Networks Home

Networks Articles

Networks Links

Networks Books

Networks Tools

Networks Keywords



Networks

Peakflow SP

Deployed in over 80 major service provider and MSO networks across the globe, Peakflow® SP streamlines infrastructure security and network operations, while improving operational efficiencies, reducing costs and offering new revenue streams for service providers.

Peakflow SP is a scalable platform that expands with a service provider’s network, offering new levels of growth and customer care. Comprised of three devices—Managed Services, Infrastructure Security, and Traffic and Routing—Peakflow SP provides a comprehensive solution delivering powerful DoS and Traffic and Routing capabilities to service providers and their customers.

Managed Services

Denial of service is a distributed threat, requiring a distributed solution. Clearly, an enterprise that suffers a DoS attack, flooding their uplink, depends on provider assistance. Preventing these attacks requires real-time cooperation and coordination between customers and providers. Peakflow SP provides the first real solution that stops a denial of service attack where it matters—in the provider network. The Managed Services device provides a scalable and cost-effective means for service providers to offer DoS detection and mitigation services to their customers. With minimal configuration required on the provider side, service providers can rapidly roll-out these revenue-generating services and offer their customers value-added, comprehensive DoS solutions and traffic management tools.

Key Features

Customer-facing DoS Portal


 *Peakflow SP provides a customizable portal or "dashboard" that gives customers a first-hand view of their traffic inside the service provider's network. Using the DoS portal, customers can log in and view reports across the lifecycle of a denial of service (DoS) attack or other security attack or event. The portal also provides customers with extensive real-time traffic reporting and visualization, and customized network traffic reports.

Customer Anomaly Detection & Fingerprinting


 *Drawing on Peakflow SP’s rapid anomaly detection and fingerprinting capabilities, service providers now have a scalable mechanism to create an anomaly detection service for their customers. Peakflow SP’s fingerprinting feature provides detailed characterization data (or fingerprints) of known and new network threats. Customers will be able to view detailed analysis of anomalous events and determine their source. This not only gives service providers an added service to sell to their customers, but also enables them to partner with their customers and distribute some of the expensive operational burden of managing DDoS attacks. By empowering customers through the portal services, providers and customers can resolve DoS problems together.

Network-wide Situational Analysis


 *In the face of an attack, only Peakflow SP provides network-wide situational analysis and DoS fingerprinting capabilities necessary to choose the appropriate response in a complex provider network. To illustrate the characteristics of an attack, Peakflow SP generates a detailed fingerprint of the traffic, showing ports, protocols, source, destination and variety of other details. This information is used to filter the attack, or by using Peakflow’s unique fingerprinting functionality, operators can specify refined signatures for future monitoring. This feature enables customers to gain a greater view into the network and consequently have a better ability to detect, mitigate and resolve an attack. Additionally, the network situational awareness empowers customers by providing a personalized view of their traffic inside the provider’s network.

Infrastructure Security Using Peakflow's unique anomaly detection engine, Peakflow SP proactively detects and traces network-wide anomalies, including distributed denial of service (DDoS) attacks and worms (e.g. Slammer, Blaster). These attacks are often aimed at the network infrastructure, an area of network security that firewalls and IDSs cannot address. Using Peakflow SP network operators can quickly resolve these threats before their network is affected, service suffers, or customers complain.

Key Features

Anomaly Detection & Fingerprinting


 *Leveraging the Peakflow Platform’s anomaly detection engine, Peakflow SP immediately detects and notifies network operators of attacks and other traffic anomalies, providing detailed characterization data (or fingerprints) to help proactively flag both known and new network threats. By detecting network changes in real-time, Peakflow SP provides immediate alerts on routing instability, suspicious BGP announcements, sudden shifts in peer/router/interface traffic due to changes in BGP topology, or an unexpected drop in traffic across a diverse set of router interfaces. For example, in the event of a significant traffic or routing failure, Peakflow SP can instantly notify the network operations center so the event can be promptly and intelligently escalated and resolved before service is impacted.

Traceback


 *Through a network-wide comparison of recent anomaly fingerprints, Peakflow SP reconstructs the attack trajectory across the network, quickly identifying affected customers and equipment—right down to the router, line card, and interface. As a result, network operators immediately have the information they need to mitigate the threat and are spared the time and expense of gathering this data manually.

Analysis


 *To illustrate the characteristics of an attack, Peakflow SP generates a detailed fingerprint of the traffic, showing ports, protocols, source, destination and variety of other details. This information is used to filter the attack, or by using Peakflow’s unique Fingerprinting functionality, operators can specify refined signatures for future monitoring.

Mitigation


 *Using precise fingerprints drawn from the detection, traceback and analysis processes, Peakflow SP informs a variety of mechanisms to eliminate the threat, ensuring normal operations. Using integrated, intelligent filtering technology, Peakflow SP can dynamically clean the traffic, initiate blackhole and sinkhole routing remediation techniques, or recommend filters or rate-limiting on routers. Using the right fix for the problem provides for better response times and improved customer satisfaction.

Flexible Reporting


 *Peakflow SP exports XML and PDF-based reports on anomalies and system operations, enabling network operators to easily perform custom analysis for forensics, trending and research, or to share with co-workers, customers, or partners.

Traffic and Routing


 *For a service provider, the network is the business. Peakflow SP transforms business planning and operations through its complete view of network-wide traffic and routing data. Network operators can detect, analyze, and mitigate network outages and inefficiencies, whether they stem from an attack, misconfiguration, misuse, or the longer-term impact of changes in network utilization.

Key Features

Click to enlarge image


 *Transit/Peering Management
 *Leveraging the Peakflow Platform's network-wide, router-based sampling, Peakflow SP offers the ability to evaluate existing and potential peers, aggregating their traffic from across the network. Network operators can compare settlement-free and paid transit peers to optimize their transit and peering arrangements, significantly reducing costs.
 *Leveraging the Peakflow Platform's network-wide, router-based sampling, Peakflow SP offers the ability to evaluate existing and potential peers, aggregating their traffic from across the network. Network operators can compare settlement-free and paid transit peers to optimize their transit and peering arrangements, significantly reducing costs.

Customer Accounting


 *Peakflow SP provides complete, real-time visibility into all parts of the network—from detailed reports on all traffic through the network, to fine-grained analysis of customer web traffic, to statistics on a given interface in a specific POP. With detailed customer-level traffic profiling, network operators can conduct on-net and off-net customer traffic analysis. This level of understanding enables service providers to be more price competitive, and improve the structure of their service and support offerings.

Backbone Engineering


 *In contrast to manually created, static snapshots, using Peakflow SP, network operators can conduct peer-to-peer, AS-to-AS, and pop-to-pop traffic analysis. The traffic can then be profiled by ASN, ASPath, Application, or Nexthop. With detailed customer-by-customer traffic matrices, network operators can engineer the network for lower cost or performance, eliminating hotspots.

Capacity Planning


 *Peakflow SP provides a variety of tools to better predict capacity needs for robust, dynamic networks. This level of knowledge and visibility enables operators to proactively plan for the growth of their networks, and see and eliminate hot spots before they become problematic.

Reporting and Analysis


 *An extensive collection of reference and historical information is available in a variety of reporting formats. Users can obtain reports via XML, CSV, XLS, or HTML, and import the data into a number of reporting tools and databases for offline analysis. These reports are used to fuel peering decisions, pricing and cost analysis, accounting, new product offerings, capacity planning, and purchasing decisions.

Vendor Site:- Arbor Networks

Google
Web www.techno.nildram.co.uk

Networks Bestsellers
The bestselling books on Amazon.

Tools

PacketSure

WatchGuard System Manager

SLNet RF

Peakflow SP

AccessMaster

Other Related Websites
Security
Internet
Telecommunications

Visit our site of the month Sarbanes-Oxley at www.sarbanesoxleyuk.co.uk