Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Similar documents
Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide. Issue 05 Date

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Database Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.

CDN. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Database Security Service. Service Overview. Issue 16 Date HUAWEI TECHNOLOGIES CO., LTD.

Live Streaming Accelerator. Quick Start. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Domain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Configuring attack detection and prevention 1

AD SSO Technical White Paper

Huawei esight LogCenter Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date PUBLIC

Configuring attack detection and prevention 1

Eudemon 1000E. Eudemon 1000E Series Product Quick Reference. Huawei Technologies Co., Ltd.

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

Attack Prevention Technology White Paper

Elastic Load Balance. User Guide. Issue 14 Date

esight V300R001C10 SLA Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI Secospace USG Series User Management and Control White Paper

Elastic Load Balancing. User Guide. Date

OceanStor 9000 InfiniBand Technical White Paper. Issue V1.01 Date HUAWEI TECHNOLOGIES CO., LTD.

Domain Name Service. FAQs. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD.

esdk Storage Plugins 1.0.RC4 Compilation Guide 01(vRO) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Cloudflare Advanced DDoS Protection

Object Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

NIP6000 Next-Generation Intrusion Prevention System

Computer Security: Principles and Practice

Chapter 10: Denial-of-Services

DENIAL OF SERVICE ATTACKS

SecBlade Firewall Cards Attack Protection Configuration Example

HG531 V1 300Mbps Wireless ADSL2+ Router Product Description. Issue _01 HUAWEI TECHNOLOGIES CO., LTD.

Operation Guide for Security NEs Management

Third-Party Client (s3fs) User Guide

Chapter 7. Denial of Service Attacks

DDoS Testing with XM-2G. Step by Step Guide

SYN Flood Attack Protection Technology White Paper

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Third-Party Client (s3fs) User Guide

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Imma Chargin Mah Lazer

espace SoftConsole V200R001C02 Product Description HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date

Copyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer

Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

Detecting Specific Threats

Configuring Flood Protection

Energy Saving Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

S Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

TDC DoS Protection Service Description and Special Terms

Technical Specifications

Technical White Paper for NAT Traversal

BGP/MPLS VPN Technical White Paper

H3C SecPath Series Firewalls and UTM Devices

Workspace. User Guide (Administrators) Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

HP High-End Firewalls

SEP Technology White Paper

Image Recognition. SDK Reference. Issue 09 Date HUAWEI TECHNOLOGIES CO., LTD.

Corrigendum 3. Tender Number: 10/ dated

Basic Concepts in Intrusion Detection

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

My Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

A (sample) computerized system for publishing the daily currency exchange rates

Quidway S5700 Series Ethernet Switches V100R006C01. Configuration Guide - Ethernet. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei OceanStor ReplicationDirector Software Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei Cloud Fabric Data Center Security and Application Optimization Solution

Huawei MZ110 NIC V100R001. White Paper. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD.

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HP Load Balancing Module

Grandstream Networks, Inc. UCM6100 Security Manual

Additional Security Services on AWS

Workspace. User Guide (Administrators) Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action

haltdos - Web Application Firewall

APT Protection.

Workspace. User Guide (Administrators) Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

H3C S10500 Attack Protection Configuration Examples

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

User s Manual. How to configure and use FortGuard Professional Anti-DDoS Firewall

Enterprise D/DoS Mitigation Solution offering

CSE 565 Computer Security Fall 2018

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

Huawei FusionSphere 6.0 Technical White Paper on OpenStack Integrating FusionCompute HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

Check Point DDoS Protector Introduction

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

MPLS OAM Technology White Paper

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

USG2110 Unified Security Gateways

Customer Support: For more information or support, please visit or at Product Release Information...

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

Transcription:

Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://e.huawei.com Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. i

Contents Contents 1 Concepts... 1 1.1 What Is?... 1 1.2 What Are a SYN Flood Attack and an ACK Flood Attack?... 1 1.3 What Is a CC Attack?... 1 1.4 What Is a Slow HTTP Attack?... 2 1.5 What Are a UDP Attack and a TCP Attack?...2 1.6 What Is a Black Hole?... 2 1.7 What Is the Million-level IP Address Blacklist Database?... 2... 3 2.1 What Restrictions Does Have?...3 2.2 What Services Can I Use In?... 3 2.3 How Do I Use?...3 2.4 What Kinds of Attacks Does Defend Against?...4 2.5 Will I Be Promptly Notified When an Attack Is Detected?... 4 2.6 What Service Can I Use When My Service Traffic Is Larger Than the Defense Limit?...4 2.7 What Should I Do If My Service Is Frequently Attacked?... 5 2.8 What Is the Difference Between ELB Defense and EIP Defense?... 5 2.9 What Is the Maximum Protection Bandwidth for Regions in China?...5 2.10 Why Is the Number of Times of Cleaning Different from the Number of Attacks for the Same Instance IP Address?... 5 2.11 Is Enabled by Default?... 6 2.12 Is the Free Protection Capability of 5 Gbit/s for a Region or a Single IP Address?... 6 2.13 Will a Black Hole Be Triggered for My Business According to the Displayed Black Hole Threshold?...6 2.14 How Do I Temporarily Disable?... 6 2.15 Do I Need to Clear the Resources of When I Deregister an Account?... 7 Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. ii

1 Concepts 1 Concepts 1.1 What Is? The traffic cleaning service ( for short) defends resources (Elastic Cloud Servers (ECSs), Elastic Load Balance (ELB) instances, and Bare Metal Servers (BMSs)) on HUAWEI CLOUD against network- and application-layer distributed denial of service (DDoS) attacks and sends alarms immediately when detecting an attack. In addition, improves the utilization of bandwidth and ensures the stable running of users' services. monitors the service traffic from the Internet to ECSs, ELB instances, and BMSs to detect attack traffic in real time. It then cleans abnormal traffic according to userconfigured defense policies without affecting service running. In addition, monitoring reports are generated, presenting users with clear network security evaluations. 1.2 What Are a SYN Flood Attack and an ACK Flood Attack? A SYN flood attack is a typical denial of service (DoS) attack. Utilizing the loop hole in the Transmission Control Protocol (TCP), the attacker sends a huge number of forged TCP connection requests to the target to exhaust its resources (fully loaded CPU or insufficient memory). Consequently, the target fails to respond to normal connection requests. An ACK flood attack works in a similar mechanism as a SYN flood attack. 1.3 What Is a CC Attack? In a challenge collapsar (CC) attack, the attacker uses a proxy server to generate and send disguised requests to the target host. In addition, the attacker controls other hosts in the Internet and makes them send large numbers of data packets to the target server to exhaust its resources. In the end, the target server stops responding to requests. As you know, when many users access a web page, the page opens slowly. So in a CC attack, the attacker simulates a scenario where a large number of users (a thread represents a user) are accessing pages all the time. Because the accessed pages all require a lot of data operations (consuming many CPU Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 1

1 Concepts resources), the CPU usage is kept at the 100% level for a long time until normal access requests are blocked. You can use the CC defense function to control the HTTP request rate. 1.4 What Is a Slow HTTP Attack? Slow HTTP attacks are a variation of CC attacks. Here is how slow HTTP attacks work: The attacker establishes a connection to the target server which allows HTTP access. Then the attacker specifies a large content length and sends packets in an extremely low rate, such as one byte per one to ten seconds. The connection is maintained this way. If the attacker keeps establishing such connections, available connections on the target server are slowly consumed and the server will stop responding to valid requests. 1.5 What Are a UDP Attack and a TCP Attack? Exploiting the interaction characteristics of UDP and TCP, attackers use botnets to send large numbers of various TCP connection packets or UDP packets to exhaust the bandwidth resources of target servers. As a result, the servers become low in processing capability and fail to work properly. 1.6 What Is a Black Hole? A black hole refers to a period of time when external communication to an attacked server is limited. When your server is under a massive-traffic attack, will trigger a carrier's black hole, that is, traffic is discarded on the carrier side and external access requests to the server are blocked, to relieve the traffic pressure on the equipment room. When the attack stops, as detected by the system, the black hole is removed automatically. Because carriers have strict limits on the removal time and frequency of black holes, black holes cannot be manually removed and you have to wait for the system to remove them automatically. 1.7 What Is the Million-level IP Address Blacklist Database? The million-level IP address blacklist database refers to the database of millions of malicious IP addresses collected by experts in the past years. When users' services are attacked by these IP addresses, responds to those attacks first to defend your servers in a timely manner. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 2

2.1 What Restrictions Does Have? cleans up to 5 Gbit/s traffic. automatically limits traffic exceeding 5 Gbit/s. Therefore, loss of normal access traffic can occur. For an application with normal service traffic larger than 5 Gbit/s, you are advised to purchase the Advanced service on HUAWEI CLOUD to improve the defense capacity. 2.2 What Services Can I Use In? supports traffic cleaning only for ECSs, ELB instances, and BMSs on HUAWEI CLOUD. 2.3 How Do I Use? works automatically after you enable defense for IP addresses. Step 1 Log in to the management console. Step 2 Click in the upper left corner of the management console and select the region and project. Step 3 Step 4 Choose Security >. The service management page is displayed. On the Instance List page, enable for the desired instance IP address. Enabling for multiple IP addresses Click the Enable for All Instances button for all instance IP addresses that are not protected. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 3

Enabling for one IP address a. In the row containing the desired IP address, click Enable. b. Click OK in the displayed dialog box. ----End 2.4 What Kinds of Attacks Does Defend Against? helps users cope with traffic attacks with ease. It can precisely identify connection exhaustion and slow-connection attacks and can help users defend against the following attacks: Web server attacks Such as SYN flood, HTTP flood, Challenge Collapsar (CC), and slow-connection attacks Game attacks Such as User Datagram Protocol (UDP) flood, SYN flood, Transmission Control Protocol (TCP), and fragment attacks HTTPS server attacks Such as SSL DoS and DDoS attacks DNS server attacks Such as attacks targeted at vulnerabilities in the Domain Name Server (DNS) protocol stack, DNS reflection attacks, DNS flood attacks, and DNS cache-miss attacks 2.5 Will I Be Promptly Notified When an Attack Is Detected? Yes, if you enable alarm notification. On the console, click the Alarm Notification tab to enable the alarm notification function, which enables you to receive alarms (by SMS or email) if a DDoS attack is detected. 2.6 What Service Can I Use When My Service Traffic Is Larger Than the Defense Limit? For traffic exceeding 5 Gbit/s, use Advanced on HUAWEI CLOUD, which provides larger protection bandwidth and higher reliability than. Advanced can defend against various large-traffic attacks, so that your services can run stably against DDoS threats from the black market, malicious competitors, and hackers. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 4

2.7 What Should I Do If My Service Is Frequently Attacked? In addition to using, you can perform the following actions to improve network security: Install system patches in a timely manner. Regularly back up important system information (such as system configuration). Set complicated passwords for accounts that have high privileges (such as administrator accounts) to reduce risks of being attacked. Regularly check the physical environment of your system and disable unnecessary network services. Make and improve border protection policies to defend against threats from outside your network. Regularly check your system configuration and check daily security logs to discover and handle security risks promptly. Use security devices (such as firewalls) to enhance your network security. Configure security rules on those devices to filter fake data packets. Require your network service provider to control routing access and limit the overall bandwidth. 2.8 What Is the Difference Between ELB Defense and EIP Defense? EIP defense indicates defense for EIPs bound to ECSs or BMSs. ELB defense indicates defense for EIPs bound to ELB instances. To, they are both defense for EIPs against DDoS attacks. 2.9 What Is the Maximum Protection Bandwidth for Regions in China? The maximum defense capability for one instance IP address (EIP) is 5 Gbit/s. The maximum defense capability is 5 Gbit/s for all regions in China. 2.10 Why Is the Number of Times of Cleaning Different from the Number of Attacks for the Same Instance IP Address? Cleaning is triggered automatically when an attack is detected on an IP address. The cleaning lasts for a while. (Only attack traffic is cleaned, and users' services will not be affected.) If, during the cleaning, another attack is detected on the same IP address, the attack will be cleaned together with the previous attack. Consequently, the number of attacks increases by one while the number of times of cleaning does not. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 5

2.11 Is Enabled by Default? Yes. The default protection policy is used. To modify this setting, see Configuring an Anti- DDoS Protection Policy. NOTE Once enabled, cannot be disabled. If it is not needed temporarily, perform How Do I Temporarily Disable?. 2.12 Is the Free Protection Capability of 5 Gbit/s for a Region or a Single IP Address? A single IP address. 2.13 Will a Black Hole Be Triggered for My Business According to the Displayed Black Hole Threshold? Currently, the black hole threshold, duration, and security reputation score displayed are only for demonstration purposes. Your business will not be dragged into a black hole based on the displayed threshold, which means you still get a free protection bandwidth of 5 Gbit/s. 2.14 How Do I Temporarily Disable? Procedure You can set the traffic cleaning threshold to 1000 Mbit/s, a value so large that your IP address instances get almost no protection from. NOTE This value is suitable for temporary disabling of protection for commissioning or other special purposes. You are advised not to use it for a long time. Step 1 Log in to the management console. Step 2 Click in the upper left corner of the management console and select the region and project. Step 3 Step 4 Choose Security >. The service management page is displayed. In the instance list, locate the desired instance and click Settings in the Operation column. Step 5 In the dialog box that is displayed, set Protection Settings to Manual and Traffic Cleaning Threshold to 1,000 Mbps. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 6

Step 6 Click OK. ----End 2.15 Do I Need to Clear the Resources of When I Deregister an Account? No. does not consume your resources. This service is enabled by default at no additional charge. Therefore you do not need to clear the resources upon deregistration. Issue 11 (2018-05-28) Copyright Huawei Technologies Co., Ltd. 7