• Twitter
  • FaceBook
Home > White Papers > F5 Networks Inc > Mitigating DDoS Attacks with F5 Technology

Mitigating DDoS Attacks with F5 Technology

F5 Networks Inc

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks.  Each type may be matched with the best F5 technology for mitigating that attack.  This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Email this page
Published:  Oct 31, 2013
Type:  White Paper
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter