Understanding L3/4 and DNS Behavioral DoS Mitigation (BDoS)
Dear Reader,
In this article I am writing about another mitigation technology which runs in parallel to the other mitigation methods you can use on a BIG-IP: Dynamic Signatures. These Dynamic Sign...
Published Jun 25, 2020
Version 1.0Sven_Mueller
Employee
I'm a Security Solution Architect in EMEA, focused on Application and Network Security. I act as a liaison between customers, the F5 sales team and the F5 product teams, providing a hands-on real-world perspective. Before I joined F5, I was a Security Consultant and active on HoneyNet research topics. I hold a diploma in Electrical Engineering. Beside my IT Security interests, I'm a Bitcoin enthusiast and love driving on the Nürburgring (Green Hell).Jimmy_Tin
Employee
Jul 20, 2020Great examples of how the behavioural dos works. Thanks!
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)