



















Challenges of DDoS detection at terabit scale – TWNOG7 slides
We’ve just published the slides from Pavel Odintsov’s TWNOG7 talk, “Challenges of DDoS Detection on Terabit Scale.”
The presentation walks through a real terabit‑scale deployment in West Asia with more than 750,000 mobile and fixed broadband customers and over 1 Tbps of total capacity, built on Juniper gear. It covers what actually breaks when you try to do near real‑time DDoS detection at that scale: inline monitoring quirks on PTX, double and triple‑tagged VLANs, Linux kernel edge cases, and dealing with UDP telemetry at around 50 kpps.
A big focus is Juniper inline monitoring services and IPFIX: how packet header sampling is structured, what information elements you get (ingress/egress interfaces, direction, frame size, partial payload), and why this approach makes one‑second DDoS detection and live graphs possible when it’s implemented correctly. The deck also shows some fun surprises, like moving from “one flow per UDP packet” to “multiple flows per packet” on PTX and what that did to parsing assumptions in FastNetMon until a full RFC‑compliant implementation was in place.
If you’re working with terabit‑scale traffic, IPFIX/NetFlow, or Juniper inline monitoring, you might find this useful both as a design reference and as a list of gotchas to watch out for.
Slides (PDF): https://fastnetmon.com/wp-content/uploads/2026/04/Challenges-of-DDoS-Detection-on-Terabit-scale-2026-.pdf
What parts of terabit‑scale DDoS detection are the biggest pain points in your network right now: telemetry, detection logic, or mitigation capacity?