Many attack vectors, one objective.

DDoS attacks range from pranksters having fun to targeted acts of retaliation, protest, theft and extortion. Depending on their skills, attackers may use readily available DDoS tools or launch more sophisticated attacks. Ultimately, all DDoS attacks have one objective—to disrupt service availability and have a significant impact on businesses.

Suddenly, your applications aren’t available and you can’t do business with customers.

There are four main types of attacks, although they’re most often combined:

  • Volumetric—flood-based attacks that can be at layer 3, 4, or 7.
  • Asymmetric—invoke timeouts or session-state changes.
  • Computational—consume CPU and memory.
  • Vulnerability-based—exploit application software vulnerabilities.

The most damaging DDoS attacks mix volumetric attacks with targeted, application-specific attacks.

Under Attack?

We can help.

Call (866) 329-4253
or +1 (206) 272-7969
Learn more >

DDoS demands vigilance.

DDoS demands vigilance.

Combined or “mixed” DDoS attacks are becoming more difficult to defend against and are often an indicator of more advanced, persistent threats to come. How quickly you can discover and stop these threats is key to ensuring service continuity and limiting damage.

Consider layer 7.

Consider application layer attacks.

Layer 7 attacks are much more common now. Criminals are increasingly using low-and-slow attacks that target layer 7 computing power and I/O to disable web application servers. These attacks avoid network-level detection and challenge traditional detection methods.

In 2011, you’d see layer 7 attacks infrequently—maybe in 10 percent of DDoS campaigns. Today, the F5 Security Operations Center (SOC) sees layer 7 attacks all the time.

F5 is your best choice for DDoS defense.

F5 provides seamless, flexible, and easy-to-deploy solutions that enable a fast response, no matter what type of DDoS attack you’re under

  • Defends against the full spectrum of DDoS attacks with multi-layered, hybrid defense that combines cloud scrubbing and an on-premises appliance
  • Supports flexible deployment options with inline and out-of-band mode to make sure your applications remain available.
  • Detects and mitigates targeted multi-vector, bursty DDoS with sub-second attack detection and instant mitigation in inline mode.
  • Seamlessly integrates on-premises and native cloud-based attacks, signaling F5 Silverline cloud-based scrubbing.

Choose an application-aware solution.

F5 offers the most comprehensive layer 3—layer 7 DDoS mitigation, combining on-premises and cloud DDoS scrubbing to mitigate network, application, and volumetric attacks.

DDoS Hybrid Defender integrates on-premises DDoS protection
with optional cloud-based scrubbing for fast mitigation.

DDoS Hybrid Defender

Learn more

Find the DDoS solution that’s right for your business.

Do you want to use the cloud to make sure that all traffic coming into your data center is clean?

Do you want to put DDoS protection in front of your current systems?

Do you want to add DDoS protection to your existing BIG-IP system?