Next-Generation Technologies & Secure Development
How to Effectively Mitigate Multi-Layer DDoS Attacks
The size, speed and complexity of DDoS attacks are increasing, and a majority of them are application and web attacks. Research estimates the financial impact of attacks at $2.1 million lost for every four hours down.
As a result, organizations need to focus on building the right DDoS architecture to effectively mitigate more sophisticated multi-layer attacks. Identifying the right technologies for your environment is very challenging.
Attend this webinar to learn more about:
- The business impact of DDoS;
- Pros and cons of cloud/hosted services and on-premises defense;
- Why a hybrid approach may be the best option.
Since 2012, a wave of crippling DDoS attacks has pushed large financial customers and enterprises to redesign their networks to include DDoS protection. While the DDoS threat landscape is constantly evolving F5 has found that attacks continue to fall within four attack types: volumetric, asymmetric, computational and vulnerability-based. These attack categories have the following characteristics:
- Volumetric - Flood-based attacks that can be at layer 3, 4, or 7;
- Asymmetric - Attacks designed to invoke timeouts or session-state changes;
- Computational - Attacks designed to consume CPU and memory;
- Vulnerability-based - Attacks that exploit software vulnerabilities.
Defensive mechanisms have evolved to deal with these different categories, and today's high-profile organizations have learned to deploy them in specific arrangements to maximize their security posture. By working with these companies and fine-tuning their components, you'll learn how F5 has developed a recommended DDoS mitigation architecture that can accommodate specific data center size and industry requirements.
Have an account? Sign in.
You might also be interested in …