26.10.2013 Views

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conclusion<br />

Conclusion<br />

Spoofed ICMP random type/code flooding<br />

This is a spoofed flood where a single but random ICMP type/code is flooded. Rest of<br />

the packet header may be similar in the packets.<br />

Non-IP flooding<br />

Ethernet header allows different protocols. IP version 4 or version 6 are just two of<br />

them. There are other protocols too. In a non-IP flood, un-common values of the<br />

protocol values are used.<br />

There are many ways to test <strong>DDoS</strong> mitigation equipment. Conditions given above are<br />

just some examples. <strong>DDoS</strong> mitigation is a police and thief game. The hackers come up<br />

with new techniques and therefore the testers and equipment makers have to come up<br />

new techniques to test and benchmark the equipment.<br />

Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />

28-100-167076-20120501 33<br />

http://docs.fortinet.com/ • Feedback

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!