system. The FortiASIC-TP2 Transaction Processor can both detect and mitigate DDoS attacks. In addition to managing the types of traffic in layers 3, 4, and 7, this processor can accelerate threat detection and mitigate performance and provide the industry with the lowest latency.

FortiDDos, in comparison to other competitors, uses a 100% behavioral-based heuristic to identify threats that largely rely on the Signature compliance process. Instead of using a predefined signature to identify the pattern of threats, this technology provides the basis for normal operation and then monitors its associated traffic. When the attack starts, FortiDDoS views it as a malfunction and immediately takes action to reduce its impact. Users are protected against known and unrecognized Zero-Day attacks using this technology without the need to update a Signature file .

It can also manage the attack reduction process differently from other solutions. When the attack starts, other existing Appliances will start to mitigate DDoS attacks and the blocking process will begin and this will remain a threat until the end. If an event is incorrectly matched to a Signature False Positive status, this will cause all traffic to be blocked and as a result, intervention will be needed. FortiDDoS uses a more sophisticated approach to estimate appropriate IPs and other problematic issues by monitoring normal traffic and then a Reputation Penalty scoring system. This technology blocks problematic IPs and then re-evaluates these attacks at a user-defined time, every 15 seconds by default.If the Troubleshooting IP continues to be considered a threat in any of these re-evaluation periods, the score will increase in the Reputation Penalty system and eventually fall into the Black List if damage is done to the user-defined Threshold.

Easy FortiDDoS settings and management

By default, FortiDDoS starts, and under these conditions, its automated learning tool creates a basis for program traffic patterns. Regardless of the default or defined Threshold status, this technology automatically protects the user against DDoS attacks and saves security teams time to configure, profile, analyze reports, or wait for Signature updates.

The used Real-Time reporting dashboards and processes provide users with the tools they need to review attacks and threats against their services. Users can also submit reports according to their needs or plan them on a regular basis. Dashboards allow users to view and understand the attack process in a simple and usable combination. In either the overall reporting situation or detailed granular attack analysis, this technology provides comprehensive information on service-level attacks and responses to reduce specific events or events over time.

Flexible defense mechanisms

FortiDDoS protects the user against all DDoS attacks including Bulk Volumetric, Layer 7 Application and SSL / HTTPS attacks . In fact, this technology includes protection against all attacks from the most basic to the most advanced.

Volumetric Bulk Attacks

These attacks are the first type of attack and are still considered a serious threat today. While ISPs may prevent simple attacks, these attacks are increasingly used to cover more sophisticated application-level attack methods. The simplest way to deal with this type of threat is to block all traffic until the attacks stop. The FortiDDoS IP Reputation scoring system allows for trouble-free traffic while limiting problematic IPs. This process not only provides users with the protection they need, it also minimizes the impact of False Positive resulting from the Client’s uninterrupted traffic.

Application layer attacks

These types of attacks are a growing source of DDoS attacks and try to exploit vulnerabilities in a service to stop resources that are inaccessible. These types of attacks usually fall under the Bulk Volumetric attacks , but they can also occur separately. Since these types of attacks require much less bandwidth to make a service outage, they are more difficult to identify and are usually routed directly from the ISP. All large and small attacks that target Layer 7 cause service-level changes that are identified and mitigated through the FortiDDoS behavior analysis engine .

SSL -based attacks

This type of attack uses SSL-based encryption to hide the contents of the attack packets; in addition, encryption means less available resources that need to be stopped . Most Signature -based solutions to conform to known attack profiles require traffic decoding. With the help of a behavioral system such as FortiDDoS, these attacks can be detected without the need for decoding, as they cause behavioral changes. These changes can be compared with the normal behavior of the system and can be understood from existing sources. When relevant resources are threatened, FortiDDoS responds to attacks in a timely and timely manner.

DNS-based attacks actually target authoritative and recursive DNS servers. Organizations owning DNS servers are at risk of DDoS attacks, thus targeting these resources by exploiting vulnerabilities in DNS servers to manage requests and traffic. FortiDDoS is the only platform available to mitigate DDoS attacks that checks all DNS traffic and protects against all types of DDoS attacks. These attacks utilize a set of DNS responses to requests, NXdomain Queries, and DNS Header Disruptions as they enter DNS servers. Advanced DNS Protection is available on most FortiDDoS models.

The second (final) part of this series of articles discusses other applications of FortiDDoS equipping.

ــــــــــــــــــــــــــــــــــ

Using FortiDDoS Equipment to Prevent DDoS Attacks – Part I

Using FortiDDoS Equipment to Prevent DDoS Attacks – Part 2 (Final)

Sabir Hussain
About Sabir Hussain This website is maintained by Sabir Hussain. Sabir is as an Independent consultant, professional blogger site has started as a simple bookmarking site, but quickly found a large following of readers and subscribers. Connect on: Google + or Feel free to network via Twitter.@LeveSpace http://www.LeveSpace.com
http://www.levespace.com