DDoS protection

Peakflow SP protects critical IP services using a set of methods for detecting and repelling attacks and anomalies.

We offer a powerful protection against DDoS attacks on the software-hardware complex ARBOR PEAKFLOW SP. This solution is designed for global analysis and visualization of traffic, as well as ensuring the security and availability of the entire network associated with protection against distributed attacks (DDoS).

Service cost

$55

Activation on DDos protection (One-time payment)

$19.55 /mo.

Protection of 1 IPv4-address

The operating principle of Peakflow SP

The principle is based on a detailed general analysis obtained from network resources based on Flow, BGP and SNMP data, as well as on the basis of data obtained from networks of other operators where this solution has been installed. Peakflow SP is a solution that is not a point of failure in the network, because all elements of the system are included in the network not on way of the traffic path.

In the absence of threats, the equipment is monitors situation, and in case of any attack it can redirect traffic into a «black hole», generate ACL for routers (uplinks or boarders) to block parasitic traffic or distribute these ACLs automatically to boarders using the FlowSpec protocol.

Methods for detecting and repelling attacks

Peakflow SP protects critical IP services using a set of methods for detecting and repelling attacks and anomalies.

Protection on IP level

  • Packet Validation (TCP / UDP / ICMP)
  • Reset TCP sessions
  • Black and white lists
  • Zombie blocking

Blocking of known attacking hosts

Blocking of known attacking hosts using black and white lists. Authorized nodes are added to the white list, zombies and compromised nodes whose traffic is to be blocked to the black list.

Blocking of application-level malicious code (exploits)

Malicious application-level code blocking is performed using black and white lists. Authorized nodes are added to the white list, zombies and compromised nodes whose traffic is to be blocked are in black list.

Web Threat Protection

Protection against web threats and anomalies is performed using mechanisms for detecting and repelling specific HTTP attacks. The same mechanisms help to cope with a sudden increase of attendance (“flash-crowd” attacks).

  • Blocking of incorrect packages;
  • HTTP request restrictions;
  • Cleaning using Regular Expression
  • Contexts for HTTP Security
  • URL Filter Lists
  • Check client stack

Protecting DNS service from botnets

Protection of the DNS service from botnets wich masking and transmitting exploits to the infrastructure and DNS services. Arbor Peakflow solutions provide specialized means for detecting and repelling attacks on the DNS service.

  • Cleaning by using regular expressions;
  • Checking client stack;
  • DNS query restriction;
  • Cache Poisoning Protection;
  • Batch detection of DNS attacks;
  • DNS filter lists;
  • Contexts for DNS security.

Protecting critical VOIP services

Protecting critical VOIP services from automated scripts and botnets which using flood attacks and packets with incorrect requests. Arbor Peakflow solutions provide specialized means for detecting and repelling attacks on VolP / SIP services.

  • Block invalid packages;
  • Restriction of SIP requests.

Botnet control

Control botnets using specialized, constantly improving means of detecting zombies and preventing infrastructure attacks from infected hosts.

Providing basic protection by building self-learning patterns of network behavior. The obtained information can be used to identify abnormal traffic and block it at the moment of attack.