Vulnerabilities / Threats
2/26/2014
06:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014

AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks

SAN FRANCISCO, Feb. 24, 2014 /PRNewswire/ -- RSA -- Huawei, a leading global information and communications technology (ICT) solutions provider today announced the launch of its next-generation anti-DDoS solution at the RSA Conference 2014. Huawei's best-in-class, AntiDDoS8000 Series offers industry leading security capabilities, including 1Tbps performance and protection from application layer, mobile device and outbound Distributed Denial of Service (DDoS) attacks.

"DDoS attacks have become much more varied. Today we're seeing a rise in application-based attacks as well as attacks launched directly from mobile devices," said Liu Shaowei, Huawei's Networking Business Unit General Manager. "These new breeds of advanced attacks are hard to detect with traditional flow-based anti-DDOS solutions but can be detected with Huawei's new AntiDDoS8000 appliance."

Huawei's new AntiDDoS8000 appliance can defend several hundred Gigabits-per-second DDoS threats by employing advanced features such as signature learning, behavior analysis, reputation mechanism and Big Data analytics.

"Huawei's anti-DDoS solution protected us from over 40,000 DDoS attacks last year -- equivalent to over 100 attacks per day -- at a maximum traffic rate of 100 Gbps. This is a powerful and user-friendly system that provides precise protection," said Xinguo Wei, Senior Expert of Information Security Center, Alibaba Group.

"We tested Huawei's anti-DDoS solution against every DDoS attack that we have ever encountered. Its performance was excellent; therefore, we selected Huawei," Xinguo added.

As the fastest-ever anti-DDoS solution in the industry, Huawei's AntiDDoS8000 appliance can support a new service card with 160Gbps protection performance and a high-density line card with ten 10GE ports. Consequently, the largest model of AntiDDoS8000 can support upwards of 960Gbps performance.

Designed for carriers, data centers, large enterprises, and large Internet commerce providers, the AntiDDoS8000 appliance enhances the defense against application-layer attacks and the attacks in IPv6-IPv4 composite networking. Feature highlights include:

Detection and Mitigation of 100+ DDoS attacks including Application Layer DDoS (HTTP/HTTPS/DNS/SIP, etc.)

Accurate mobile DDoS attack detection mechanism and zero false positive to mobile traffic when protecting mobile Internet service

Prevention of outbound DDoS from data center with a daily update botnets library of 5 million active botnet IP addresses.

The new AntiDDoS8000 is available now. The 160Gbps service card will be available in Q4 of 2014.

For a demo of Huawei's Next Generation AntiDDoS portfolio, visit Booth 2101, South Hall, at RSA 2014 from Feb. 25 – 27.

About Huawei

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world's population. For more information about Huawei ICT solutions, please visit: http://enterprise.huawei.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.