Limiting HTTP/HTTPS GET and POST Flood Attacks using an iRule
Hey folks,
I am interested in seeing if there is an existing iRule that can rate limit HTTP/HTTPS GET/POST Flood Attacks. I have search DevCentral and found a few similar but many look as though they are based on individual URI's and Source IP's.
In my specific instance, I want to limit based on source IP. If the source goes over the specific POST/GET limit within a specified time frame, they then are dropped automatically for a specified period of time.
I have looked into ASM, but do not have a budget at this time to purchase that functionality.
Any help would be appreciated.
In my specific instance, I want to limit based on source IP. If the source goes over the specific POST/GET limit within a specified time frame, they then are dropped automatically for a specified period of time.
are these applicable?
v10.1 - The table Command - Examples by spark (Limiting POST Requests Per User)
Limit the number of HTTP requests by a client within a specified time by Bhanu