Neustar Security Services has announced one of its Neustar UltraDDoS customers was hit by a 1.3 Tbps DDoS attack at the end of November.
The attack, which lasted several hours and traffic had more than 44,000 unique sources, occurred just as NSS was preparing to spin out of Neustar to become a standalone company.
The company targeted in this attack provides critical internet infrastructure services to tens of millions of customers who count on their availability.
"This company counts on NSS to safeguard their network and applications. Was this a just another targeted attack intended to bring down a large internet infrastructure provider or was it meant to test the defenses of NSS, a security service provider, during a time of transition? The motive may never be made clear, but the attackers' intentions were thwarted, nonetheless," NSS says.
"NSS stood tall and the customer continued to operate without any impact. Despite the larger than normal size, the attack was seamlessly handled by a combination of advanced mitigation technology, clever automation, and tight integration into the customer's environment."
DDoS mitigation at this magnitude is not just about providing effective technology, reliable service, and being a trusted extension of the customer's team. It is also about the flexibility, automation, and scale that the service can bring to bear.
NSS says it is imperative to offer a broad array of configuration options that can wrap around the operational environment of the customer to provide fast, consistent, and reliable protection from DDoS attacks. The ability to reliably stop even multi-terabit-scale DDoS attacks while providing high performance and low latency to customer applications is a necessity. Scale to stop multi-terabit DDoS should be a given, but automation enables that scale to react quickly to preserve customer availability.
This DDoS attack lasted several hours with many waves greater than 800Gbps and a peak of 1.3Tbps. Neustar says the attack was almost 100% UDP focused blending several vectors including fragmentation, and DNS and SNMP reflection/amplification. The traffic had more than 44,000 unique sources that were broadly distributed across the globe with a strong concentration in Asia Pacific.
The attack also used carpet bombing attack techniques with target IP addresses that were also broadly distributed within the customer's network footprint. Most of the UDP traffic had random high order source and destination ports.
According to NSS, the 1.3Tbps and 114Mpps DDoS attack was handled 100% through automation without any manual intervention with no customer impact. There was no period of limited availability and no collateral impact on adjacent services or customers.
This was possible by using highly tuned automation triggers, platform intelligence, and a well-designed architecture with Ultra capacity. The NSS Security Operations Center (SOC) is available 24x7x365 to monitor and tune mitigations as necessary but automation allows the SOC to focus on the critical few attacks that are more complex and evade initial defenses.
"Automation is a key design objective for the UltraDDoS platform intended to enable speed of response, predictability, and scale of operations," NSS says.
"NSS considers these objectives to be current best practices. Automation paid off to protect this customer and preserve all the services on which its end customers rely. Once again, Neustar Security Services and the UltraDDoS Protect Service achieved the mission of helping this global company to thrive on-line."