2017-10-29 04:03 AM
In a conversion cyber security with a Telecommunication provider the asked about solution for DDOS detection and mitigation, I understand there can be a number of DDOS attacks, at the resource layer or the application level. I am seeking guidance to the relevant publications that would help me narrow down on the question of DDOS and the possible solution to each of the different types of possible attacks, and whether there are unique solution to Telco providers as opposed to IT network? Thanks
2017-10-30 08:21 AM
Hi Charles,
You will probably find that level of specifics in Gartner reports . The details you seek are probably for their paid for service/subscription. You could potentially reference a general DDoS solutions in recent years using the magic quadrant which is usually "free." There's also RSAC decks from various speakers that may be of interest (though not necessarily telco specific). Depending on the size of the provider, they may elect to use a CDN such as Akamai, Level3, Cloudflare, etc. which provides DDoS mitigation as a service. Of course, you have your 'staples' including Arbor Network solutions and you would probably want to search for solutions that may have VoIP / PBX focused use cases. It's important to remember that effective DDoS mitigation shouldn't just be focused on specific vertical/technologies as they can come from everywhere. The NetWitness Logs and Packets solution by RSA can integrate with such solutions to correlate logs and there's content out of the box as well.
2017-10-30 01:00 PM
Also check out Web Threat Detection (from the FRI portfolio)
https://community.rsa.com/community/products/web-threat-detection
2017-10-31 12:24 AM
Eric,
Thank you for your response, I will study these among other I have
received and also get a little more insight on the client requirements.
Thx and Rgds, Charles
2017-10-31 01:40 AM
Dennis,
Thanks for your insight, I have looked through the presentation which is
quite informative. I have also read through other document published in our
RSA community for more clarity on this question of DDos. At this stage, I
cannot comprehensively respond to a client that asked me this question,
however, I should be able to ask more question on their requirement to be
able to narrow down on possible options. Should need arise, I may reach out
again, Thanks, Charles