A connection flood is one of the oldest and most common DDoS attacks. It’s called a “TCP connection flood” because it attempts to occupy all possible TCP connections on a server. When you flood a server with connection requests, the server won’t allow requests for legitimate links to be made, making it impossible for legitimate requests to be handled. BIG-IP LTM and BIG-IP AFM neuter the connection flood attack by isolating the connections from the rest of the system. All links are accepted, making the attacker think the attack is successful. A load balancer distributes requests across a pool of servers, ensuring that an overloaded or broken server will process no request.
| 3 Min Read
| 12 Min Read
| 10 Min Read