This resource is no longer available

Mitigating DDoS Attacks with F5 Technology

Cover

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks.  Each type may be matched with the best F5 technology for mitigating that attack.  This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Vendor:
F5 Networks
Posted:
19 Jul 2013
Published:
19 Jul 2013
Format:
PDF
Type:
White Paper
Language:
English

This resource is no longer available.