• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Friday, April 10, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Juniper Tunes its DDoS Protection for Upstream Mitigation

Juniper Tunes its DDoS Protection for Upstream Mitigation

July 17, 2014
in All
A A

Juniper Networks announced a set of improvements to its Juniper DDoS Secure solution to provide tighter integration into routing and service provider infrastructures with BGP Flowspec and GPRS Tunneling Protocol (GTP) protocols.  The goal is to enable new forms of protection that can more effectively and efficiently mitigate a variety of DDoS attacks without restricting or impacting normal service.

Highlights of the announcement include:

Upstream Attack Mitigation

  • DDoS Secure provides distributed enforcement at the network boundary that protects the edge equipment and the resources behind it from becoming overwhelmed, especially with larger and more challenging volumetric attacks.
  • The solution scales DDoS mitigation by extending enforcement upstream to Juniper’s MX at the edge, border or closest to the attack source, allowing only clean traffic to enter the network.
  • As DDoS Secure continuously monitors inbound and outbound traffic, it can determine if a high-volume DDoS attack is underway and subsequently communicate with the MX router by publishing Flowspec rules to block the malicious traffic upstream.
  • Flowspec provides the ability to take enforcement actions such as source-based black hole filtering to drop malicious packets or redirecting traffic to select network points for mitigation.

Accurate Enforcement on Mobile Networks with GTP Network Protocol Unwrap

  • New capabilities protect against the growing problem that service providers face in detecting and mitigating malicious traffic originating from botnets exploiting users’ devices.
  • The ability to inspect different network protocols becomes a key enabler in identifying legitimate traffic.
  • DDoS Secure provides visibility into malicious and/or errant mobile devices, identifying both User Equipment (UE) to UE and UE to Internet traffic.
  • DDoS Secure’s ability to inspect GTP packets and identify malicious endpoints allows service providers to enforce mitigation, maintain performance and protect their Radio Access Network (RAN) bandwidth.
  • The new GTP packet unwrap capability allows DDoS Secure to identify inside-out bot attacks originating in the mobile service provider’s access network. Botnet malware that enters mobile devices from home, at work or in the macro RAN can degrade legitimate user experience and also consume valuable mobile bandwidth. 

DNS Inside-Out Attack Protection

  • DDoS Secure protects the core DNS infrastructure from participating in DNS amplification and reflection attacks that are difficult to detect and can have disastrous effects on network availability.
  • In these attacks, the DNS server can become the victim of a DNS attack or can be used to launch a DNS amplification attack on another server.
  • DDoS Secure applies heuristics-based intelligence to automatically mitigate these attacks by black listing and rate limiting certain DNS requests. The solution can also generate a BGP Flowspec rule, allowing attack traffic to be blocked upstream at the MX. 

http://newsroom.juniper.net/press-releases/juniper-networks-delivers-the-first-holistic-distr-nyse-jnpr-1131859

Tags: Blueprint columnsCyber SecurityDDoSJuniper
ShareTweetShare
Previous Post

CoreSite Offers High Precision Timing Service in its Data Center

Next Post

Ericsson Optimized Telefonica Brasil for World Cup

Staff

Staff

Related Posts

Photonic Innovation at the HPE Juniper Aspiration Dome with Optica + APC
Optical

Photonic Innovation at the HPE Juniper Aspiration Dome with Optica + APC

October 22, 2025
HPE Finalizes Juniper Acquisition, Launching Full-Stack AI-Native Networking
Financials

HPE Finalizes Juniper Acquisition, Launching Full-Stack AI-Native Networking

July 2, 2025
Spirent debuts CF400 security and application delivery test platform
Data Centers

Spirent and Juniper Demo Ultra Ethernet Transport at Interop Tokyo

June 30, 2025
Juniper names Chris Kaddaras as Chief Revenue Officer
All

HPE and Juniper Settle DOJ Case, Pave Way for $14B Merger

June 28, 2025
xAI raises $6 billion to propel its AI ambitions
Quantum

Turkcell, Juniper, and ID Quantique Test Quantum-Safe 5G Backhaul

June 26, 2025
xAI raises $6 billion to propel its AI ambitions
Quantum

Juniper Demonstrates Post-Quantum Cloud Connectivity Using QKD

May 22, 2025
Next Post
Ericsson Optimized Telefonica Brasil for World Cup

Ericsson Optimized Telefonica Brasil for World Cup

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version