Today, organizations are moving their business operations online and looking at all-time availability, reliability and security. It has become imperative for businesses to secure their website, applications and network from various external attacks – a significant one being Distributed Denial of Service (DDoS) attacks.
A DDoS attack occurs when multiple systems are used to overwhelm the available bandwidth or resources of a server hardware, application, service or any other targeted system of an organization. This causes the targeted system to offer a severely degraded service or may lead to a complete failure of operations, resulting in revenue loss, customer churn and reputational damage for the organization. With attacks like these increasing in frequency and impact, organizations are recognizing the need of a robust mechanism for detecting and mitigating these attacks.
Jio DDoS Mitigation has the ability to detect and mitigate large bandwidth attacks over Jio’s core internet backbone. With this solution, you can expect the following-
- Detection of attacks through common attack patterns, IP repudiation and previous data assists
- Re-routing traffic to DDoS scrubbing center using Border Gateway Protocol (BGP) routing, to scrub and drop DDoS traffic based on predefined attributes
- Scrubbing system weeds out the malicious traffic and drops it, while rest ‘clean’ traffic is sent back to the customer's network
- The malicious traffic pattern is logged and detailed analysis is undertaken for forensic, hardening of security and recording purposes
What You Get
Bandwidth MitigationAutomated mitigation up to the subscribed bandwidth port
Traffic RoutingRouting of legitimate traffic to Customer site post scrubbing
Incidents SupportUnlimited attack incidents are supported
State-of-the-Art InfrastructureMitigation undertaken at Jio’s state-of-the-art scrubbing centres
IP ConfigurationSupport extended for Jio provided and Customer owned IP addresses
Response SLADetection and auto-email notification to customer within 10 minutes of alert
Digital Self-CareOnline portal to access attack traffic reports, service and change requests
24x7 Assisted CareReady to service your needs at all times
Network-Based DefenseMitigate large bandwidth attacks on Jio’s core internet backbone backed by industry-leading Service Level Agreement (SLA)
Advanced Detection CapabilitiesStatistical sampling and state-of-the-art analysis to detect, alert and mitigate attacks
Comprehensive ReportingNear real-time reporting on traffic, alerts and various attack metrics, available on Self-Care portal
Plans to Suit your NeedsFlexibility to avail bandwidth mitigation ports up to 500 Gbps
Cost SavingsFlat annual recurring charges based on the subscribed bandwidth port
What is a Distributed Denial of Service (DDoS) attack?
A Distributed Denial of Service (DDoS) attack occurs when multiple systems are used to overwhelm the available bandwidth or resources of a server hardware, application, service, or any other targeted system. This overloading can cause the target system to offer a severely degraded service, or even complete failure.
What are the advantages of DDoS Mitigation service by Jio?
- Network-based Defense: Large bandwidth attacks can be mitigated over Jio’s core internet backbone
- Advanced Detection Capabilities: Statistical sampling and state-of-the-art analysis to detect, alert and mitigate attacks
- Comprehensive Reporting: Near real-time reporting on traffic, alerts and various attack metrics, available on Self-Care portal
- Plans to Suit Your Needs: Flexibility to avail bandwidth mitigation ports from 10Mbps to up to 500Gbps
- Cost Savings: Flat annual recurring charges based on the bandwidth port subscribed
Which are the major business segments that opt for DDoS service?
While DDoS Mitigation service is of use across segments, large Enterprises & Government organizations who host applications, are found to avail this service.
What are the key features offered by Jio’s DDoS Mitigation service?
- Bandwidth Mitigation: Automated mitigation up to the subscribed bandwidth mitigation port
- Traffic Routing :Routing of legitimate traffic to Customer site post scrubbing
- Incidents Supported : Unlimited attack incidents are supported
- State-of-the-art infrastructure : Mitigation undertaken at Jio’s state-of-the-art scrubbing centres
- IP Configuration :Support extended for Jio provided and customer owned IP addresses
- Operations Support :24x7 direct line for service assistance and configuration support
- Response SLA :Detection and auto-email notification to customer within 10 minutes
- Digital Self-Care :Online portal to access attack traffic reports, service and change requests
What are the types of DDoS attack?
Three major types of DDoS attacks are -
- Volumetric Attacks: Targeted to flood malicious traffic to make bandwidth or resources unavailable
- Application Layer Attacks: These are slow attacks, used with the vulnerability of applications. The objective is to crash the application or module of application
- Protocol-based Attacks: These attacks directly consume the target server/ network resources using excess amount of malicious connection requests and overwhelm system in handling protocol sessions
Is Jio’s DDoS Mitigation offered as a standalone service or in conjunction with another product/ service?
Jio’s DDoS mitigation service provides clean internet traffic and it is offered with Internet Leased Line (ILL).
On what basis is DDoS Mitigation service offered?
DDoS Mitigation requires bandwidth mitigation port to be provisioned at the Scrubbing Centre for cleaning the traffic, so this service is offered on the basis of mitigation bandwidth port that is subscribed.
What are Volumetric attacks?
Volumetric DDoS attacks, also referred to as Network floods, or ‘flooding’, are the most common type of DDoS attacks. These occur when network is overwhelmed by a large amount of attack traffic which makes the applications or services inaccessible to legitimate users.
What are Protocol-based attacks?
Protocol-based attacks, also known as State-Exhaustion attacks, consume the TCP connection state tables present in many network infrastructure and security devices, including Routers, Firewalls, Intrusion Prevention Systems and Load-Balancers as well as the application servers themselves. These attacks can block access for legitimate users or render security devices inoperative, sometimes even leaving defences wide-open to data exfiltration.
What are Application Layer attacks?
Application Layer attacks, often called ‘Layer 7 DDoS’, are sparse in comparison with the frequency of Volumetric and State-Exhaustion and do not typically involve high volume of packets. Once the initial connection is established to the Application, the attackers make repeated requests, progressively consuming resources until they are entirely depleted, rendering the application incapable of responding to legitimate user requests. Thus, Application-level DDoS attacks require a differential approach to detect and mitigate as they appear legitimate, do not consume excessive bandwidth and are typically hidden inside HTTPS encrypted packets.
What type of attacks does Jio’s DDoS Mitigation service deal with?
Jio’s DDoS Mitigation service provides mitigation against Volumetric as well as Protocol-based attacks.
Why my on premise is Firewall not able to stop/ prevent DDoS attacks?
Modern Firewalls, need to remember the established connections in order to control which applications and services may be used. The attackers know about this and misuse the allowed services, compromising the Firewall and/ or its performance, as well as the downstream applications. Additionally, DDoS attacks are initiated from thousands of sources spread across geographies making it difficult for Firewall alone to handle them.
How does Jio’s DDoS Mitigation platform detect attacks?
- The Jio DDoS Mitigation platform collect data from multiple sources to build the traffic model using SNMP, sampled netflow and BGP routing tables
- This data from the edge routers is then used to build the traffic models and detect anomalous traffic patterns
- The result of the statistical sampling is an understanding of what is normal.
- An alert then flags traffic that is outside of normal parameters
This chart shows the generic process of anomaly detection
The horizontal axis is time the vertical axis is volume. The trigger rate indicates the first statistically significant increase of volume over the norm. The high severity rate is statistically large deviation over the normal high. The middle line is the mean between these first two levels.
What SLAs are available for Jio’s DDoS Mitigation service?
- Your security contact will be notified via email or telephone within 10 minutes, when Jio reasonably believes that a DDoS attack is occurring to the site for which the service has been subscribed for
- Jio will initiate mitigation within 5 minutes of detection of a perceived DDoS attack
- Re-routing of Customer traffic on the IP backbone to Jio Scrubbing Centers and continuous status reporting
What documents can I submit as proof of address of the organization?
What documents are required as proof of identity of the organization?
What documents are accepted as proof of authorization for authorized signatory of the organization?
Listed below are the documents accepted as proof of authorization for authorized signatory of the organization:
What documents are accepted as proof of identity of authorized signatory for the organization?
What all documents are required to be submitted along with Customer Application Form (CAF) for KYC?
The following documents are to be submitted along with CAF for KYC formalities-
- (POA) Proof of Address of the organization.
- (POI) Proof of Identity of the organization
- Proof of Authorization for Autorized signatory for the organization
- (POI) Proof of Identity of Authorized signatory
- Customer undertaking on logical partitioning
- Order to be placed on ‘Jio Platforms Limited’
- It will be uploaded along with the base product of ILL and sent to Commercial Officer (CO) for approval
- CO will approve DDOS Mitigation Annual Recurring Charge as per Management approved rack rate.
- Post activation of DDOS Mitigation service, billing team will be intimated for manual billing as an interim process.
What is difference between billing address and installation address?
Billing address is the one on which you would receive the physical bills and installation address is the location where service is being offered or initiated.
What features information can I get from Self-Care portal?
Through Self-Care you will have access to attack traffic reports, attack metrics along with other account level information.
I am unable to open or view properly www.jio.com/business website?
Kindly clear your browser history and try again. For better user experience please, check if you are using these browser versions i.e. Chrome 1.0 or higher and Internet explorer 7 or higher.
How are Jio’s DDoS Mitigation service charged?
Jio’s DDoS Mitigation service is charged based on the mitigation bandwidth port subscribed. It will have flat charges for the contract period and will be billed as per the billing cycle. Separate invoice shall be given for DDoS Mitigation Service charges.