Arbor Networks, a provider of DDoS attack detection and mitigation solutions for enterprise and service provider networks, has unveiled the latest Peakflow platform that dramatically reduces time to detect and mitigate DDoS attacks.
The new Peakflow 7.0 allows service providers to detect Fast Flood DDoS attacks in as little as one second and initiate mitigation in less than thirty seconds.
Time to mitigation is critical for service providers because Fast Flood attacks can ramp up to multi-hundred gigabits in size in a matter of seconds, and have the potential to cause significant collateral damage across a provider network.
Through the end of the third quarter, Arbor has seen more than 130 attacks larger than 100Gbps, a dramatic spike in the frequency of volumetric attacks compared to previous quarters.
In 2014, the DDoS landscape has been dominated by these very large attacks that leverage reflection/amplification capabilities within such network elements as DNS, NTP and more recently Simple Service Discovery Protocol (SSDP), Arbor says.
Arbor’s Peakflow DDoS protection platform consists of two main components: Peakflow and the Peakflow Threat Management System.
Peakflow combines network-wide anomaly detection and traffic engineering with the Peakflow Threat Management System’s carrier-class threat management, which automatically detects and surgically removes only attack traffic, while maintaining other business traffic.
With these capabilities, Peakflow helps proactively fend off malicious threats such as botnets and volumetric and application-layer distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services, the company said.
The new Peakflow 7.0 includes built-in SSL inspection to block encrypted attacks and enhanced threat protection delivered as part of the ATLAS Intelligence Feed.
Redesigned DDoS attack alert dashboards now include substantial new data analysis for DDoS attacks, including geographic information, network information, and automatic identification of major attack patterns to enable operators to quickly and easily identify the attack and understand how to block it.