Replies: 2 comments 3 replies
-
Lists of features similar to the ones you provided as examples would be for policies, not Gatekeeper. A policy that allows all flows without restriction has an empty list of features; a policy that only implements "IPv4 Black/White Lists" has a single item; and so forth. Your interpretation that all layer 3/4 attacks are defendable reasonably approximates what Gatekeeper can do. It's not exactly that because as one writes a policy, one can encounter problems of any nature. For example, when a policy can identify if a destination IP address is not in use, it can associate the BPF Any policy feature that requires connection termination (e.g., SSL negotiation) is outside of the scope of Gatekeeper; this is equivalent to thinking of the application layer. Over 90% of DDoS attacks are infrastructure-layer attacks, and Gatekeeper is designed to drastically lower the protection cost to withstand these attacks. Since solutions that address application-layer attacks have a much higher operational cost, having Gatekeeper before these solutions also reduces their operational cost. The full potential of Gatekeeper has not been realized yet. As Gatekeeper deployers write policies to address specific characteristics of their infrastructure, and sometimes narrow needs of the protected applications, we have occasionally learned about features that are not available in other tools. For example, the TCP friendliness that the BPF |
Beta Was this translation helpful? Give feedback.
-
Thanks for the reply. What if we view this topic in terms of attack vector and types? With the premise where the scope is infrastructure-layer attacks, can I say that Gatekeeper's policies are usually crafted by deployers in such a way that it defines the normal and acceptable flow pattern of their own traffic, then punish all those flows that don't obey to it? If this is true, then the actual attack vector / type / technique of the DDoS encountered doesn't matter, because they are always gonna be "abnormal" relative to the defined policies, as long as the policy is accurate enough to distinguish between ligitimate and DDoS traffic. The reason I'm asking this is because it is necessary to make a side-by-side comparison with the commercial products in order to justify the advantage to invest in Gatekeeper over expensive commercial products, and one of the key part is to show that Gatekeeper is as capable as commercial products. (Probably taking more development resources and efforts to get there, but the possibility has to be there.) On the other hand, do you have any suggestion in terms of monitoring? I want to know how much bps / pps of traffic are dropped / granted, preferably grouped by destination IP. If the raw details are available in the log, then I can setup some mechanism to parse and extract information to produce analytics. ps : |
Beta Was this translation helpful? Give feedback.
-
I'm aware that it has been mentioned in the FAQ that "Gatekeeper addresses infrastructure-layer DDoS attacks". From my understanding, it means everything except application-layer attack. However, it sounded abstract and promising. In order to justify the functionality of Gatekeeper in a more detailed way, I tried looking for a list of functions or countermeasures it has, like those commercial products always provide. Examples of the lists of similar commercial products are as follows :
Product 1 : Invalid Packets, ATLAS Intelligence Feed, Filter List, Rate-based Blocking, Payload Regular Expression, Spoofed SYN Flood Prevention, TCP Connection Limiting, TCP Connection Reset, DNS Authentication, Block Malformed DNS Traffic, DNS Rate Limiting, DNS NXDomain Rate Limiting, DNS Regular Expression, Malformed HTTP Filtering, HTTP Rate Limiting, HTTP Header Regular Expressions, TLS Attack Prevention, Block Malformed SIP Traffic, SIP Request Limiting, Traffic Shaping, TCP SYN Flood Detection, ICMP Flood Detection, UDP Flood Detection, Botnet Prevention, Fragment Detection, Multicast Blocking, Private Address Blocking,
Product 2 : IPv4 Address Filter Lists, IPv4 Black/White Lists, Packet Header Filtering, IP Location Filter Lists, Zombie Detection, UDP Reflection/Amplification Protection, Per Connection Flood Protection, TCP SYN Authentication, DNS Authentication, TCP Connection Limiting, TCP Connection Reset Payload Regular Expression, Protocol Baselines, DNS Malformed, DNS Rate Limiting, DNS NXDomain, Rate Limiting, DNS Regular Expression, HTTP Malformed, HTTP Rate Limiting, AIF and HTTP/URL Regular Expression, SSL Negotiation, SIP Malformed, SIP Request Limiting, Shaping, IP Location Policing
And here's my question : Is there a similar list that reflects the detailed capability of Gatekeeper? I have some ideas in my mind. I guess the short answer is "All layer 3/4 attacks are theoritically defendable, it all depends on your ability to create sophisticated policy.", yes? I would guess that Gatekeeper is a framework to start with, and we will have to work on our own to write the policies and achieve the functionalities, while some basic examples can be found in the /bpf directory.
Meanwhile, out of all these functionalities, is there any that Gatekeeper architecturally/naturally does/doesn't support? Just all those related to layer 7 HTTP?
Beta Was this translation helpful? Give feedback.
All reactions