Vulnerabilities / Threats
2/26/2014
06:52 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014

AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks

SAN FRANCISCO, Feb. 24, 2014 /PRNewswire/ -- RSA -- Huawei, a leading global information and communications technology (ICT) solutions provider today announced the launch of its next-generation anti-DDoS solution at the RSA Conference 2014. Huawei's best-in-class, AntiDDoS8000 Series offers industry leading security capabilities, including 1Tbps performance and protection from application layer, mobile device and outbound Distributed Denial of Service (DDoS) attacks.

"DDoS attacks have become much more varied. Today we're seeing a rise in application-based attacks as well as attacks launched directly from mobile devices," said Liu Shaowei, Huawei's Networking Business Unit General Manager. "These new breeds of advanced attacks are hard to detect with traditional flow-based anti-DDOS solutions but can be detected with Huawei's new AntiDDoS8000 appliance."

Huawei's new AntiDDoS8000 appliance can defend several hundred Gigabits-per-second DDoS threats by employing advanced features such as signature learning, behavior analysis, reputation mechanism and Big Data analytics.

"Huawei's anti-DDoS solution protected us from over 40,000 DDoS attacks last year -- equivalent to over 100 attacks per day -- at a maximum traffic rate of 100 Gbps. This is a powerful and user-friendly system that provides precise protection," said Xinguo Wei, Senior Expert of Information Security Center, Alibaba Group.

"We tested Huawei's anti-DDoS solution against every DDoS attack that we have ever encountered. Its performance was excellent; therefore, we selected Huawei," Xinguo added.

As the fastest-ever anti-DDoS solution in the industry, Huawei's AntiDDoS8000 appliance can support a new service card with 160Gbps protection performance and a high-density line card with ten 10GE ports. Consequently, the largest model of AntiDDoS8000 can support upwards of 960Gbps performance.

Designed for carriers, data centers, large enterprises, and large Internet commerce providers, the AntiDDoS8000 appliance enhances the defense against application-layer attacks and the attacks in IPv6-IPv4 composite networking. Feature highlights include:

Detection and Mitigation of 100+ DDoS attacks including Application Layer DDoS (HTTP/HTTPS/DNS/SIP, etc.)

Accurate mobile DDoS attack detection mechanism and zero false positive to mobile traffic when protecting mobile Internet service

Prevention of outbound DDoS from data center with a daily update botnets library of 5 million active botnet IP addresses.

The new AntiDDoS8000 is available now. The 160Gbps service card will be available in Q4 of 2014.

For a demo of Huawei's Next Generation AntiDDoS portfolio, visit Booth 2101, South Hall, at RSA 2014 from Feb. 25 – 27.

About Huawei

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world's population. For more information about Huawei ICT solutions, please visit: http://enterprise.huawei.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5314
Published: 2014-11-23
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

CVE-2014-5325
Published: 2014-11-23
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

CVE-2014-5326
Published: 2014-11-23
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?