Transport layer security Although often erroneously assigned to the application layer,
SSL is the most common method of securing application traffic through an ADN today. SSL uses
PKI to establish a secure connection between the client and the ADN, making it difficult for attackers to decrypt the data in transit or hijack the session.
Application layer security Resource cloaking The use of a virtual IP address (VIP) and position of the ADN in the network provides the means through which certain resources can be cloaked, or hidden, from the client. Because the ADN is designed to understand applications and application protocols, such as
HTTP, it can manipulate certain aspects of the protocol to cloak the servers in the pool and prevent potentially useful information regarding the software and hardware infrastructure from being exposed. A typical use of this functionality is to hide the operating system and server software used to host the application. This is usually accomplished by rewriting the Server field in an HTTP response. A second typical use of this functionality is the exploitation of the ADN's ability to rewrite the
URI portion of an HTTP request. The client is presented with a URI and VIP that are known only to the ADN, and upon receiving the request the ADN may either (a) rewrite the URI and send a 302 redirect or (b) transparently translates the URI and responds to the client as if the URI were the right one in the first place.
Application firewall In recent years commercial ADNs have begun to include
application firewall functionality to further secure applications during the delivery process. This is a hotly debated subject with many security professionals arguing that the functionality included in an application firewall are unnecessary and should be handled by the application while others consider employing as much security as possible, regardless of position in the delivery network, to be the best practice. Many commercial ADN companies have acquired and integrated these functions and present such features as part of a
defense in depth strategy often cited by security professionals.
Network layer security The ADN is most often deployed in the DMZ at the edge of the network. This results in exposure to potential network layer attacks including
Denial of Service (DoS) from ICMP and SYN floods. As a result, the ADN must necessarily protect not only itself but the applications it is delivering from succumbing to such attacks. The ADN generally employs a number of protections against typical network layer attacks though it does not implement the full security offered by an
IPS. Some of the Network Layer Security technologies that may be employed by ADN devices include:
Delayed binding Delayed binding, also called TCP splicing, is the postponement of the connection between the client and the server in order to obtain sufficient information to make a routing decision. Some application switches and routers delay binding the client session to the server until the proper handshakes are complete so as to prevent Denial of Service attacks.
IP filtering ADNs often have the ability to filter traffic based on
Access Control Lists (ACLs), Bogus IP ranges (Bogon filtering) and
deep packet inspection pattern matching. In some cases, thresholds or rate limiting of IP addresses or ranges of IP addresses may be employed. ==Traffic management==