FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Attack</strong>s to test functionality and performance<br />
Spoofed UDP attack<br />
This is a spoofed flood in which the protocol is UDP and source address keeps<br />
changing.<br />
Spoofed ICMP attack<br />
This is a spoofed flood in which the protocol is ICMP and source address keeps<br />
changing.<br />
Spoofed TCP SYN-ACK attack<br />
This is a spoofed TCP flood in which SYN-ACK packets are sent in an anomalous state<br />
manner. Connections are not established prior to this through a SYN packet.<br />
Spoofed TCP FIN-ACK attack<br />
This is a spoofed TCP flood in which FIN-ACK packets are sent in an anomalous state<br />
manner. Connections are not established prior to this through a SYN packet.<br />
Spoofed IP attack<br />
This is a spoofed IP protocol flood. Packets may not necessarily be TCP, UDP or ICMP<br />
and can be any protocol.<br />
Spoofed IP fragments attack<br />
This is a spoofed IP flood in which packets are fragmented - the fragment bit is set in<br />
the layer-3 IP header.<br />
IP-UDP fragments attack<br />
This is a IP flood in which packets are fragmented - the fragment bit is set in the layer-<br />
3 IP header and packets belong to protocol 17 (UDP).<br />
IP-ICMP fragments attack<br />
This is a IP flood in which packets are fragmented - the fragment bit is set in the layer-<br />
3 IP header and packets belong to protocol 1 (ICMP).<br />
TCP/UDP destination port attack<br />
This is a layer 4 flood in which packets attack either a TCP or UDP destination port.<br />
Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />
28-100-167076-20120501 28<br />
http://docs.fortinet.com/ • Feedback