18.02.2016 Views

End-to-End Mitigation

BRKSEC-3009

BRKSEC-3009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Different Business, Different Targets<br />

DataCenter and Hosting<br />

The Internet<br />

Peering<br />

Transit<br />

Edge<br />

Core<br />

!<br />

DC<br />

!<br />

!<br />

Firewall<br />

DataCenter<br />

Web<br />

Server<br />

!<br />

Database<br />

Web<br />

Cache<br />

! !<br />

• Volumetric attacks can saturate DC<br />

router link<br />

• Sessions flood can overcome stateful<br />

firewall capacity<br />

• HTTP attacks can exhaust web server<br />

and cache<br />

• Queries attacks can exceed database<br />

capacity<br />

• Slow pace attacks can consume<br />

resources in servers (stack, etc)<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!