How to Effectively Mitigate Multi-Layer DDoS Attacks

Background

Since 2012, a wave of crippling DDoS attacks has pushed large financial customers and enterprises to redesign their networks to include DDoS protection. While the DDoS threat landscape is constantly evolving F5 has found that attacks continue to fall within four attack types: volumetric, asymmetric, computational and vulnerability-based. These attack categories have the following characteristics:

Volumetric - Flood-based attacks that can be at layer 3, 4, or 7; Asymmetric - Attacks designed to invoke timeouts or session-state changes; Computational - Attacks designed to consume CPU and memory; Vulnerability-based - Attacks that exploit software vulnerabilities.

Defensive mechanisms have evolved to deal with these different categories, and today's high-profile organizations have learned to deploy them in specific arrangements to maximize their security posture. By working with these companies and fine-tuning their components, you'll learn how F5 has developed a recommended DDoS mitigation architecture that can accommodate specific data center size and industry requirements.