6.6.6.4
HTTP Attack Prevention
HTTP attack sends a complete, legitimate HTTP header, which includes a 'Content-Length' field to specify the size
of the message body to follow. However, the attacker then proceeds to send the actual message body at an extremely
slow rate (e.g. 1 byte/110 seconds). Due to the entire message being correct and complete, the target server will
attempt to obey the 'Content-Length' field in the header, and wait for the entire body of the message to be transmitted,
hence slowing it down.
Field Name
Sample value
Explanation
1. Enable HTTP limit
Enable/Disable
Limits HTTP connections per period
2. Limit period
Second/Minute/Hour/Day
Select in what period limit HTTP connections
3. Limit
“10”
Maximum HTTP connections during the period
4. Limit burst
“10”
Indicating the maximum burst before the above limit
kicks in.
6.6.6.5
HTTPS Attack Prevention
Field Name
Sample value
Explanation
1. Enable HTTPS limit
Enable/Disable
Limits HTTPS connections per period
2. Limit period
Second/Minute/Hour/Day
Select in what period limit HTTPS connections
3. Limit
“10”
Maximum HTTPS connections during the period
4. Limit burst
“10”
Indicating the maximum burst before the above limit
kicks in.
77