bitByte Technologies
  • Home
  • About Us
  • Solutions
    • TCP Optimization
    • Deep Packet Inspection
    • Forward/Reverse Proxy
    • BGP Optimization
    • PAM
    • DDoS Protection
    • Next Generation Firewall
  • Contact Us
  • More
    • Home
    • About Us
    • Solutions
      • TCP Optimization
      • Deep Packet Inspection
      • Forward/Reverse Proxy
      • BGP Optimization
      • PAM
      • DDoS Protection
      • Next Generation Firewall
    • Contact Us
bitByte Technologies
  • Home
  • About Us
  • Solutions
    • TCP Optimization
    • Deep Packet Inspection
    • Forward/Reverse Proxy
    • BGP Optimization
    • PAM
    • DDoS Protection
    • Next Generation Firewall
  • Contact Us

DDoS Protection

Introduction

     Exclusive partner of The Middle East with one of wholesale provider of cloud-based DDoS mitigation services. We are one of the early adopters of eBPF/XDP technology and a pioneer in this space. With a new approach in the DDoS security industry, leveraging eXpress Data Path technology, combined with a globally distributed stateful firewall featuring proprietary hole punching technology, our partners (Path) obtained a patent in the US, in 2022:

https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2022178169&_cid=P22-LIE8UE-30146-1


The technology stack is deployed across one of the most extensive internet networks in the world with more than 12 Tbps of Internet bandwidth capacity over 20 major Internet hubs across Europe, the USA, APAC, and LATAM regions.


The technology we developed enables us to provide customers with unparalleled control over their traffic, granting them the ability to make informed decisions and protect their networks more effectively while never impacting clean, legitimate, traffic.


The same advanced technology enables us to create custom DDoS filters for specific applications, difficult to secure with traditional DDoS mitigation methods, ensuring protection against even the most sophisticated attacks that generic solutions might miss.


The main service we deliver at Core Technology is cloud-based DDoS mitigation, but we can also provide a variety of other cybersecurity services on top as we can easily leverage the network resources and our team’s vast experience.

Network size and topology

  • 12Tbps+ capacity deployed and available for DDoS filtering
  • 20 scrubbing centers deployed over Europe, the USA and the APAC regions
  • 23 IXs connected with 100Gbps or more
  • 10 x premium TIER1 IP transit providers connected only with 100Gbps ports
  • >3000 Peers globally - one of the most peered networks in the world

Technology being used in our stack

  • XDP (eXpress Data Path): allows for high-performance packet processing in the Linux kernel by bypassing the traditional network stack. This makes it well suited for DDoS attack mitigation because it can process packets at a much higher rate than traditional methods, allowing for more effective filtering and blocking of malicious traffic. Additionally, and this is important, XDP allows for the implementation of custom packet processing logic, which can be used to detect and mitigate specific types of DDoS attacks and to also develop custom DDoS filters for specific applications that can't be protected otherwise (with traditional generic filtering).
  • Distributed Globally Stateful Firewall with hole-punching: It operates in a similar way to a traditional stateful firewall, keeping track of the state of network connections and using this information to determine whether to allow or block incoming or outgoing packets. The main advantage of a stateful cloud firewall is that it is highly scalable, as it can be deployed on a cloud infrastructure, allowing it to handle large volumes of traffic and protect against DDoS attacks. Additionally, a stateful cloud firewall can be easily managed and updated remotely.
  • Application layer filtering (custom-built XDP DDoS filters): based on protocol specifications as laid out in RFCs. Application layer filtering refers to the process of examining and controlling network traffic based on the specific protocols used in the application layer of the OSI model. This can include protocols such as HTTP, FTP, and DNS, among others. The Core Technology, Inc. commercial information Page 3 specifications for these protocols are laid out in Request for Comments (RFC) documents, which are published by the Internet Engineering Task Force (IETF).
  • AI technology: Core Technology uses machine learning techniques to analyze network traffic in real time and make decisions about how to route that traffic to optimize performance and minimize latency and also to determine what type of filters should be applied on a specific IP subnet (/32) based on the application that is running behind that IP. This is made available directly in the customer portal in the Discovered Services section. Customers may not know what application is running behind an IP but they can manage results from our automated service discovery system and apply the corresponding filter with a simple click.

Copyright © 2024 bitByte Technologies - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept