Condition | Description | Threshold values |
---|---|---|
Global threshold | This mechanism identifies DDoS attacks whose traffic patterns consist of a slow rise in traffic over a set period of time. DDoS mode is activated when the customizable threshold value is met, AND the current number of requests is at least two times (2X) the previous 10-second window. | Default: - This mechanism has a default DDoS threshold of 5,000 requests per 10 seconds. Minimum: - 250 requests per 10 seconds. Maximum: - 50,000 requests per 10 seconds. |
Burst threshold | This mechanism identifies sudden bursts in traffic. DDoS mode is activated when the customizable threshold value is met, AND the number of requests is at least five times (5X) the last 2-second interval. | Default: - 1,000 requests per 2 seconds. Minimum: - 30 requests per 2 seconds. Maximum: - 10,000 requests per 2 seconds. |
Sub-second threshold | This threshold protects the origin servers against attacks from traffic bursts. When this threshold is reached, the DDoS mode will activate on the affected origin server (not the WAAP cluster). This mechanism can mitigate bursts of requests without activating DDoS mode when other threshold conditions aren’t met. Mitigated requests are counted as DDoS L7 - Blocked on the Web Application Firewall Requests analytics graph, and they won’t appear on the DDoS attacks over time graph. | Default: - 50 seconds requests per 0.1 seconds. |