In the context of DoS protection, enforcing a rate limit is a common strategy to prevent abuse and ensure service availability. The scenario described involves limiting the rate at which users can post ".tar.gz" files to five within five seconds. The correct ban configuration for this requirement would be one that specifies an average rate of 5 with a file extension match on “.tar.gz" within the Web Application and API Security (WAAS) component of a security solution like Prisma Cloud. WAAS is designed to protect web applications and APIs from various threats, including DoS attacks, by applying policies that can limit actions based on specific criteria, such as file types and request rates. This configuration ensures that any attempt to upload more than five ".tar.gz" files within a five-second window would be detected and blocked, mitigating the risk of DoS attacks targeting this particular file upload functionality.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit