Mitigating DDoS Attacks with F5 Technology

Mitigating DDoS Attacks with F5 Technology

Cover

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks.  Each type may be matched with the best F5 technology for mitigating that attack.  This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Vendor:
F5 Networks
Posted:
19 Jul 2013
Published:
19 Jul 2013
Format:
PDF
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy