This resource is no longer available

Design, Deploy, and Manage a DDoS Protection Architecture

Cover

An increasing number of distributed denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks.

In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS:

  • Volumetric: Flood-based attacks
  • Asymmetric: Attacks designed to invoke timeouts of session changes
  • Computational: Attacks designed to consume CPU
  • Vulnerability-based: Attacks that exploit software vulnerabilities

View now to learn the necessary components of a DDoS protection architecture, and how to leverage that architecture to ensure application and network availability.

Vendor:
F5 Networks
Posted:
31 Mar 2014
Published:
30 Nov 2013
Format:
PDF
Length:
18 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.