You are on page 1of 5

F5 DDOS PROTECTION REFERENCE

ARCHITECTURE
DDOS Attack Defined

© F5 Networks, Inc. 2
DDOS Attack Categories
Volumetric—Flood-based attacks that can be at
layer 3, 4, or 7.

Asymmetric—Attacks designed to invoke timeouts or


session-state changes.

Computational—Attacks designed to consume CPU and


memory.

Vulnerability-based—Attacks that exploit software


vulnerabilities.

© F5 Networks, Inc. 3
Components of a DDoS Protection Architecture

Attack Category Mitigation Component


Volumetric Cloud-Based Scrubbing Service

Web Application Firewall


Asymmetric Web Application Firewall
Computational Application Delivery Controller

Network Firewall
Vulnerability-Based IP Reputation Database

Intrusion Prevention/Detection Systems (IDS/IPS)

Application Delivery Controller

© F5 Networks, Inc. 4
F5 Multi-Tier DDoS Protection Architecture

© F5 Networks, Inc. 5

You might also like