Noction, a provider of BGP network performance automation, has launched version 4.3 of its Intelligent Routing Platform (IRP). The flagship feature of this release is Automatic Anomaly Detection (AAD), a system designed to provide rapid, automated detection and mitigation of DDoS attacks. By analyzing network traffic telemetry (NetFlow, sFlow), AAD establishes a baseline of normal behavior and can detect deviations indicative of an attack within seconds. Upon detection, Noction IRP can initiate routing-based mitigation techniques such as BGP FlowSpec or Remote Triggered Blackholing (RTBH), allowing network operators and service providers to neutralize threats at the network edge with minimal latency and operational overhead.
The AAD feature is designed to detect a wide range of volumetric and protocol-based DDoS attacks, including:
These attacks aim to exhaust the network bandwidth, processing power, or session capacity of a target system, rendering it unavailable to legitimate users. The speed of modern DDoS attacks requires an automated detection and mitigation response, as manual intervention is often too slow.
Noction IRP's new capability integrates threat detection directly into the network's routing control plane.
NetFlow, sFlow, IPFIX, or jFlow.Once an anomaly is confirmed as a likely attack, the IRP can trigger one or more automated mitigation actions:
BGP FlowSpec: The IRP can generate and announce a BGP FlowSpec rule to upstream providers or internal routers. This rule instructs the routers to drop or rate-limit the specific malicious traffic pattern (e.g., 'drop all UDP traffic from source port 53 to destination IP X.X.X.X'). This is a highly granular mitigation that can block attack traffic without affecting legitimate traffic.T1499.003 - Network Denial of Service defense.Operators can configure the system for fully automated mitigation or a moderated mode that requires human approval before action is taken.
The primary value of Noction IRP v4.3 is its ability to provide an integrated, routing-native DDoS defense solution. It acts as both a detection engine and a response orchestrator. For Internet Service Providers (ISPs) and large enterprises that manage their own BGP routing, this solution offers a powerful tool to enhance their network's resilience against common volumetric DDoS attacks, directly contributing to the Network Intrusion Prevention mitigation strategy.
Noction IRP acts as a network intrusion prevention system specifically for DDoS attacks by analyzing traffic and applying filtering rules via BGP.
The use of BGP FlowSpec and RTBH are direct methods of filtering malicious network traffic at the edge.
Mapped D3FEND Techniques:
The core of Noction's new feature is its implementation of Network Traffic Analysis. Network operators should configure their edge routers to export NetFlow or sFlow data to the Noction IRP instance. The platform will then automatically baseline traffic for all advertised prefixes. The key tactical action is to fine-tune the sensitivity thresholds within the AAD module. Start with a more conservative setting to avoid false positives, and gradually tighten the thresholds as you gain confidence in the baseline. This allows the system to accurately detect anomalous traffic patterns, such as the high-volume, high-packet-rate floods typical of DDoS attacks, providing the trigger for automated mitigation.
Noction IRP operationalizes Inbound Traffic Filtering at scale using BGP. Once AAD detects an attack, operators should configure the IRP to automatically generate and announce a BGP FlowSpec rule. For a DNS amplification attack, the rule might specify dropping all inbound UDP traffic with a source port of 53. This is a highly precise filter that removes the attack traffic at the network edge, often within the upstream provider's network, before it can consume local bandwidth. For very large attacks that threaten to saturate the upstream link itself, the IRP should be configured to use RTBH, which sacrifices the targeted IP to protect the entire network. This automated, routing-based filtering is the most effective way to respond to modern volumetric DDoS attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats