DDoS Protect

The Sify Advantage
  • blocks known malicious hosts- by using white (authorized hosts) and black lists (zombies or compromised hosts)
  • Sify's MDDoS Protect provides payload visibility and filtering to prevent cloaked attacks
  • defends against web-based threats by detecting and mitigating HTTP-specific attacks
  • protects critical VoIP services from automated scripts or botnets that exploit packet per second
  • controls the zombie army by using specialized, always-on and learning zombie detection mechanisms
  • Enforces baseline protection by building ongoing, always learning models of network behavior.

Sify’s Managed DDoS Protect [MDDoS Protect] provides an option for customers of Sify’s ExpressConnect Internet service to detect and mitigate Distributed Denial of Service attacks. DDoS attack identification and mitigation takes place within Sify’s IP backbone providing DDoS protection from malicious traffic, thereby negating the impact on customer network.

Distributed Denial of Service (DDoS) attacks are network-based attacks wherein malicious code on numerous, scattered and usually unwitting, servers or desktops are planted. The machines (called zombies) then flood a single target with packets so it is driven offline, unable to handle the volume. The attacks are devastating, extremely difficult to trace and impossible to predict.

There are two general classes of DDoS: bandwidth saturation and resource depletion. The former incapacitates the target network via a flood of erroneous traffic, and the latter floods target systems with bogus requests, tying up all system resources. The increasing intensity, complexity, and sophistication of DDoS attacks require more aggressive, powerful and intelligent defense.

To successfully address the intensity and breadth of DDoS attacks, Sify’s MDDoS protect is a Cloud based solution offering a comprehensive threat management system that can detect, surgically mitigate and report on DDoS attacks. Sify’s solution offers multiple methods of threat detection and mitigation, payload visibility and filtering to ensure cloaked attacks cannot bring down critical services, an effective defense against Web-based threats by detecting and mitigating HTTP-specific attacks.

The basic characteristics of a DDoS defense are:

  • Sensitivity– DDoS attacks appear legitimate, so the defense requires extreme sensitivity to discriminate between nominal vs. abnormal traffic. This requires both historical trending of normal patterns, to flag any change from normal and deep packet inspection (DPI) to further investigate potentially malicious packets.
  • Survivability– The DDoS defense takes the brunt of the DDoS attack. The defending system must deflect an attack, make real-time decisions on legitimate versus malicious traffic and perform defensive counter measures to maintain availability of bandwidth for target Web servers.
  • Processing power– Sensitivity and survivability require extensive processing capacity. DDoS appliances should handle continuous throughput in the Gigabit per second range.

The following packages are offered under the Sify MDDoS protect service

  • DDoS Detection- Sify monitors subscribed IP traffic information and alerts customers against anomalies that signal attacks
  • DDoS Detection & Mitigation- based on the scale and diversity of the attack, mitigates the attack through destination-based Access control lists
  • DDoS Detection & Scrubbing- Sify’s solutions provide for the surgical removal of only the attack traffic while maintaining the legitimate business traffic
The Sify Advantage
  • blocks known malicious hosts- by using white (authorized hosts) and black lists (zombies or compromised hosts)
  • Sify's MDDoS Protect provides payload visibility and filtering to prevent cloaked attacks
  • defends against web-based threats by detecting and mitigating HTTP-specific attacks
  • protects critical VoIP services from automated scripts or botnets that exploit packet per second
  • controls the zombie army by using specialized, always-on and learning zombie detection mechanisms
  • Enforces baseline protection by building ongoing, always learning models of network behavior.
Our Client