DDoS specialist NETSCOUT has released the latest version of Arbor Edge Defense (AED), which includes a new ML-based Adaptive DDoS Protection. This secures companies, reduces risks and costly network downtime.
According to NETSCOUT's latest DDoS Threat Intelligence Report, a new breed of dynamic DDoS attacks that leverage multiple vectors and techniques to launch botnet-based, direct-path, state-exhaustion, and application-layer attacks, and designed to bypass conventional static network and cloud-based DDoS mitigation increased significantly.
DDoS attacks are becoming more dynamic
Any organization today is at serious risk if it doesn't deploy an effective on-premises DDoS solution to protect its network edge, internet-facing services, and critical stateful infrastructure such as firewalls and load balancers from these ever-evolving attacks. Attackers can send dynamic direct-path DDoS traffic at any time and rapidly change attack vectors during the attack, making them nearly impossible to mitigate without the right technology.
With AED's Adaptive DDoS Protection, IT teams now have a scalable, stateless packet processing solution that delivers unmatched visibility into more than 50% of all Internet traffic, real-time global DDoS threat intelligence, decades of DDoS mitigation experience, and software intelligence powered by machine Learning (ML) to automatically detect, adapt to, and mitigate dynamic DDoS attacks.
Automated AED protects businesses from threats
Deployed at the internet edge in front of any firewall, AED inspects inbound and outbound traffic using stateless packet processing, global DDoS threat intelligence, and ML. This blocks incoming cyber threats including DDoS attacks and other massive malicious traffic. It protects and offloads firewalls, load balancers or VPN concentrators and stops the spread of malware within an organization.
AED can also block outbound communications sent from compromised internal devices to websites operated by malicious actors to prevent data leakage and other malware activities. The threat is contained and the IT team has time to investigate and remove it before it can cause any further damage. In the event of a large volumetric DDoS attack, AED's cloud signaling capability integrates with cloud DDoS protection providers, including NETSCOUT's Arbor Cloud, to intelligently and automatically balance the attack response between cloud-based volumetric protection and on-premises adaptive DDoS attack protection to coordinate.
50 percent of all internet traffic at a glance
NETSCOUT ASERT, the company's team of experts in security research and DDoS attack mitigation, works with over 500 Internet Service Providers (ISPs) to host a unique sensor network called ATLAS. With over 400 Tbps of international transit traffic received every second of every day from 93 countries, 600 industries and more than 31.000 autonomous systems, ATLAS ASERT provides unmatched visibility into more than 50% of all internet traffic and DDoS attack activity in real-time.
ASERT analyzes the ATLAS data and communicates its findings to the Arbor Edge Defense (AED) solution via the ATLAS Intelligence Feed (AIF). AIF continuously provides AED with highly curated information that constantly updates the IP addresses of bots and reflectors/amplifiers actively involved in DDoS attacks around the globe. AED's adaptive DDoS mitigation capabilities build on ASERT's experience and use ML-based algorithms to automatically recommend changes to countermeasures designed to stop dynamic DDoS attacks.
More at Netscout.com
About NETSCOUT NETSCOUT SYSTEMS, INC. helps secure digital business services against security, availability and service disruptions. Our market and technology leadership is based on the combination of our patented smart data technology with intelligent analytics. We provide the comprehensive, real-time insight that customers need to accelerate and secure their digital transformation. Our advanced Omnis® cybersecurity platform for threat detection and mitigation offers comprehensive network visibility, threat detection, contextual investigations and automated mitigation at the network edge.