Manual Chapter : Behavioral and stress-based detection settings

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 7.1.0
Manual Chapter

Behavioral and stress-based detection settings

Evaluating the outcome of your Behavioral DoS (BaDoS) protection to your virtual server, or application, varies depending on the following DoS Behavioral and Stress-based settings. These settings apply thresholds that evaluate server stress, which then allow the system to identify behavioral signatures that characterize the attack. To edit your profile's settings, go to your DoS protected objects list, and select the DDoS profile link (
Monitoring
DASHBOARDS
DDoS
Protection Summary
. From the DoS profile, expand
Application Security
and select
Behavioral & Stress-based Detection
. For more information about DoS profile configuration, see
Create DoS Profiles
.

Stress-Based Detection

Stress-based detection determines an ongoing DoS attack. This method combines monitoring of general traffic over time, in addition to specific detection measures that indicated a DoS attack. Using specific threshold indicators, such as repeated source IPs or URL requests, the system can identify when an attack is ongoing. Web Application Security settings trigger an attack if any (or all) options in your stress-based settings are configured in your DoS profile.
Site Wide
detection is applied when traffic to the entire web site has exceeded the thresholds defined in the detection thresholds, and an attack has not been detected using any of the other detection criteria.

Behavioral Detection

Behavior detection settings identifies attacks and the attack's characteristics. This detection method provides signatures of an attack that can be added to your attack signature list, when reoccurring. The following behaviors are used to trigger an attack:
Bad Actor Detection
Tracks and attempts to identify the bad actors contributing to a given set of malicious traffic. This method identifies a set of malicious traffic contributing to the server stress, and attempts to identify what source IP addresses are generating the malicious traffic, and what percentage of malicious traffic a given bad actor is contributing. Bad actors, are mitigated at transport layer via slowdown mitigation techniques, and the rate at which they are mitigated is directly related to their percentage of contribution to the malicious traffic set, and the mitigation selected.
Signature Detection
When enabled, traffic characteristics are used to identify the cause of the server stress. If there are deviating characteristics, the system dynamically generates a signature based to block traffic anomalies.
When
Accelerated signatures
is enabled, the system detects signatures before connection establishment. This automatically enables the syn-cookie mechanism during the attack.
When
Use approved signatures only
is enabled, the system administrator must manually review and approve detected signatures to enable mitigation action. To view these signatures go to
Monitoring
EVENTS
DoS
Dynamic Signature
.

Mitigation

No Mitigation
Monitors traffic, generates signatures, and identifies bad actors, but does not perform any mitigation.
Standard Protection
If
Bad Actors Behavior Detection
is enabled, slows down identified bad actors.
If
Request Signatures Detection
is enabled, blocks requests that match attack signatures.
Rate limits all requests based on server health
Limits the number of concurrent connections from bad actor IP addresses.
Limits the number of all concurrent connections based on server health
Aggressive Protection
If
Bad Actors Behavior Detection
is enabled, slows down identified bad actors.
If
Request Signatures Detection
is enabled, blocks requests that match attack signatures.
Rate limits all requests based on server health
Limits the number of concurrent connections from bad actor IP addresses.
Limits the number of all concurrent connections based on server health
Proactively performs all protection actions, even before attack detection, increasing impact of protection techniques.