Application DDoS Mitigation

Application DDoS Mitigation

34584
Created On 09/25/18 18:09 PM - Last Modified 06/09/23 03:12 AM


Resolution


Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks can be classified in several categories and can be either volumetric or application based. By far, volumetric attacks have been the most popular types of DoS attacks, as readily available tools such as LOIC and HOIC can make it fairly easy to mount an attack. Application attacks that leverage allowed security policies have been gaining popularity as they are very difficult to guard against and can have the same detrimental effect in bringing down critical services.

This document will discuss the primary differences between volumetric and application DoS attacks and will show you how Palo Alto Networks custom vulnerability signatures and security policies can be used to effectively identify and mitigate application based DoS attacks.



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOICA0&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language