26.10.2013 Views

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Can you do the same processing in CPU based systems?<br />

Can you do the same processing in<br />

CPU based systems?<br />

CPU based systems get overwhelmed under pressure of botnet<br />

attacks. They cannot handle the amount of onslaught that botnets<br />

create. A hardware logic based system is designed from ground-up<br />

to process every packet without losing steam. The logic processes<br />

packets in a massively parallel architecture ensuring that all blocks<br />

work together to deliver the allow/deny result quickly.<br />

Blocking botnet attack packets using<br />

Forti<strong>DDoS</strong> appliances<br />

Forti<strong>DDoS</strong> appliances are implemented using hardware logic and<br />

therefore can process all packets at line rate. They have visibility and<br />

control at layer 7 HTTP headers and can process many parameters<br />

simultaneously without slowing down. The hardware logic can<br />

monitor millions of continuously varying parameters per VID and<br />

there can be up to 8 VIDs in a system.<br />

The monitoring is associated with adaptive thresholds which are set<br />

based on your traffic and therefore if the thresholds exceed, the<br />

botnet is caught easily and blocked for a period of time configured by<br />

you.<br />

Conclusion<br />

Designing a security strategy for networked assets can be a daunting<br />

task. New threats demand new types of security elements.<br />

Traditional firewalls and content filters play an essential role in any<br />

network strategy, but neither can adequately defend against ratebased<br />

attacks such as those that are created using botnets. These<br />

systems are now available and extremely affordable, putting true<br />

zero-hour prevention within the reach of all network budgets.<br />

Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />

28-100-167076-20120501 17<br />

http://docs.fortinet.com/ • Feedback

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!