Vulnerabilities / Threats
2/26/2014
06:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014

AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks

SAN FRANCISCO, Feb. 24, 2014 /PRNewswire/ -- RSA -- Huawei, a leading global information and communications technology (ICT) solutions provider today announced the launch of its next-generation anti-DDoS solution at the RSA Conference 2014. Huawei's best-in-class, AntiDDoS8000 Series offers industry leading security capabilities, including 1Tbps performance and protection from application layer, mobile device and outbound Distributed Denial of Service (DDoS) attacks.

"DDoS attacks have become much more varied. Today we're seeing a rise in application-based attacks as well as attacks launched directly from mobile devices," said Liu Shaowei, Huawei's Networking Business Unit General Manager. "These new breeds of advanced attacks are hard to detect with traditional flow-based anti-DDOS solutions but can be detected with Huawei's new AntiDDoS8000 appliance."

Huawei's new AntiDDoS8000 appliance can defend several hundred Gigabits-per-second DDoS threats by employing advanced features such as signature learning, behavior analysis, reputation mechanism and Big Data analytics.

"Huawei's anti-DDoS solution protected us from over 40,000 DDoS attacks last year -- equivalent to over 100 attacks per day -- at a maximum traffic rate of 100 Gbps. This is a powerful and user-friendly system that provides precise protection," said Xinguo Wei, Senior Expert of Information Security Center, Alibaba Group.

"We tested Huawei's anti-DDoS solution against every DDoS attack that we have ever encountered. Its performance was excellent; therefore, we selected Huawei," Xinguo added.

As the fastest-ever anti-DDoS solution in the industry, Huawei's AntiDDoS8000 appliance can support a new service card with 160Gbps protection performance and a high-density line card with ten 10GE ports. Consequently, the largest model of AntiDDoS8000 can support upwards of 960Gbps performance.

Designed for carriers, data centers, large enterprises, and large Internet commerce providers, the AntiDDoS8000 appliance enhances the defense against application-layer attacks and the attacks in IPv6-IPv4 composite networking. Feature highlights include:

Detection and Mitigation of 100+ DDoS attacks including Application Layer DDoS (HTTP/HTTPS/DNS/SIP, etc.)

Accurate mobile DDoS attack detection mechanism and zero false positive to mobile traffic when protecting mobile Internet service

Prevention of outbound DDoS from data center with a daily update botnets library of 5 million active botnet IP addresses.

The new AntiDDoS8000 is available now. The 160Gbps service card will be available in Q4 of 2014.

For a demo of Huawei's Next Generation AntiDDoS portfolio, visit Booth 2101, South Hall, at RSA 2014 from Feb. 25 – 27.

About Huawei

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world's population. For more information about Huawei ICT solutions, please visit: http://enterprise.huawei.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web