Firewall | Filecatalyst Web Application
Throughput: 890 Mbps. WAF CPU load: 4%.
The standard —a sophisticated layer 7 shield named FortiWeb —hated it. filecatalyst web application firewall
A hacker in a simulated breach attempted to inject a malformed UDP packet. The WAF's Phase 3 anomaly detector saw a jitter spike from 0.3ms to 12ms. In 14 milliseconds, the WAF sent the kill command. The FileCatalyst server terminated the session before a single packet of corrupted data reached the S3 bucket. Throughput: 890 Mbps
Whenever Maya tried to enforce the WAF rules to inspect the FileCatalyst traffic, the throughput dropped from 900 Mbps to 12 Mbps. The WAF was trying to reassemble UDP datagrams into coherent HTTP requests, failing, and then throttling the connection to prevent a false positive DDoS. A hacker in a simulated breach attempted to
The attacker didn't steal the data—they corrupted it. They injected a 2-millisecond jitter into the FileCatalyst stream, causing the proprietary UDP reassembly engine to silently drop 0.4% of the genomic packets.