Applies To:
Show VersionsBIG-IP AFM
- 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0
About detecting dynamic DoS attacks
Detection modes
- Disabled
- In this mode, no dynamic DoS detection occurs.
- Learn-Only
- In this mode, the system establishes a baseline for packet processing on AFM. Learn-Only mode detects traffic patterns, establishes a baseline, and detects anomalies, but does not generate logs or dynamic DoS vector signatures. Attacks are not mitigated in Learn-Only mode.
- Enabled
- In this mode, the system monitors traffic, compares traffic changes over time, and detects anomalies. Attacks are logged, dynamic DoS vector signatures are generated, packets are compared to the dynamic DoS vector signature, and attacks are mitigated. When an attack ceases, the dynamic DoS vector signature is removed from the list of signatures.
Mitigation Sensitivity
Mitigation sensitivity establishes how aggressively the system mitigates dynamic DoS attacks. You can set this to None, Low, Medium, or High. By default, mitigation sensitivity is set to None. Low sensitivity is the least aggressive, at the risk of allowing more attack packets through. High drops packets more aggressively, even when attack confidence is lower.
Redirection/Scrubbing
You can configure redirection and scrubbing to handle mitigation of dynamic DoS signatures with an IP Intelligence category. The following parameters can be configured for redirection and scrubbing.
- Scrubbing Category
- You can select an IP Intelligence category for IP addresses blocked by dynamic DoS signatures. By default, the IP intelligence category for scrubbed IP addresses is attacked_ips.
- Scrubbing Advertisement Time
- This is the duration for which a mitigated IP is advertised to the IP Intelligence mechanism for scrubbing. The default is 300 seconds.
Start Relearning
The Start Relearning option clears historical data, thresholds and signatures for the dynamic DoS detection system. The Dynamic DoS signature baseline is re-established. Relearning occurs for a period of 20 minutes.