<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

Nexusguard Product
By
May 28, 2020

How to detect and mitigate Bit-and-piece DDoS attack

Nexusguard Research identified a new breed of stealthy DDoS attacks known as Bit-and-Piece attacks that target ASN-level CSP networks by dispersing small pieces of junk traffic across a diverse pool of IP addresses across hundreds of IP prefixes. This stealthy tactic is designed to evade detection. Going unnoticed, the convergence of polluted traffic toward the target IP prefix forms a massive traffic flow that can easily go beyond the capacity limits of generic mitigation devices, leading to a high latency at best, or deadlock at worst.

bit-and-piece attackWhy is it difficult for telcos and ISPs to detect and mitigate this attack?

 

Detection

Legacy flow-aware devices such as firewalls, load balancers, IPS, IDS, etc. often fail to detect stealthy
network layer attacks, which could become bottlenecks themselves.

 

Mitigation

When faced with powerful or advanced attacks such as Bit-and-Piece attacks, blackholing traffic to
targeted IP addresses as a mitigation measure is no longer effective nor is it viable.

 

 
How to counter the threat from increasingly complex network attacks?

 

Designed to protect large networks from L3/L4 attacks of all complexities, Nexusguard InfraProtect offers telcos and ISPs the ability to leverage Nexusguard's globally distributed infrastructure to be used as an off-site sandbox to perform traffic analysis, shaping and attack mitigation.

 

The multi-layered detection and mitigation engine features Network Behavior Analysis (NBA) to analyze traffic data in order to detect traffic anomalies and alerts the CSP to divert traffic to Nexusguard’s scrubbing cloud. Only clean traffic is forwarded back to the origin server.

 

op (1)

Benefits
  • • More scalable and agile DDoS protection for CSPs committed to meeting their SLAs
  • • Prevent junk traffic from consuming expensive bandwidth
  • • Transfer security risks to a third-party vendor
  • • Enhance network uptime and availability
  • • Reduce outage-related helpdesk costs
  • • Minimize collateral damage risks
  • • Mitigate multi-vector attacks
  • • Gain real-time traffic visibility and access to attack logs

You may be concerned about the impact posed by “Bit-and-Piece Attacks”, a tactic targeting ASN-level CSP networks and able to bypass traditional detection. It can give a great challenge to the legacy detection and mitigation of traditional telcos and ISPs.