摘自:https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology

Mitigating Application Attacks

At the top of the OSI stack is the application layer. This is the area where it's most difficult to detect or defend against malicious behavior, and in particular, conventional firewalls provide little defensive value. Consequently, the application layer is being targeted by most of today's attackers.

Figure 6: Application attacks are the most prevalent today.

An application attack is different from a network attack in that it is specific to the application being targeted. Whereas a SYN flood can be launched against an IP address, an application attack will usually exploit properties specific to the victim, such as the repeated downloading of a single PDF file on the website. To lower-level security devices such as firewalls, the attack connections are indistinguishable from normal traffic.

BIG-IP ASM brings together a variety of anti-attack and DDoS prevention technologies specifically designed to mitigate application layer attacks, including the majority of the OWASP Top 10. BIG-IP ASM learns the expected input for every page in the site it protects and generates a security policy to protect that page. Because BIG-IP ASM is application-aware, it can foil application-layer attacks that abuse the application, the database, or the business logic.

BIG-IP ASM can distinguish between humans and robots as the sources of traffic and use this information during an attack to block non-human visitors. It can also inject JavaScript redirect code into the stream to foil the majority of botnet slaves while allowing access to legitimate browsers. Finally, BIG-IP ASM can also rate-limit traffic to specific application servers when it detects that an attack may be underway.

Mitigating Specific Application Attacks

Today's DDoS attack tools often use multiple attack vectors, mixing flood types. As attacks against the application layer increasingly grow multi-pronged, they've sometimes earned the name diverse distributed denial-of-service (3DoS) attacks. Whether they use high- or low-bandwidth approaches or both, these attacks can be very difficult to identify and defeat.

A solution that can provide early warning about the attack vectors and defend against multiple, simultaneous vectors is therefore the most effective. The combination of BIG-IP LTM, appropriate iRules, and BIG-IP ASM defeats a large number of application-layer attacks.

OSI Layer Attack BIG IP LTM + iRule BIG-IP ASM
Application (Layers 6–7) Slowloris (Nuclear DDoSer, Slowhttptest)
Keep-Dead
Slow POST (R-U-Dead-Yet, Tor Hammer, Nuclear DDoSer, Slowhttptest)
HashDoS
Apache Killer (Slowhttptest)
HTTP GET Flood, Recursive GET Flood (Web Scraping), Dirt Jumper (HTTP Flood)
#RefRef (exploits SQLi / OWASP Top 10 vulnerability as entry)  
XML Bomb (DTD Attack), XML External Entity DoS  

Figure 7: Multiple attack vectors can be defeated by BIG-IP technologies and products working together.

Simple GET floods

One of the most common application layer attacks is a GET flood that simply requests static URLs. BIG-IP LTM can mitigate these attacks with an iRule that filters on the requested URL, and BIG-IP ASM can rate-limit requests based on server performance, client requests per IP address, and increases in requests from specific URIs.

Recursive GET floods

Recursive GET floods are GET flood attacks that iterate through the website, retrieving every object that can be requested. Unlike simple GET floods, recursive floods cannot be filtered with a URL-matching iRule.

BIG-IP ASM can mitigate these attacks from a different angle, however, by monitoring the application's response time (which is by itself the most accurate detection method) and then sequentially applying three different countermeasures:

  1. A smart JavaScript injection that will verify that the user is indeed using a browser. Most attacking tools are not browser-based, since browsers are not designed to send a lot of requests per second. In addition, this countermeasure can deal even with an attacker using a website behind a proxy without affecting the traffic of legitimate users connecting through the same proxy. In either case, the identified attacker's connection is dropped.
  2. If the JavaScript injection doesn't solve the problem, (for example, when it doesn't effect a positive change in latency), then BIG-IP ASM will rate-limit GET requests from even the chattiest IP addresses.
  3. If neither the first nor the second countermeasures solves the issue, BIG-IP ASM escalates to rate-limiting per URL.

Malicious POST floods

POST floods are gaining momentum as attackers have figured out that this technique is a good way to get around various intermediaries, such as content delivery networks (CDNs) and caching services. Typically POST floods bypass these and go straight to the origin servers. Sending a POST, which is nearly as easy for a client as sending a GET, has a much greater chance of tying up valuable resources on the origin server.

BIG-IP ASM can use its techniques for identifying human vs. robotic connections to foil POST attacks. As with recursive GET floods, it can also rate-limit based on the URI, server performance, or the number of requests per client.

Mitigating Low Bandwidth HTTP Attacks

Low-bandwidth attacks are a specific form of application-layer attack that are often undetectable by conventional means because they use very little incoming bandwidth.

Slowloris attacks

The Slowloris and PyLoris attack tools achieve denial of service by feeding an HTTP header to a server in an extremely slow fashion. Slowloris starts by probing the target service to determine its inactivity timeout—usually about five minutes or 300 seconds. Once the interval is known, Slowloris opens connections that emulate a simple browser and sends a bogus HTTP header just ahead of the timeout (for instance, every 299 seconds):

 HTTP/1.1 GET / X: a <299 second pause> X: a <299 second pause> X: a <299 second pause>

The connections will go on like this forever. When enough of them have engaged a specific web server, that server will no longer have enough connections to accept new requests, resulting in a denial of service.

BIG-IP LTM, as a standard, layer 7, full-proxy virtual server for HTTP, mitigates these attacks in its TMOS high-performance traffic management microkernel or simply dilutes the attack with the PVA. It will never pass along Slowloris and Pyloris requests because it will be waiting for the final double carriage return that marks the end of the headers. Since the attack tools never send that token, BIG-IP LTM does not consider the connections valid. Eventually they will be discarded without ever consuming resources behind the ADC.

For distributed Slowloris attacks, where millions of Slowloris connections may pile up at the BIG-IP device, a Slowloris iRule takes a more proactive approach to dealing with the attack.

Slow POST attacks

The slow POST attack is similar to the Slowloris attack but can only be mitigated with the BIG-IP ASM module. Slow POST works by starting an HTTP POST operation (like an upload) and then feeding the upload data in very slowly:

 HTTP/1.1 POST /target-url Content-Length: 1048576 Host: a a <pause> b <pause> c <pause>

BIG-IP ASM mitigates this and other low-bandwidth attacks by cataloging the performance of each request and then limiting the number of very slow connections per CPU core.

By establishing and enforcing a limit on these kinds of attacks, BIG-IP ASM allows access to legitimate clients with poor connections while defending the resources from malicious overloading.

HashDoS

All major web services platforms (e.g., Java, ASP.NET, and Apache) use the same fast hash algorithm for the dictionary tables. Their reliance on the same hash function made all of these platforms vulnerable to a clever attack released in late 2011 called the HashDoS attack. It worked by sending a single large POST filled with thousands of tailored form variables that overwhelmed the hashing function of any single target server. A single POST message, pre-computed and sent over a 33 K connection by a client as weak as a handset, could tie up a server for over an hour.

BIG-IP LTM mitigates this HashDoS attack through the application of a public iRule that drops any POST that contains an excessive number of form variables or an excessively large payload. By mitigating the problem at the ADC, organizations protect all back-end web server platforms at the same time. BIG-IP ASM mitigates this attack by using a signature and limiting the total number of parameters that can be sent on a single request.

Figure 8: F5 solutions protect all web service platforms against HashDoS attacks.

转载于:https://www.cnblogs.com/bonelee/p/9222165.html

f5 ddos cc——Mitigating DDoS Attacks with F5 Technology相关推荐

  1. DDoS deflate–简单解决VPS被DDOS/CC攻击

    为什么80%的码农都做不了架构师?>>>    我想现在大家接触VPS久了,也知道互联网上被DDOS,CC是家常便饭,在没有硬防的情况下,寻找软件代替是最直接的方法,比如用iptab ...

  2. 冠赢网络:游戏盾彻底解决DDoS/CC攻击

    公司简介 厦门冠赢网络科技有限公司是一家高速发展的新型网络科技公司.2019年3月,冠赢网络荣任厦门市动漫游戏产业协会副会长单位:2019年5月,冠赢网络荣获"VR百强企业"称号. ...

  3. 2.12linux csf 防火墙 防止少量的ddos cc攻击

    CSF即(ConfigServer Security & Firewall)是一款优秀的Linux服务器防火墙软件,是基于状态包检测(SPI,state packet inspection)的 ...

  4. linux防火墙能阻止cc攻击吗,linux csf 防火墙 防止少量的ddos cc攻击很有效

    上篇博客说到,httpd请求数过多,apache连接数不够,加大连接数的做法,在受ddos,cc攻击的情况下,最终的结果就是系统资源耗尽,导致死机. 测试服务器,也没有想到会受到攻击,什么防范措施也没 ...

  5. linux 防ddos攻击软件,linux系统下免费防DDOS CC攻击脚本,有效减轻服务器压力 【转】...

    网站DDOS是最头疼的事.即使是国内高防的服务器,也不能100%彻底解决CC,DDOS攻击,在没有硬防的情况下,寻找软件代替是最直接的方法,比如用iptables,但是iptables不能在自动屏蔽, ...

  6. app防御ddos/cc攻击

    2019年8月客户APP防御DDoS/CC攻击.近年来APP的客户越来越多,被攻击也非常的多.而且相比网站防御APP防御难点很多,小型攻击网站防御可以用CDN进行防御,CDN可以有效隐藏源服务器IP, ...

  7. DDOS\CC流量攻击

    一. DDOS攻击 简单说就是瞬间有大量请求访问接口. 导致网站无法正常访问甚至出现短暂的关闭 DDOS攻击原理 简单的ddos攻击: 写个死循环一直调用被攻击方接口, 导致被攻击方请求连接数量或QP ...

  8. Linux安全之三大攻击(SYN,DDOS,CC)原理及处理的详解

    Linux安全之SYN攻击原理及处理 TCP自从1974年被发明出来之后,历经30多年发展,目前成为最重要的互联网基础协议,但TCP协议中也存在一些缺陷. SYN攻击就是利用TCP协议的缺陷,来导致系 ...

  9. 700Gddos高防ip可以防御多少ddos cc攻击

    700Gddos高防可以防御多少ddos cc攻击 700Gddos高防ip按这个数据是可以防御700G的ddos攻击流量的 不超这个量多没事 超了就看商家有没有更高的防御了 cc攻击目前也是主流的攻 ...

最新文章

  1. Redux源码浅析系列(二):`combineReducer`
  2. plc的时代背景_PLC发明史
  3. POJ - 2559 Largest Rectangle in a Histogram(笛卡尔树,单调栈实现)
  4. Unity之CharacterController2D学习笔记(1)——基础使用
  5. mongodb----副本集搭建及故障自动切换
  6. linux 16.04 WIFI,手动配置 WIFI无线网络 (Ubuntu 16.04)
  7. 数值分析(11)-数值积分
  8. java-循环变量定义问题
  9. pyecharts世界地图map,geo可视化优化调整
  10. 【1】嵌入式TCP/IP协议——————Art-Net调试工具 DMX-Workshop
  11. C/C++实现atoll函数
  12. 百度 95 后程序员删库跑路被判刑,动机为工作内容变动及对领导不满,删库会给互联网公司带来哪些影响?
  13. 虚拟机安装苹果系统的教程
  14. js延迟(异步)加载的6种方式 为什么要延迟加载js呢?
  15. ospf 指定dr_OSPF DR BDR 配置方法2
  16. 【深度】被加班,狼性文化面纱下的奴性文化
  17. 大学英语六级考试大纲 A
  18. Delta tuning(只抓核心)
  19. sign签名验签方案及代码
  20. 利用计算机证明猜想,计算机科学家利用量子纠缠系统,证实44年前的一个猜想是错误的...

热门文章

  1. Linux之telnet命令使用详解—网络故障定位(四)
  2. Fiddler常用功能介绍
  3. 上海两年java_两年Java工程师应该掌握的知识点
  4. virilog 模块之间的层次关系_软件工程导论 期末复习题
  5. 蓝牙管理软件_Mac蓝牙检测软件----BlueSense
  6. iframe内容 固定比例_允知研习|浅析固定总价合同的结算问题
  7. 电子技术基础三_电子技术基础
  8. 四因素三水平正交试验表_案例 | 螺栓装配失效试验研究
  9. python中全局变量和局部变量关键字_Python中全局变量和局部变量的理解与区别
  10. mySQL_connect怎么调用_Mysql ConnectC/C++使用