Vulnerabilities / Threats
2/26/2014
06:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014

AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks

SAN FRANCISCO, Feb. 24, 2014 /PRNewswire/ -- RSA -- Huawei, a leading global information and communications technology (ICT) solutions provider today announced the launch of its next-generation anti-DDoS solution at the RSA Conference 2014. Huawei's best-in-class, AntiDDoS8000 Series offers industry leading security capabilities, including 1Tbps performance and protection from application layer, mobile device and outbound Distributed Denial of Service (DDoS) attacks.

"DDoS attacks have become much more varied. Today we're seeing a rise in application-based attacks as well as attacks launched directly from mobile devices," said Liu Shaowei, Huawei's Networking Business Unit General Manager. "These new breeds of advanced attacks are hard to detect with traditional flow-based anti-DDOS solutions but can be detected with Huawei's new AntiDDoS8000 appliance."

Huawei's new AntiDDoS8000 appliance can defend several hundred Gigabits-per-second DDoS threats by employing advanced features such as signature learning, behavior analysis, reputation mechanism and Big Data analytics.

"Huawei's anti-DDoS solution protected us from over 40,000 DDoS attacks last year -- equivalent to over 100 attacks per day -- at a maximum traffic rate of 100 Gbps. This is a powerful and user-friendly system that provides precise protection," said Xinguo Wei, Senior Expert of Information Security Center, Alibaba Group.

"We tested Huawei's anti-DDoS solution against every DDoS attack that we have ever encountered. Its performance was excellent; therefore, we selected Huawei," Xinguo added.

As the fastest-ever anti-DDoS solution in the industry, Huawei's AntiDDoS8000 appliance can support a new service card with 160Gbps protection performance and a high-density line card with ten 10GE ports. Consequently, the largest model of AntiDDoS8000 can support upwards of 960Gbps performance.

Designed for carriers, data centers, large enterprises, and large Internet commerce providers, the AntiDDoS8000 appliance enhances the defense against application-layer attacks and the attacks in IPv6-IPv4 composite networking. Feature highlights include:

Detection and Mitigation of 100+ DDoS attacks including Application Layer DDoS (HTTP/HTTPS/DNS/SIP, etc.)

Accurate mobile DDoS attack detection mechanism and zero false positive to mobile traffic when protecting mobile Internet service

Prevention of outbound DDoS from data center with a daily update botnets library of 5 million active botnet IP addresses.

The new AntiDDoS8000 is available now. The 160Gbps service card will be available in Q4 of 2014.

For a demo of Huawei's Next Generation AntiDDoS portfolio, visit Booth 2101, South Hall, at RSA 2014 from Feb. 25 – 27.

About Huawei

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world's population. For more information about Huawei ICT solutions, please visit: http://enterprise.huawei.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web