FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Conclusion<br />
Conclusion<br />
Spoofed ICMP random type/code flooding<br />
This is a spoofed flood where a single but random ICMP type/code is flooded. Rest of<br />
the packet header may be similar in the packets.<br />
Non-IP flooding<br />
Ethernet header allows different protocols. IP version 4 or version 6 are just two of<br />
them. There are other protocols too. In a non-IP flood, un-common values of the<br />
protocol values are used.<br />
There are many ways to test <strong>DDoS</strong> mitigation equipment. Conditions given above are<br />
just some examples. <strong>DDoS</strong> mitigation is a police and thief game. The hackers come up<br />
with new techniques and therefore the testers and equipment makers have to come up<br />
new techniques to test and benchmark the equipment.<br />
Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />
28-100-167076-20120501 33<br />
http://docs.fortinet.com/ • Feedback