Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction IRP v4.3 Introduces Automatic Anomaly Detection for DDoS Mitigation

INFORMATIONAL
January 17, 2026
3m read
CyberattackSecurity OperationsPatch Management

Related Entities

Organizations

Products & Tech

Intelligent Routing Platform (IRP)BGP FlowSpecRemote Triggered Blackholing (RTBH)

Other

DDoS

Full Report

Executive Summary

Noction, a provider of BGP network performance automation, has launched version 4.3 of its Intelligent Routing Platform (IRP). The flagship feature of this release is Automatic Anomaly Detection (AAD), a system designed to provide rapid, automated detection and mitigation of DDoS attacks. By analyzing network traffic telemetry (NetFlow, sFlow), AAD establishes a baseline of normal behavior and can detect deviations indicative of an attack within seconds. Upon detection, Noction IRP can initiate routing-based mitigation techniques such as BGP FlowSpec or Remote Triggered Blackholing (RTBH), allowing network operators and service providers to neutralize threats at the network edge with minimal latency and operational overhead.

Threat Overview

The AAD feature is designed to detect a wide range of volumetric and protocol-based DDoS attacks, including:

  • TCP Floods: SYN floods, ACK floods, FIN floods.
  • UDP Floods: Including amplification/reflection attacks like DNS amplification and NTP amplification.
  • ICMP Floods: Such as Smurf attacks and ping floods.
  • Application-Layer Floods: HTTP(S) floods targeting web servers.
  • Protocol-Specific Floods: SSH floods, etc.

These attacks aim to exhaust the network bandwidth, processing power, or session capacity of a target system, rendering it unavailable to legitimate users. The speed of modern DDoS attacks requires an automated detection and mitigation response, as manual intervention is often too slow.

Technical Analysis

Noction IRP's new capability integrates threat detection directly into the network's routing control plane.

Detection Mechanism

  1. Telemetry Collection: The IRP ingests traffic data from routers using standard protocols like NetFlow, sFlow, IPFIX, or jFlow.
  2. Behavioral Analysis: The AAD engine continuously analyzes this telemetry to build a dynamic baseline of normal traffic patterns for different network prefixes.
  3. Anomaly Detection: When incoming traffic deviates significantly from the established baseline (e.g., a sudden spike in UDP packets to a specific host), the system flags it as an anomaly.

Mitigation Mechanism

Once an anomaly is confirmed as a likely attack, the IRP can trigger one or more automated mitigation actions:

  • BGP FlowSpec: The IRP can generate and announce a BGP FlowSpec rule to upstream providers or internal routers. This rule instructs the routers to drop or rate-limit the specific malicious traffic pattern (e.g., 'drop all UDP traffic from source port 53 to destination IP X.X.X.X'). This is a highly granular mitigation that can block attack traffic without affecting legitimate traffic.
  • Remote Triggered Blackholing (RTBH): For large-scale volumetric attacks, the IRP can announce a BGP route that directs all traffic destined for the target IP to a null interface (a 'blackhole'). This sacrifices the target's connectivity but protects the rest of the network from collateral damage. This is a direct implementation of MITRE ATT&CK's T1499.003 - Network Denial of Service defense.

Operators can configure the system for fully automated mitigation or a moderated mode that requires human approval before action is taken.

Impact Assessment

  • Rapid Response Time: By automating the detect-to-mitigate lifecycle, Noction IRP can respond to DDoS attacks in seconds, significantly reducing the time to mitigation and minimizing service disruption.
  • Reduced Operational Overhead: The automation frees network operations center (NOC) engineers from the manual task of analyzing traffic and crafting mitigation rules during a high-stress attack scenario.
  • Cost-Effective Mitigation: It leverages existing routing infrastructure and protocols (BGP), reducing the need for expensive, dedicated DDoS scrubbing appliances for certain classes of attacks.
  • Enhanced Network Resilience: The platform's ability to also monitor physical interface capacity and adjust traffic routing accordingly prevents overcommitment and improves overall network stability during outages or attacks.

Mitigation and Security Value

The primary value of Noction IRP v4.3 is its ability to provide an integrated, routing-native DDoS defense solution. It acts as both a detection engine and a response orchestrator. For Internet Service Providers (ISPs) and large enterprises that manage their own BGP routing, this solution offers a powerful tool to enhance their network's resilience against common volumetric DDoS attacks, directly contributing to the Network Intrusion Prevention mitigation strategy.

Timeline of Events

1
January 17, 2026
This article was published

MITRE ATT&CK Mitigations

Noction IRP acts as a network intrusion prevention system specifically for DDoS attacks by analyzing traffic and applying filtering rules via BGP.

Mapped D3FEND Techniques:

The use of BGP FlowSpec and RTBH are direct methods of filtering malicious network traffic at the edge.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The core of Noction's new feature is its implementation of Network Traffic Analysis. Network operators should configure their edge routers to export NetFlow or sFlow data to the Noction IRP instance. The platform will then automatically baseline traffic for all advertised prefixes. The key tactical action is to fine-tune the sensitivity thresholds within the AAD module. Start with a more conservative setting to avoid false positives, and gradually tighten the thresholds as you gain confidence in the baseline. This allows the system to accurately detect anomalous traffic patterns, such as the high-volume, high-packet-rate floods typical of DDoS attacks, providing the trigger for automated mitigation.

Noction IRP operationalizes Inbound Traffic Filtering at scale using BGP. Once AAD detects an attack, operators should configure the IRP to automatically generate and announce a BGP FlowSpec rule. For a DNS amplification attack, the rule might specify dropping all inbound UDP traffic with a source port of 53. This is a highly precise filter that removes the attack traffic at the network edge, often within the upstream provider's network, before it can consume local bandwidth. For very large attacks that threaten to saturate the upstream link itself, the IRP should be configured to use RTBH, which sacrifices the targeted IP to protect the entire network. This automated, routing-based filtering is the most effective way to respond to modern volumetric DDoS attacks.

Sources & References

New infosec products of the week: January 16, 2026
Help Net Security (helpnetsecurity.com) January 16, 2026
Noction adds automatic anomaly detection to IRP v4.3 for faster DDoS mitigation
Help Net Security (helpnetsecurity.com) January 13, 2026
Automatic Anomaly Detection (AAD) in Noction IRP - Deep Dive
Noction (noction.com) January 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

NoctionDDoSBGPBGP FlowSpecRTBHNetwork SecurityIntelligent Routing Platform

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading