App Security→DDoS Protection
Distributed Denial of Service (DDoS) attacks threaten businesses with downtime that can damage their brand and even lead to financial losses. With the many IoT device-powered botnets and for-hire DDoS services, the threat of an attack is greater than ever. F5 provides DDoS protection that makes sense for your architecture.
DDOS ATTACKS |
HTTP Flood |
Heavy URL |
In an HTTP flood, the attacker exploits seemingly legitimate HTTP GET or POST requests to attack a web server or application. These attacks typically consume less bandwidth than others but focus on triggering complex server-side processing to bring down the targeted site or app. HTTP floods can sometimes trigger responses from web servers that can turn it into a pipe-saturating volumetric attack. | During the reconnaissance phase, an attacker will map out the most computationally expensive URLs on a site or application, also known as heavy URLs. Heavy URLs include any URL causing greater server load upon request. The initial HTTP request is relatively small but can take a long time to complete or yield large response sizes. These requests can require the server to load multiple large files or run resource-intensive database queries. | |
Slowloris |
Slow Post |
|
Slowloris works by opening multiple connections to a web server and sending HTTP requests, none of which are ever completed. Periodically, the attacker sends subsequent HTTP headers for each request, but never actually completes the request. Ultimately, the target server’s maximum concurrent connection pool is filled and legitimate connections are denied. | An attacker begins by sending a legitimate HTTP POST request to a web server, in which the header specifies the exact size of the message body that will follow. However, that message body is then sent at an extremely slow rate. Because the message is technically correct and complete, the targeted server attempts to follow all specified rules. If an attacker establishes enough of these POST attacks simultaneously, they consume server resources to the extent legitimate requests are denied. |
PROTECT APP INFRASTRUCTURE
Protect the network, DNS, and TLS
Your network, DNS, and TLS aren’t often thought of as a part of an application. But DoS or DDoS attacks against these tiers can render your networks, applications, or other supporting infrastructure inaccessible. Our DDoS protection solutions will ensure attacks against these tiers won’t introduce performance degradation or downtime.
DDOS PROTECTION PRODUCTS
F5’s suite of DDoS products offers comprehensive protection and easily fits into the environment that makes sense for your organization.
DDOS DEFENDER (DHD) >
A hardware solution that protects against blended network attacks and sophisticated application attacks, while enabling full SSL decryption, anti-bot capabilities, and advanced detection methods—all in one appliance. DDoS Defender also provides an option for automated upstream signaling to scrub bad traffic before it reaches your data center.
SILVERLINE DDOS PROTECTION >
Silverline DDoS Protection is a fully managed, cloud-based protection service that detects and mitigates large-scale, SSL/TLS, or application-targeted attacks in real time.