Huawei Anti-DDoS Solution v-IsA Technical White Paper
Huawei Anti-DDoS Solution v-IsA Technical White Paper
Huawei Anti-DDoS Solution v-IsA Technical White Paper
1
Key Points:
DDoS attacks are more prone to targeting
Executive Summary:
provision of Internet as well as DDoS attacks and their variants. DDoS attacks are more
of DDoS attacks.
prone to targeting the application layer especially WEB and DNS services, launched
mainly out of malicious competition. Profitable online services are allegedly undergoing
more and longer attacks, according to Huawei Cloud Security Center.
Currently, various functional evasion techniques are used on botnets to keep them alive
longer. Typical techniques used are the domain generation algorithm (DGA) and Fast-flux
techniques, which quickly replace C&C server IP address. The common defensive measure
of shutting down the C&C server (source of attacks) does not work effectively when
dealing with DDoS attacks launched using botnets. Since traditional attack detection and
defensive measures fail to defend against new types of DDoS attacks, there is rapidly
growing demand for new defensive measures which provide accurate detection and
correct identification of attacks.
Trends:
1) Application services are suffering more
DDoS attacks with light traffic and low
speed.
2) DoS attacks are becoming increasingly
complex.
3
Insufficiency of
traditional defenses
technical:
1) Maintaining a good user experience while
eliminating terminal misjudgment makes
defense against Http attacks extremely
Insufficiency of traditional
defenses against new DDoS
attacks
difficult.
2) Identification of spoofing sources is hard
for DNS Cache Miss attack defense.
2) Insufficient session techniques hardly
detect light-traffic attacks.
real DNS buffer server, defending against such an attack will be extremely difficult. An
effective source reputation mechanism is required such that source reputation is analyzed
for an ongoing session to distinguish between unauthorized and authorized accesses.
3. Insufficient session techniques hardly detect light-traffic attacks.
Among botnet based DDoS attacks, light-traffic attacks are the hardest to defend
against. They usually carry genuine IP addresses and exploit application access
vulnerabilities (after three handshakes with the application server). Such attacks can only
be detected through ongoing session monitoring and user behavior analysis. Detecting
and eliminating such attacks requires more precise defenses and better performance on
security devices than common attacks. At this moment, no vendor provides sufficient
session monitoring techniques capable of detecting and defending against light-traffic
attacks.
edges, Huawei anti-DDoS solution introduces the first V-ISA reputation security system in
the industry and unique anti-DDoS product featuring advanced detection mechanisms all
while delivering over 100 Gbit/s of performance on a single device. This solution provides
a powerful tool for carriers, enterprises, and data centers to accurately defend against
new DDoS attacks.
1. Working mechanism of the V-ISA
In most cases, the system learns the characteristics of Layer-3, Layer-4, and Layer-7 traffic
and sets up service access models of the protected IP addresses, including service access
models of sources. Then the system compares traffic statistics with the service models
to detect anomalies. To prevent any impact on customer experiences, the system gives
top N traffic with good reputations bonus points during traffic model learning. When a
security event occurs, the solution ensures that access from users with a good reputation
V, short for Virtual, indicates that Huawei anti- DDoS system can
multi-tenant scenario;
not only improves the defense efficiency but also lowers the number
From the active time of IP addresses, the system can tell zombie
activation time. Then the system adds the active IP addresses to the
Whitelist &
blacklist
Whitelist
Blacklist
Source
authentication
Client
AntiDDoS
Client
AntiDDoS
1st SYN
SYN
2nd SYN
SYN ACK
wrong SEQ
No match
Client
AntiDDoS
SYN/ACK/RST N link
Data transfer
Cookie bounce,
verifying the source
Off 10% repeated fake
source attack packets
AntiDDoS
TCP handshake
Data transfer
N link
No reply
Client
N data
RST
Operation by list
Session
reputation
Portion statistics
N data
Normal
Over high
Session
record
Statistics on the
portion of packets for
session to packets data
trams mission
Session credits
generated
As long as the model is correct, the behavior analysis technology does not have any adverse
impact user experience. In most cases, behavior analysis is used with session reputation
and source authentication to enhance defense accuracy. For example, behavior analysis can
detect attack sources that pass the transport-layer source authentication but have abnormal
TCP packet rates. To protect the HTTP server on a fixed network, source behavior analysis
can be configured to redirect the packets that exceed the source access baseline. Similarly,
in the DNS defense scenario, behavior analysis can be configured to detect DNS servers
under attack and function with source authentication on the suspicious sources to minimize
impact on legitimate user accesses. In conclusion, a complete behavior analysis involves
multi-dimensional analysis and usually needs to function with source authentication.
Consequently, this has high requirements on device performance. Due to high costs of
development and limited security capabilities, most security vendors are unable to produce
anti-DDoS products capable of conducting fine-tuned behavior analysis, preventing them
from conducting a world class defense against attacks. Huawei anti-DDoS devices, employs
the industry-leading distributed multi-core architecture, integrate four high-performance
CPUs on each SPU to deliver 10 Gbit/s application-layer behavior analysis capabilities, which
set it in a class of its own, delivering a world class, complete anti-DDoS defense suite.
Conclusion
Empowered by the V-ISA reputation detection system, Huawei anti-DDoS solution
provides powerful and intelligent defense mechanisms with seven protection layers
specific to each of the seven OSI layers for a complete anti-DDoS defense: deformed
packet filtering, by-feature packet filtering, application-layer source authentication,
source authentication, session analysis, behavior analysis, and smart rate limiting.
Deformed packet filtering: filters non-standard packets.
By-feature packet filtering: identifies attack traffic (by analyzing for its unique
fingerprint using Huawei-proprietary fingerprint learning and comparing algorithm),
References:
2013 Botnets and DDoS Attacks Report.pdf
http://enterprise.huawei.com/ilink/enenterprise/download/HW_315881
Huawei AntiDDoS Solution
http://enterprise.huawei.com/topic/AntiDDoS_2013_en/index.html
V-ISA Reputation Mechanism,
Enabling Precise Defense against New DDoS Attacks
Other trademarks, product, service and company names mentioned are the property of their respective owners.
General Disclaimer
The information in this document may contain predictive statements including,
without limitation, statements regarding the future financial and operating results,
future product portfolio, new technology, etc. There are a number of factors
that could cause actual results and developments to differ materially from those
expressed or implied in the predictive statements. Therefore, such information
is provided for reference purpose only and constitutes neither an offer nor an
acceptance. Huawei may change the information at any time without notice.
www.huawei.com