APS 6.0 Defend Unit 1 APS Overview - 20180823
APS 6.0 Defend Unit 1 APS Overview - 20180823
APS 6.0 Defend Unit 1 APS Overview - 20180823
APS is Arbor’s
on-premise security
device focused on
stopping availability
threats
more attacks
Increased Volume Increased Complexity Increased Frequency
Largest volumetric DDoS has grown Over 25% of attacks are now >50% of data center operators
from 40 to 300 Gbps in 3 years application-based DDoS mostly experience >10 attacks per month
targeting HTTP, DNS, SMTP
Average Number of
Largest 7 DDos Attacks DDos Attacks per
Against IDC Month
ISP 1
ISP 2 ISP
Firewall IPS
SATURATION Load
Balancer
Target
Applications &
ISP n
Services
DATA CENTER
Attack Traffic
Good Traffic
ISP 1
DATA CENTER
Exhaustion of
State
ISP 2 ISP
Firewall IPS
Load
Balancer
Target
Applications &
ISP n
Services
Attack Traffic
Good Traffic
ISP 1
DATA CENTER
Exhaustion of
ISP 2 ISP Service
Firewall IPS
Load
Balancer
Target
Applications &
ISP n
Services
Attack Traffic
Good Traffic
Exhaustion of
ISP 2 ISP Service
IPS
Firewall
SATURATION Load
Balancer
EXHAUSTION Target
Applications &
ISP n
Services
ISP
Arbor APS
ISP
On-premise
ISP 1
DDoS Protection
DATA CENTER
ISP 2 ISP
IPS
Firewall Load
Balancer
Target
Arbor APS Applications &
ISP n
Services
Cloud-based
Mitigation
Cloud-based
DDoS Protection
ISP 1
Cloud DATA
Signaling CENTER
ISP 2 ISP
IPS
Firewall
Load
Balancer
Target
ISP n Applications &
Services
On-premise
DDoS Protection
Good: On-premise
Better: On-premise + Cloud-based
Best: On-premise + Cloud-based + Cloud Signaling
• Hypervisors supported:
– VMware vSphere Hypervisor 5.5 or later
– Kernel-based Virtual Machine (KVM)
• Virtual APS (vAPS) provides the following interfaces (see note below):
– 2 management interfaces: mgt0 and mgt1
– 2 protection interfaces: ext0 and int0
• Minimum/maximum system resources for the host server are:
– 2 – 4 CPUs, 100 GB hard disk space, 6 – 12 GB RAM
– Note: with the minimum configuration vAPS supports up to 10 Protection Groups
– To increase the pps throughput rate and the number of supported protection groups recommend 4
CPUs and 12 GB RAM to support up to 50 Protection Groups
• vAPS does not support the following features and functions:
– NTP – however, the virtual machine synchronizes its clock with the hypervisor, which should have NTP
enabled
– Shell access
• Can use Cloud-Init to initialize vAPS (OpenStack)
• Minimum throughput limit requests for vAPS from the cloud-based license server now is 20
Mbps (used to be 50 Mbps)
• Note: For vAPS installation instructions, see the Arbor Networks® Virtual APS Installation
Guide
©2018 ARBOR® CONFIDENTIAL & PROPRIETARY 20
Arbor vAPS Support for Amazon Web Services (AWS)
You can install and configure vAPS on Amazon Web Services (AWS)
• Requires Arbor vAPS version 5.12 or later
• You must have an AWS account
• Create an instance in Amazon’s Elastic Computer Cloud (EC2) in one of your
organization’s Virtual Private Clouds (VPC)
– Note: vAPS is not supported in Amazon’s EC2 Classic
• Arbor recommends that your VPC have at least three subnets:
– An edge subnet
– A protected subnet
– A management subnet
• Arbor assumes that you are familiar with AWS and the configuration of
VPCs and instances
• To install vAPS on AWS you can use the EC2 Management Console or you
can modify an example script from Arbor
General Attacks
TCP Attacks
state-exhausting using
TCP SYN Floods
packet-based threat detection & Window Size Attacks (Sockstress, etc)
Slow TCP Connections (TCP Idling, etc)
blocking methods HTTP Attacks
Slow HTTP Connections (Slowloris, Pyloris)
HTTPS / SSL Based Attacks
HTTP GET / POST URL Floods
DNS Attacks
DNS Floods
DNS Authentication
Other Attacks
UDP / ICMP Floods
IP / TCP / UDP Fragment Floods
SSL Renegotiation
©2018 ARBOR® CONFIDENTIAL & PROPRIETARY 25
ATLAS® Intelligence Feed (AIF)
Malware
Location-based Threats
Domain & IP reputation of today’s active threats
Email Threats
Targeted Attacks
Mobile Threats
DATA
ISP 1 CENTER
ISP
ISP 2
IPS
Arbor APS Load
Balancer
Arbor APS
Arbor APS
ISP ISP
Data Center
ISP
OTF
Arbor APS
ISP
• Protection from the threats that can affect traffic that originates from
within your network
– Blocks threat traffic that is outbound from the network
– Blocks communication with known C&C actors
• Protect internal network from becoming source of an attack
– Prevent reflection/amplification attacks from being generated within the
internal network
ISP
IPS
Firewall
Data Center
to the cloud
Internet Service Provider
volumetric DDoS
Service
protection SATURATION
1. Service Operating
Normally
• Immediate protection with Arbor Arbor
2. Attack Begins and
seamless handoff to ISP’s DDoS Networks APS
Initially Blocked by
filtration services
Data Center Network
Firewall / IPS / WAF Arbor Networks APS
– “Clean Pipes” 3. Attack Grows Exceeding
Bandwidth
Cert
Key
Cert
Key
Encrypted Traffic
Traffic
Encrypted
Blocked
Copy
DoS Attack
Decrypted DoS
Detected
Arbor APS
Appliance
Private
SERT Datacenter
Security Engineering & Response Team
1
5 1a. APS (appliance or virtual)
Continuously backed by in on-premise data center
global threat intelligence 1b. vAPS in AWS cloud.