ixia breaking point

42
The purpose of this Product Roadmap is to make available to Ixia's existing and prospective customers on a confidential basis certain information with respect to Ixia's current product development plans, schedule and strategy. Please note that the Product Roadmap is provided for discussion purposes only and that the information concerning Ixia's plans and schedules to develop, make available and release any of the Products, features and functionality described herein is subject to change at any time by Ixia in its sole discretion. This Product Roadmap does not commit or obligate Ixia or any of its affiliates to pursue or undertake the development or release of any Product, feature or functionality in accordance with any timetable, nor to constitute a license or any other right to use or acquire any Product, feature or functionality described herein. Ixia undertakes no obligation to update this Product Roadmap or any information contained herein. Ixia is only obligated to provide those deliverables specifically included in a written agreement between Ixia and the customer. ©2014 Ixia. All rights reserved. Паливода Александр Системный инженер

Upload: muk-extreme

Post on 14-Apr-2017

1.331 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: IXIA Breaking Point

The purpose of this Product Roadmap is to make available to Ixia's existing and prospective customers on a confidential basis certain information with respect to Ixia's current product development plans, schedule and strategy. Please note that the Product Roadmap is provided for discussion purposes only and that the information concerning Ixia's plans and schedules to develop, make available and release any of the Products, features and functionality described herein is subject to change at any time by Ixia in its sole discretion. This Product Roadmap does not commit or obligate Ixia or any of its affiliates to pursue or undertake the development or release of any Product, feature or functionality in accordance with any timetable, nor to constitute a license or any other right to use or acquire any Product, feature or functionality described herein. Ixia undertakes no obligation to update this Product Roadmap or any information contained herein. Ixia is only obligated to provide those deliverables specifically included in a written agreement between Ixia and the customer. ©2014 Ixia. All rights reserved.

Паливода АлександрСистемный инженер

Page 2: IXIA Breaking Point

End-to-End семейство продукции

Wireless Testing Acquired June 2009

Increased Router Testing

Acquired Oct 2009

Wi-Fi, WLAN TestingAcquired July 2011

Founded in 1997 IP Testing

Network VisibilityAcquired June 2012

Actionable Security Intelligence (ASI)

Acquired August 2012

Page 3: IXIA Breaking Point

Asse

ss/M

onito

rTe

st

IXIA помогает сервис-провайдерам: Ускорять и улучшать качество сервисов Тестировать совместимость

оборудования разных вендоров Усилить контроль качества сервисов и

производительности сети

IXIA помогает производителям оборудования: Разрабатывать устройства нового поколения Быстрее выходить на рынок Улучшать надёжность и производительность

IXIA помогает предприятиям: Усилить контроль производительности

корпоративных приложений и сетей Найти и обезвредить угрозы

безопасности корпоративной сети Тестировать оборудование и приложения

различных вендоров

IXIA помогает разработчикам микросхем: Тестировать соответствие стандартам Быстрее выйти на рынок

САМОЕ АВТОРИТЕТНОЕ имя в отрасли

Page 4: IXIA Breaking Point

ACTIONABLE SECURITY INTELLIGENCE:

BREAKINGPOINT

CREATEApplication and threat intelligence

CONTROLSimulation and testing

TRANSFORMIT Lifecycle resiliency

Inception

Deve-lopment

Training

Moni-toring

RiskMitigation

Selection& deployment

Technologies

People

Processes

Page 5: IXIA Breaking Point

IXIA BreakingPoint Заказчики

Page 6: IXIA Breaking Point

Performance Marketing Numbers

Based on: Basic Network Topology

Page 7: IXIA Breaking Point

Real World

Page 8: IXIA Breaking Point

• Based on: HTTP over TCP• Using simplified HTTP GET / HTTP Response

Performance Marketing Numbers

GET /index.html HTTP/1.1Host: www.test.comUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)

HTTP/1.1 200 OKConnection: Keep-AliveContent-Length: 64

<html><head><title></title></head><body>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa</body></html>

HTTP GET

HTTP Response

Page 9: IXIA Breaking Point

Real HTTP Headers

GET /index.html HTTP/1.1Host: www.ebay.comConnection: Keep-AliveIf-None-Match: 803b819a1df0957da129566cec8e3cbfUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)Accept: */*Accept-Language: en-usAccept-Encoding: gzip,deflateUA-CPU: x86Cookie: ASP.NET_SessionId=xhbjlk55neycqlarecmeu5fr

HTTP/1.1 200 OKETag: 6384d66d7ee0026973f5100bee519de6Last-Modified: Sun, 13 Dec 09 13:17:36 GMTDate: Tue, 12 Oct 10 09:35:31 GMTConnection: Keep-AliveServer: Microsoft-IIS/6.0Cache-control: privateContent-Type: text/htmlContent-Length: 1171

<html><head><title>RealWorldTest Page</title></head><body><p>Copyright (C) 2005-2009</p><p>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</p></body></html>

Real Application Content

Page 10: IXIA Breaking Point

Что возможно с Breaking Point?

• Realistic Traffic

• Malicious Traffic

Ethernet Frames Layer 2

IPv4/6 Frames Layer 3

Stateful TCP/UDP Layer 4

PCAP Captures Recreate Layer 4

220+ Applications Client/Server Simulator Layer 7

Application Client Only Simulator Layer 7

35000+ Attacks 80+ Evasions

TCP/UDP Fuzzing Application Fuzzing

Page 11: IXIA Breaking Point

Список приложенийRemote AccessRDPREXECRFBRloginRSH

Telnet

Voice | Video | MediaAresBICCH.225.0H.225 RASH.245H.248HTTP Live Streaming (HLS Apple)MMS MM1RTCPNetFlixRTP (bi/uni directional)RTCPRTSPSCCP (Cisco Skinny)SlingboxSIPSkypeSkype UDP HelperSTUN v1/v2TangoTVantsYouTube

Telephony and Cable TVSMPPMM1TR-069

System/Network AdminBGPDNSIDENTIPFIXIPMI v1.5ISCSIFingerLDAPMicrosoft UpdateNetFlowNTPPCP (Port Control Protocol)PortmapperRIPRPC Bind / MountRemoteUsersSNMP v1/v2Sun RPCSyslogTime

Testing and MeasurementChargenDaytimeDiscardEchoOWAMP Control / TestQOTDTWAMP Control / Test

Social Networking FacebookFlickrLinkedinTwitterWikipedia

Peer-to-PeerAppleJuiceBitTorrent Peer / TrackereDonkeyGnutella 0.6 (Firewalled and UDP)Gnutella Leaf / UltrapeerPPLive/QQLivePPTPSoapCast / SoulSeekuTorrentWinNY

MobileActiveSyncApple App iTunes/StoreAndroid MarketHTTP MobileBlackBerry ServicesBBC iPlayerFacebook for IOS DevicesGoogle Android MarketS1APTuMeTVUplayerViberYouTube MobileWhatsApp

Streaming MediaPandoraNetflix

SCADAIEC104

Custom ApplicationsRAW

Page 12: IXIA Breaking Point

Список приложенийChat | Instant MessagingAIM6AOL Instant MessengerGoogle TalkGadu-GaduICQIRCJabberMSNMSNPMSN SwitchboardOSCAROSCAR File TransferQQ IM / LiveWindows Live MessengerWinnyYahoo! Messenger

AuthenticationDIAMETERRADIUS AccountingRADIUS Access

DatabasesIBM DB2InformixMicrosoft SQLMySQLOraclePostgreSQLSQLMONSybaseTDSTNS

Data TransferFTPGopherHTTPNNTPRSyncTFTPWebDav

Data Transfer / File SharingIPPNetBIOSNETBIOS DGMNETBIOS NSNETBIOS SSNNFSRPC NFSSMBSMB/CIFSSMBv2

Email | Webmail

@mail.ru

AOL Webmail

Google Gmail

GMX Webmail

MSN Hotmail

Microsoft Exchange (MAPI Exchange)

IMAP

IMAPv4 Advanced

Orange WebMail

Outlook Web Access

POP3

Rediffmail WebMail

SMTP

Yahoo! Mail

Yahoo! Mail Classic

FinancialFIXFIXTITCHOUCHGames

World of WarcraftXbox Live

Enterprise ApplicationsDCE/RPC Endpoint MapperDCE/RPC Exchange DirectoryLPDMODBUSSAP

Distributed ComputingCitrixDCE/RPCVMware VMotion

Web ApplicationBing SearcheBayGoogle SearchGoogle MAPGoogle EarthPaypalReddit WebAppYahoo SearchWebEx

Secure Data TransferHTTPSSSH

Page 13: IXIA Breaking Point

Representative Traffic Mixes

Page 14: IXIA Breaking Point

Real-World Application Traffic MIX

Page 15: IXIA Breaking Point

BreakingPoint Applications

Facebook is an application

… and you have full control to create many application flows using intuitive workflow

Best application coverage200+ applications2479+ predefined superflows12,000+ configurable actions

Page 16: IXIA Breaking Point

Сетевые атаки

YouTube

Malware POP3

FTPLDAP

DNS

Oracle

Real Attacks: Strikes / Malwares / DDOS / BOTNET Real Evasion Techniques Attacks and Legitimate Traffic at the same time

SQL 1njecti0n

XSS BufferOverFlow

Fl@me RuDY

Recon Tr0jan ZeuS

SlowLoris

. . . .

Page 17: IXIA Breaking Point

Производительность приложений и устойчивая безопасность

SecurityРаскрываются уязвимости и слабые стороны с помощью последних атак, evasions, malware, приложений и спама.

Снижение риска путем гарантии защиты всех элементов сети от последних атак нулевого дня.

How Benefit

PerformanceПри повышенных нагрузках с атаками выявляются истинные стрессоустойчивость, емкость и масштабируемость.

Повышение производительности путем проверки сети или дизайна и конфигурации ЦОД. Понимание производительности под нагрузкой, атаками и при изменении условий

StabilityИспользование impairments, таких как искажение пакетов и экстримальные нагрузки для оценки стабильности системы.

Проактивное выявление слабых мест в целях предотвращения деградации системы или дорогостоящих простоев

RESI

LIEN

CY

Page 18: IXIA Breaking Point

HTTP vs Real-World Application Protocols

Test Scenario Vendor 1 Vendor 2 Vendor 3 Vendor 4HTTP RATE 25,000 140,135 18,000 75,000HTTP BANDWIDTH 3.1 Gbps 10 Gbps 5.1 Gbps 6.35 Gbps

Test Scenario Vendor 1 Vendor 2 Vendor 3 Vendor 4APP-MIX RATE 7376 53594 24924 30,000APP-MIX BANDWIDTH 0.58 Gbps 3.8 Gbps 1.3 Gbps 2.6 Gbps

Vendor 1 Vendor 2 Vendor 3 Vendor 40

20,000

40,000

60,000

80,000

100,000

120,000

140,000

HTTP RATE

APP-MIX RATE

Vendor 1 Vendor 2 Vendor 3 Vendor 40

1

2

3

4

5

6

7

8

9

10HTTP BANDWIDTH

APP-MIX BANDWIDTH

Page 19: IXIA Breaking Point

Attacks vs Attacks and Real-World Application Protocols

Test Scenario Vendor 1 Vendor 2 Vendor 3 Vendor 4444 ATTACKS 99 228 68 311

444 ATTACKS - Evasion Technique

99 225 46 309

444 ATTACKS - Real World Traffic

20 208 42 192

Vendor 1 Vendor 2 Vendor 3 Vendor 40

50

100

150

200

250

300

350

444 ATTACKS444 ATTACKS - Evasion Technique 444 ATTACKS - Real World Traffic

Page 20: IXIA Breaking Point

Легитимный и вредоносный трафик

PerfectStorm OneTM

Legi

timat

e Ap

plic

ation

Tra

ffic

Device Under Test

Malicious Traffi

c Mal

icio

us T

raffi

c

Legitimate Application Traffi

c

YouTube

Malware POP3

FTPLDAP

DNS

Oracle

Over 35000+ Vulnerabilities DDOS, Attacks and Malwares

Over 100+ Evasion Techniques Over 30+ DDOS patterns Layer 2 to 7 Fuzzing

Более 240+ Application Protocols 80Gbps of Application Traffic 2Million Connection/Second 60Million Concurrent Connections

Page 21: IXIA Breaking Point

BreakingPoint использует Markov algorithm для генерации реального контента

Example Real Content HTML + Markov + Random CSS

Markov + Chat ConversationMarkov in Email with

‘target’ word insertion

No other product can perform Markov String Generation! Content NEVER REPEATS and will fully exercise a content aware device!

A Markov Strings demonstration will

illustrate our value over Spirent every time !

Markov supports multiple languages

Page 22: IXIA Breaking Point

TCP Fragmentation

IP Fragmentation

Evasions

Page 23: IXIA Breaking Point

BreakingPoint – Most complete coverage for IPS evasions

Evasions – a HUGE differentiator in IPS testing! Over 100+ evasions supported by BreakingPointMix multiple layers of evasions

Page 24: IXIA Breaking Point

Fuzzing Application Protocols

• Measures stability in face of corrupted traffic • Validates integrity of protocol stacks with malformed packets• Generates corrupt data by modifying part of the packet

• Random or user-defined payload• Data rates: constant, range, random• Bad IP version, checksum, options; bad TCP options, urgent pointer, etc.• Pseudo Random Number Generator (PRNG) seed for repeatable testing

Page 25: IXIA Breaking Point

PerfectStorm - Next Generation Apps & Security Platform

XGS12-HS Chassis BundleHigh Performance Fusion Controller

Supports both IxLoad & BreakingPoint11U rackmount, 12-slot chassis

Page 26: IXIA Breaking Point

26

BreakingPoint – Key Performance Indicators (per blade)

bandwidth per blade

TCP, SSL rates

concurrent sessions

Performance per blade in two-arm mode,With clients and servers simulated on same blade

Page 27: IXIA Breaking Point

27

PerfectStorm ONE 10GE 8-port / 40GE 2-port

Line rate application throughput

SSL & IPsec hardware offload

Portable appliance with integrated 10GE 8-port SFP+ / 40GE 2-port interfaces

Dedicated INTEL CPU for IxServer & BreakingPoint management

1.5U, 2.5” high appliance

Page 28: IXIA Breaking Point

Примеры применений

Page 29: IXIA Breaking Point

Какое оборудование мы можем тестировать?

Ixia BreakingPoint Solution используется для проверки следующего сетевого оборудования:

• UTM• IDS/IPS• QoS Deep Packet Inspection• Firewall• Web Application Firewall• Load Balancer• WAN Accelerator• Network Probe• Lawful Interception Systems• Data Retention Systems• Anti-DDoS

• SSL Accelerator• Traffic Shaper• SMTP Relay• Anti-SPAM• Proxy/Cache• URL Filter• Content Filter• Anti-Virus /Anti-Malware• Network Encryption Device• …и многое другое

Page 30: IXIA Breaking Point

Lawful Intercept / DPI

List of Evergreen protocols

• AOL® Webmail• AOL® Messaging• Google® Gmail• Windows Live mail• Yahoo ! Mail• Google Talk• ICQ• Jabber• OSCAR

Lawful Intercept Features

• Needles in a haystack• Markov text Generation• Content Tokens• Packet buffer• Automation

Page 31: IXIA Breaking Point

DLP Lab, Results and Events

Page 32: IXIA Breaking Point

Case Study: Content impact DPI performance

Example #1: Real Proxy Device– parsing realistic content and random data (fake data)

Example #2: NGN Firewall with IPS Static content can look suspicious impacting performance !!!

Payload with all ‘0000s’ vs ‘012345..9’

Page 33: IXIA Breaking Point

BreakingPoint – Data Leakage Prevention / Lawful Intercept

Ввод целевых ключевых слов с регулируемой скоростью (e.g: каждые X секунд или каждые # flows)

Подробные отчеты четко показывают успех при выявлении каждого введенного слова

Page 34: IXIA Breaking Point

BreakingPoint – Наиболее полная возможность для IPS evasions

Evasions – a HUGE differentiator in IPS testing! Over 100+ evasions supported by BreakingPointMix multiple layers of evasions

Page 35: IXIA Breaking Point

IXIA BreakingPoint – симуляция DDoS

Layer 7 AppsDDoS DNS Reflect - AttackDDoS DNS Reflect - ZombieLOIC HTTP DoS AttackDDoS SIP Invite FloodDDoS Redirect DDoS DNS FloodDDoS Excessive GET POSTDDoS Slow POSTDDoS Recursive GET

UniqueDDoS SlowLoris DDoS Smurf AttackDDoS TDL4 CC HTTP FloodMultiVERB DDoSRUDY DDoSLOIC TCP8080 DoS Attack

Layer 3 IP / ICMPDDoS IP Frag AttackDDoS ICMP Request Flood AttackDDoS ICMP Response Flood Attack

Layer 4 UDPLOIC UDP53 DoS AttackDDoS UDP FragmentationDDoS Non-Spoofed UDP FloodDDoS UDP Flood

Layer 4 TCPDDoS SYN Flood DDoS PSH-ACK AttackDDoS Fake Session AttackDDOS SYN-ACK Flood Attack DDoS Rcv Wnd Size 0

Page 36: IXIA Breaking Point

Преднастроенные Botnet симуляторы

Cutwail

Zeus

SpyEye

ZeroAccess

Duqu

BlackEnergy

TDL4

PushDO

TDW

Кастомизация в Application Editor

Page 37: IXIA Breaking Point

IXIA BreakingPoint Botnet Simulation

Real Topology

TDL4 Duqu ZeroAccess Evil PushDO TDW Zeus Customization in Application Editor

Page 38: IXIA Breaking Point

IXIA BreakingPoint Participation at Combined Endeavor

IXIA BreakingPoint ParticipationCombined Endeavor 2010Combined Endeavor 2011Combined Endeavor 2012

Combined Endeavor is an interoperability exercise for military communication systems organized by the U.S. European Command  annually since 1995. All NATO Countries are participating into Combined Endeavour, it’s the largest command, control, communications and computers (C4) interoperability event in the world. Each year, approximately 1,400 communications professionals from more than 40 NATO and Partnership for Peace countries, and other strategic security partners gather at a main operating base and a virtual forward site to conduct a series of operationally-focused interoperability tests.

Page 39: IXIA Breaking Point

BreakingPoint - Cyber Range Integration (Обучение кибер-безопасности)

39

Page 40: IXIA Breaking Point

Резюме возможностей испытаний

Page 41: IXIA Breaking Point

Решения для тестирования, приёмки и оптимизации сетей операторского класса и ЦОДов

Полный контроль приложений и сервисов вашей сети или ЦОДа – основных источников дохода

Реальную оценку состояния сети для оптимальной и предсказуемой доставки приложений и услуг

Только Ixia предлагает

Page 42: IXIA Breaking Point

СПАСИБО!Узнайте больше на www.ixiacom.com

Паливода АлександрСистемный инженер

[email protected]