The defense policies for HTTP services cover defense.
The AntiDDoS identifies well-known protocols by port number. Non-HTTP services with port 80 may be identified as HTTP services and therefore be discarded when matching specific policies. Therefore, do not use well-known ports for other services.
Defense
HTTP attack defense
When Statistics Based on Source IP Address is enabled and the rate of HTTP packets destined for the Zone is greater than Threshold or Request Threshold, the system enables source IP address-based statistics, and reports anomalies to the ATIC Management center. When the rate of HTTP packets from the IP address is larger than Threshold or Request Threshold, the source authentication of HTTP packets is enabled.
The source-based defense mode can be 302 Redirect, Verify Code, Cookie Authentication or JavaScript.
When Statistics Based on Source IP Address is disabled and the rate of HTTP packets destined for the Zone is larger than Threshold or Request Threshold, the system reports anomalies to the ATIC Management center.
If the defense mode of the Zone is automatic, the system starts defense automatically. If the defense mode is manual, the administrator needs to confirm and start the defense manually. For details on how to configure the defense mode, see Configuring a Defense Mode.
You are advised to specify the Threshold or Request Threshold through baseline learning. For details, see Configuring a Baseline Learning Task.
HTTP Source Authentication Defense
For parameters, see Table 1.
| Parameter | Description | Value | |
|---|---|---|---|
| Defense Mode | Indicates the defense mode that the cleaning device defends against HTTP attack sources. |
|
|
| Verification Code Caption Settings | When you set Defense Mode to Verify Code, the AntiDDoS automatically pushes a verification code page, on which you can set the verification code caption. |
- |
|
| Proxy Detection | Check whether HTTP requests are sent through the proxy. If yes, the system obtains the real IP address from HTTP packets for defense. The defense against attacks with real IP addresses ensures that normal requests are properly processed and attack traffic is discarded. |
You are advised to enable proxy detection if any HTTP proxy exists. |
|
| User-defined HTTP Proxy Keyword | Keyword for configuring a custom HTTP proxy. |
- |
|
Source Authentication Termination Condition |
Attempt Time, Maximum Number of Attempts |
Limits the maximum number of HTTP redirection attempts. |
After the HTTP source authentication defense is enabled and the number of the authentication attempts of a source IP address exceeds Maximum Number of Attempts within Attempt Time, the source IP address is regarded as an attack source and is reported to the ATIC Management center. If the dynamic blacklist mode of the Zone is not Close, the ATIC Management center automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode. Otherwise, the ATIC Management center adds the source IP address to the whitelist. |
SYN Rate Limiting |
Threshold |
If the rate of HTTP packets whose source IP addresses succeed in source authentication exceeds Threshold, the device takes limiting. Limits the number of connections. |
- |
ACK Rate Limiting |
Threshold |
If the rate of HTTP packets whose source IP addresses succeed in source authentication exceeds Threshold, the device takes limiting. Limits the rate of HTTP get packets. |
- |
HTTP First Packet Check
If the interval is smaller than the specified lower limit or greater than the specified upper limit, the anti-DDoS device considers the packet as the first packet and discards it. If the interval is between the lower limit and upper limit, the anti-DDoS device considers the packet as a subsequent packet and permits it.
HTTP Fingerprint Learning
Within the learning cycle, the number of requests with the same fingerprint and from the same source IP address exceeds Matching Counts, the source IP address is regarded as an attack source and is reported to the ATIC Management center. If the dynamic blacklist mode of the Zone is not Close, the ATIC Management center automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode.
HTTP low-rate connection attack defense
If the number of HTTP concurrent connections per second exceeds the given value, the device checks the HTTP packets. If any of the following situations occurs, the protected network is under HTTP low-rate connection attacks. The device reports the source IP address of the attack packets to the ATIC Management center. If the dynamic blacklist of the Zone is not Disable, the system automatically adds the IP address of attack packets to the dynamic blacklist and terminates the connection between this IP address and the HTTP server.
For parameters, see Table 2.
| Parameter | Description |
|---|---|
Number of concurrent connections |
Check the number of HTTP concurrent connections per second. If the count exceeds the given value, the system checks each HTTP packet. |
Total packet length |
If either of the following situations occurs, the system is under HTTP low-rate connection attacks.
|
Packet number |
|
Payload length |
Destination IP-based URI Behavior Monitoring
For parameters, see Table 3.
| Parameter | Description | Value | |
|---|---|---|---|
| Destination IP-based URI Behavior Monitoring | Detection Threshold | Within the Interval, if the ratio of the Closely monitored URI access counts (to a destination IP address) to the total access counts exceeds Detection Threshold, the URI behavior monitoring is enabled on source IP addresses. |
You are advised to configure Detection Threshold based on baseline learning. For details, see Configuring a Baseline Learning Task. |
| Source IP-based URI Behavior Monitoring | Defense Threshold | Within the Interval, the ratio of the Closely monitored URI access counts of a source IP address to the total access counts exceeds Defense Threshold, the source IP address is regarded as an attack source and is reported to the ATIC Management center. If the dynamic blacklist mode of the Zone is not Close, the ATIC Management center automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode. |
- |
| Closely monitored URI |
|
- |
|