AntiDDoS

A solution to combat DDoS attacks on telecom operators and their infrastructure

Solution performance

Response time less than 1 minute

Processing up to 600 million packets per second

Filtering capacity up to 5 Tbps

Protection against 100+ simultaneous attacks

DDoS Protection Solution Architecture

ISP AntiDDoS Solution

The solution utilizes an intelligent distributed traffic analysis module, enabling detection and blocking of a wide range of cyber threats in real time.

How It Works

All operator traffic passes through the Stingray DPI system, which forwards IPFIX Fullflow to the QoE module for detailed analysis. Based on this analysis, the module creates a reference profile of “healthy” traffic, free of attacks and botnet activity.

Using neural networks and machine learning algorithms, the detector identifies deviations from the norm, classifies threats, and identifies their sources. When an attack is detected, an “Attacks” container is created, containing the IP addresses of the attackers and the ports they use. DPI creates specific protocols for each threat type, which it then uses to either completely block this traffic or limit its bandwidth.

The “Attacks” container is updated in real time: if the attack stops, the corresponding IP addresses are removed from the list.

For additional protection, blackhole integration is provided: if the operator’s equipment cannot handle the load, the Attacks container can be passed to a script that automatically adds attackers to the blackhole, ensuring maximum infrastructure protection.

Protection against common attacks on telecom operators

Inbound channel overflow

This type of attack includes:

  • amplification (DNS, NTP, UDP flood, and others)
  • botnet attacks, in which a botnet network creates relatively small amounts of traffic that resemble legitimate traffic, but the total traffic exceeds the operator's incoming channel capacity

Depending on the type of traffic and attack, defense techniques may include blackhole attacks, flowspecs on the uplink channel, creating a list of botnet addresses, and blocking them on Stingray.

High PPS Attack

These include flood and SYN flood attacks, usually involving source IP spoofing. To protect against this, traffic is redirected to the Stingray system for filtering or blackholes of the attacked addresses.

Hacking of operator network elements

Risk is determined by scanning the operator's address space.

Submit a request for a personal demonstration and testing of the solution

Advantages of the Stingray AntiDDoS solution

Distributed architecture ensures high fault tolerance

Adaptive protection and automatic rule updates

Neural network algorithms and DPI provide deep traffic analytics

The solution is flexibly configurable and supports various blocking scenarios

VAS Experts also offers another option for protecting operator networks from DDoS attacks: using only Stingray Service Gateway. This option includes:

  • TCP SYN Flood Protection
  • Fragmented UDP Flood Protection
  • DDoS (LOIC, etc.) protection based on the Turing test (Human Detection)

Requires Stingray Service Gateway with the Automatic DDoS Protection option (DDOS option).

Request a demo

Fill in the form
We will contact you, specify the task, provide access to the documentation and answer your questions.
Choose the solution
We discuss the current situation: traffic volume, available equipment, the functionality you need.
Free trial
Our engineers install the selected software and adapt it to your specific tasks. Сontract — only after the test is successful.