
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 08:51:40 GMT</lastBuildDate>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q2/</link>
            <pubDate>Tue, 09 Jul 2024 13:00:32 GMT</pubDate>
            <description><![CDATA[ Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6H7tZjcmMtTkqI4vnZh1cU/57e3e3bcf83b65ac75c5fcaa72389270/image13-1.png" />
            
            </figure><p>Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/">Cloudflare network</a>. This edition focuses on the second quarter of 2024.</p><p>With a 280 terabit per second network located across over 320 cities worldwide, <a href="https://w3techs.com/technologies/details/cn-cloudflare">serving 19% of all websites</a>, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights for 2024 Q2</h2>
      <a href="#key-insights-for-2024-q2">
        
      </a>
    </div>
    <ul><li><p>Cloudflare recorded a 20% year-over-year increase in DDoS attacks.</p></li><li><p>1 out of every 25 survey respondents said that DDoS attacks against them were carried out by state-level or state-sponsored threat actors.</p></li><li><p>Threat actor capabilities reached an all-time high as our automated defenses generated 10 times more fingerprints to counter and mitigate the ultrasophisticated DDoS attacks.</p></li></ul><p>View the interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2024-q2">Cloudflare Radar</a>.</p>
    <div>
      <h3>Quick recap - what is a DDoS attack?</h3>
      <a href="#quick-recap-what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>Before diving in deeper, let's recap what a DDoS attack is. Short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>, a DDoS attack is a type of cyber attack designed to take down or disrupt Internet services, such as websites or mobile apps, making them unavailable to users. This is typically achieved by overwhelming the victim's server with more traffic than it can handle — usually from multiple sources across the Internet, rendering it unable to handle legitimate user traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2S7TgrtK197L1YGvjBgZm2/0664811e82a92b1c9c1a178458f75550/unnamed-4.png" />
            
            </figure><p>Diagram of a DDoS attack</p><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>, access <a href="/tag/ddos-reports">previous DDoS threat reports</a> on the Cloudflare blog or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. There's also a <a href="https://developers.cloudflare.com/radar/">free API</a> for those interested in investigating these and other Internet trends.</p><p>To learn about our report preparation, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>Threat actor sophistication fuels the continued increase in DDoS attacks</h3>
      <a href="#threat-actor-sophistication-fuels-the-continued-increase-in-ddos-attacks">
        
      </a>
    </div>
    <p>In the first half of 2024, we mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. Overall, the number of DDoS attacks in Q2 decreased by 11% quarter-over-quarter, but increased 20% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ctaeSKgnNEYe46W7UEKGs/fa4f515c4ed4fcbeac3e685ebc9a721f/unnamed--1--3.png" />
            
            </figure><p>Distribution of DDoS attacks by types and vectors</p><p>For context, in the entire year of 2023, we mitigated 14 million DDoS attacks, and halfway through 2024, we have already mitigated 60% of last year’s figure.</p><p>Cloudflare successfully mitigated 10.2 trillion HTTP DDoS requests and 57 petabytes of network-layer DDoS attack traffic, preventing it from reaching our customers’ origin servers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WyUYhLUD166Po7ah6ZEQp/16f3d7d1c48488ae6d4dc3475329a432/unnamed--2--2.png" />
            
            </figure><p>DDoS attacks stats for 2024 Q2</p><p>When we break it down further, those 4 million DDoS attacks were composed of 2.2 million network-layer DDoS attacks and 1.8 million HTTP DDoS attacks. This number of 1.8 million HTTP DDoS attacks has been normalized to compensate for the explosion in sophisticated and randomized HTTP DDoS attacks. Our automated mitigation systems generate real-time fingerprints for DDoS attacks, and due to the randomized nature of these sophisticated attacks, we observed many fingerprints being generated for single attacks. The actual number of fingerprints that was generated was closer to 19 million – over ten times larger than the normalized figure of 1.8 million. The millions of fingerprints that were generated to deal with the randomization stemmed from a few single rules. These rules did their job to stop attacks, but they inflated the numbers, so we excluded them from the calculation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NbYriDgdvtAormXB1spNP/c8ef433d3386dd7f44ee72c7625fd980/unnamed--3--2.png" />
            
            </figure><p>HTTP DDoS attacks by quarter, with the excluded fingerprints</p><p>This ten-fold difference underscores the dramatic change in the threat landscape. The tools and capabilities that allowed threat actors to carry out such randomized and sophisticated attacks were previously associated with capabilities reserved for state-level actors or state-sponsored actors. But, coinciding with the rise of generative AI and autopilot systems that can help actors write better code faster, these capabilities have made their way to the common cyber criminal.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In May 2024, the percentage of attacked Cloudflare customers that reported being threatened by a DDoS attack threat actor, or subjected to a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> reached 16% – the highest it’s been in the past 12 months. The quarter started relatively low, at 7% of customers reporting a threat or a ransom attack. That quickly jumped to 16% in May and slightly dipped in June to 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16Ppdz9v4IcH0Xgii7EhdM/5551f7fdf2b2d8db252ea7a9cf845dc9/unnamed--4--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by month)</p><p>Overall, ransom DDoS attacks have been increasing quarter over quarter throughout the past year. In Q2 2024, the percentage of customers that reported being threatened or extorted was 12.3%, slightly higher than the previous quarter (10.2%) but similar to the percentage of the year before (also 12.0%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WxCgT7fCSV3btCf6PmAIw/212c7d54d431c8b0c4aef091b68eda25/unnamed--5--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by quarter)</p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>75% of respondents reported that they did not know who attacked them or why. These respondents are Cloudflare customers that were targeted by HTTP DDoS attacks.</p><p>Of the respondents that claim they did know, 59% said it was a competitor who attacked them. Another 21% said the DDoS attack was carried out by a disgruntled customer or user, and another 17% said that the attacks were carried out by state-level or state-sponsored threat actors. The remaining 3% reported it being a self-inflicted DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fktInA0cQbth4up5dPB6M/366eda36e7c414c4e114c9a1f3e2cb27/unnamed--6--2.png" />
            
            </figure><p>Percentage of threat actor type reported by Cloudflare customers, excluding unknown attackers and outliers</p>
    <div>
      <h2>Top attacked countries and regions</h2>
      <a href="#top-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>In the second quarter of 2024, China was ranked the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">most attacked country</a> in the world. This ranking takes into consideration HTTP DDoS attacks, network-layer DDoS attacks, the total volume and the percentage of DDoS attack traffic out of the total traffic, and the graphs show this overall DDoS attack activity per country or region. A longer bar in the chart means more attack activity.</p><p>After China, Turkey came in second place, followed by Singapore, Hong Kong, Russia, Brazil, and Thailand. The remaining countries and regions comprising the top 15 most attacked countries are provided in the chart below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3FspFSjHCEwIuauYTQYg/bcc283b99df5eb93428f138eea18a676/unnamed--7--2.png" />
            
            </figure><p>15 most attacked countries and regions in 2024 Q2</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>The Information Technology &amp; Services was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">most targeted industry</a> in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>The Telecommunications, Services Providers and Carrier sector came in second. Consumer Goods came in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/M7x6hcaQ3rq20x0SZ61y9/a370d20f43aa968efd1892dd4e8619c6/unnamed--8--1.png" />
            
            </figure><p>15 most attacked industries in 2024 Q2</p><p>When analyzing only the HTTP DDoS attacks, we see a different picture. Gaming and Gambling saw the most attacks in terms of HTTP DDoS attack request volume. The per-region breakdown is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ElWJHm7iaazkMY0i3FbAY/438d6fb1fd9f515cc8961c88770039c9/unnamed--9--1.png" />
            
            </figure><p>Top attacked industries by region (HTTP DDoS attacks)</p>
    <div>
      <h2>Largest sources of DDoS attacks</h2>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>Argentina was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">largest source</a> of DDoS attacks in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>Indonesia followed closely in second place, followed by the Netherlands in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EsagO6GQdPElCwfU735Ed/ee71ca617bbd2281c45db36cebb6f0a8/unnamed--10--1.png" />
            
            </figure><p>15 largest sources of DDoS attacks in 2024 Q2</p>
    <div>
      <h2>DDoS attack characteristics</h2>
      <a href="#ddos-attack-characteristics">
        
      </a>
    </div>
    
    <div>
      <h3>Network-layer DDoS attack vectors</h3>
      <a href="#network-layer-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Despite a 49% decrease quarter-over-quarter, DNS-based DDoS attacks remain the most common attack vector, with a combined share of 37% for <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> came in second place with a share of 23%, followed by RST floods accounting for a little over 10%. SYN floods and RST floods are both types of TCP-based DDoS attacks. Collectively, all types of TCP-based DDoS attacks accounted for 38% of all network-layer DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C8gqiEuTXWaZJYOC4l29Z/eeb4e6734ec7c42f328c02dc46f3a0ba/unnamed--11--1.png" />
            
            </figure><p>Top attack vectors (network-layer)</p>
    <div>
      <h3>HTTP DDoS attack vectors</h3>
      <a href="#http-ddos-attack-vectors">
        
      </a>
    </div>
    <p>One of the advantages of operating a large network is that we see a lot of traffic and attacks. This helps us improve our detection and mitigation systems to protect our customers. In the last quarter, half of all <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attacks</a> were mitigated using proprietary heuristics that targeted botnets known to Cloudflare. These heuristics guide our systems on how to generate a real-time fingerprint to match against the attacks.</p><p>Another 29% were HTTP DDoS attacks that used fake user agents, impersonated browsers, or were from headless browsers. An additional 13% had suspicious HTTP attributes which triggered our automated system, and 7% were marked as generic floods. One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our initial attempt to categorize the HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Q30Uxkud0qxOCbzTjgUjc/86ec3083a7d52167e143fd79ad847f77/unnamed--12-.png" />
            
            </figure><p>Top attack vectors (HTTP)</p>
    <div>
      <h3>HTTP versions used in DDoS attacks</h3>
      <a href="#http-versions-used-in-ddos-attacks">
        
      </a>
    </div>
    <p>In Q2, around half of all web traffic used HTTP/2, 29% used HTTP/1.1, an additional fifth used HTTP/3, nearly 0.62% used HTTP/1.0, and 0.01% for HTTP/1.2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4iG2zFOZIR91P56H7DiNFw/30d39a97fadf6f974acc35f588418e5e/unnamed--13-.png" />
            
            </figure><p>Distribution of web traffic by HTTP version</p><p>HTTP DDoS attacks follow a similar pattern in terms of version adoption, albeit a larger bias towards HTTP/2. 76% of HTTP DDoS attack traffic was over the HTTP/2 version and nearly 22% over HTTP/1.1. HTTP/3, on the other hand, saw a much smaller usage. Only 0.86% of HTTP DDoS attack traffic were over HTTP/3 — as opposed to its much broader adoption of 20% by all web traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qSkeg0USHPZn76shu5lAc/ce683586034c622a798326b4d8c05447/unnamed--14-.png" />
            
            </figure><p>Distribution of HTTP DDoS attack traffic by HTTP version</p>
    <div>
      <h3>DDoS attack duration</h3>
      <a href="#ddos-attack-duration">
        
      </a>
    </div>
    <p>The vast majority of DDoS attacks are short. Over 57% of HTTP DDoS attacks and 88% of network-layer DDoS attacks end within 10 minutes or less. This emphasizes the need for automated, in-line detection and mitigation systems. Ten minutes are hardly enough time for a human to respond to an alert, analyze the traffic, and apply manual mitigations.</p><p>On the other side of the graphs, we can see that approximately a quarter of HTTP DDoS attacks last over an hour, and almost a fifth last more than a day. On the network layer, longer attacks are significantly less common. Only 1% of network-layer DDoS attacks last more than 3 hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5THWXBww1SvjFhGz3faxvf/27b48ed6dac038a9342c84ec0661caa4/unnamed--15-.png" />
            
            </figure><p>HTTP DDoS attacks: distribution by duration</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jCKPONG0sxuKYTVU1dne5/69f9f38dae5d46b0b2c5b40f9d97f2a3/unnamed--16-.png" />
            
            </figure><p>Network-layer DDoS attacks: distribution by duration</p>
    <div>
      <h3>DDoS attack size</h3>
      <a href="#ddos-attack-size">
        
      </a>
    </div>
    <p>Most DDoS attacks are relatively small. Over 95% of network-layer DDoS attacks stay below 500 megabits per second, and 86% stay below 50,000 packets per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KtVJSY1wf4G0dcalUVRYu/7bf4d928903b3c69e29c251205046e79/unnamed--17-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by bit rate</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Xdwy1icebxX20wmq3DE2g/8911a08a43185159155cf00317cc7dbd/unnamed--18-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by packet rate</p><p>Similarly, 81% of HTTP DDoS attacks stay below 50,000 requests per second. Although these rates are small on Cloudflare’s scale, they can still be devastating for unprotected websites unaccustomed to such traffic levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NMeVYFSRo9RKwnmPsqOBj/67655da4382355f8424a2525b2bf5f74/unnamed--19-.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by request rate</p><p>Despite the majority of attacks being small, the number of larger volumetric attacks has increased. One out of every 100 network-layer DDoS attacks exceed 1 million packets per second (pps), and two out of every 100 exceed 500 gigabits per second. On layer 7, four out of every 1,000 HTTP DDoS attacks exceed 1 million requests per second.</p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are small and quick. However, even these attacks can disrupt online services that do not follow <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">best practices for DDoS defense</a>.</p><p>Furthermore, threat actor sophistication is increasing, perhaps due to the availability of Generative AI and developer copilot tools, resulting in attack code that delivers DDoS attacks that are harder to defend against. Even prior to the rise in attack sophistication, many organizations struggled to defend against these threats on their own. But they don’t need to. Cloudflare is here to help. We invest significant resources – so you don’t have to – to ensure our automated defenses, along with the entire portfolio of Cloudflare security products, to protect against existing and emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[SYN Flood]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">5zkxlKrbZNjy1jeKkohkyt</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q1/</link>
            <pubDate>Tue, 16 Apr 2024 13:00:25 GMT</pubDate>
            <description><![CDATA[ 2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year. 
Read the full coverage ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CRUEQXjRjK9JCmDScvOe9/202241692c52e9b98d7c4609ae6a90b5/image13.png" />
            
            </figure><p>Welcome to the 17th edition of Cloudflare’s DDoS threat report. This edition covers the DDoS threat landscape along with key findings as observed from the <a href="https://www.cloudflare.com/network/">Cloudflare network</a> during the first quarter of 2024.</p>
    <div>
      <h3>What is a DDoS attack?</h3>
      <a href="#what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>But first, a quick recap. A DDoS attack, short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>, is a type of cyber attack that aims to take down or disrupt Internet services such as websites or mobile apps and make them unavailable for users. DDoS attacks are usually done by flooding the victim's server with more traffic than it can handle.</p><p>To learn more about DDoS attacks and other types of attacks, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>.</p>
    <div>
      <h3>Accessing previous reports</h3>
      <a href="#accessing-previous-reports">
        
      </a>
    </div>
    <p>Quick reminder that you can access <a href="/tag/ddos-reports">previous editions of DDoS threat reports</a> on the Cloudflare blog. They are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. On Radar, you can find global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities, so you can zoom in on specific countries, industries, and networks. There’s also a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet trends across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>2024 Q1 key insights</h3>
      <a href="#2024-q1-key-insights">
        
      </a>
    </div>
    <p>Key insights from the first quarter of 2024 include:</p><ul><li><p>2024 started with a bang. Cloudflare’s defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter — representing a 50% year-over-year (YoY) increase.</p></li><li><p>DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.</p></li><li><p>DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.</p></li></ul>
    <div>
      <h3>Starting 2024 with a bang</h3>
      <a href="#starting-2024-with-a-bang">
        
      </a>
    </div>
    <p>We’ve just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks — an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023.</p><p>Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QB3mXk7ACemlQBJcY05Wk/ecb4b32b415ac29a3c5fe673af3520da/image1-15.png" />
            
            </figure><p>2024 Q1: Cloudflare mitigated 4.5 million DDoS attacks</p><p>When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3B6aKU9fQb6RGzcJYQmjVv/e8a91d10307dc429c47ca413cf134774/pasted-image-0--7--1.png" />
            
            </figure><p>DDoS attacks by year and quarter</p><p>In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic — just on the network-layer.</p><p>Among those network-layer DDoS attacks, many of them exceeded the 1 terabit per second rate — almost on a weekly basis. The largest attack that we have mitigated so far in 2024 was launched by a Mirai-variant botnet. This attack reached 2 Tbps and was aimed at an Asian hosting provider protected by <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Cloudflare Magic Transit</a>. Cloudflare’s systems automatically detected and mitigated the attack.</p><p>The <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>, infamous for its massive DDoS attacks, was primarily composed of infected IoT devices. It notably disrupted Internet access across the US in 2016 by targeting DNS service providers. Almost eight years later, Mirai attacks are still very common. Four out of every 100 HTTP DDoS attacks, and two out of every 100 L3/4 DDoS attacks are launched by a Mirai-variant botnet. The reason we say “variant” is that the Mirai source code was made public, and over the years there have been many permutations of the original.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QN1Ndrb3e0EEiVNPu1chA/1c3a61ed355fd74c008955659d696661/pasted-image-0-3.png" />
            
            </figure><p>Mirai botnet targets Asian hosting provider with 2 Tbps DDoS attack</p>
    <div>
      <h3>DNS attacks surge by 80%</h3>
      <a href="#dns-attacks-surge-by-80">
        
      </a>
    </div>
    <p>In March 2024, we introduced one of our latest DDoS defense systems, the <a href="/advanced-dns-protection">Advanced DNS Protection</a> system. This system complements our existing systems, and is designed to protect against the most sophisticated DNS-based DDoS attacks.</p><p>It is not out of the blue that we decided to invest in this new system. DNS-based DDoS attacks have become the most prominent attack vector and its share among all network-layer attacks continues to grow. In the first quarter of 2024, the share of DNS-based DDoS attacks increased by 80% YoY, growing to approximately 54%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eeimQquFTBhNCOKeGTcoe/d1ccde4a4468aa1a73ee7fb5711014ba/pasted-image-0--1--1.png" />
            
            </figure><p>DNS-based DDoS attacks by year and quarter</p><p>Despite the surge in DNS attacks and due to the overall increase in all types of DDoS attacks, the share of each attack type, remarkably, remains the same as seen in our previous report for the final quarter of 2023. HTTP DDoS attacks remain at 37% of all DDoS attacks, DNS DDoS attacks at 33%, and the remaining 30% is left for all other types of L3/4 attacks, such as <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP Floods</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lUZwA2pBOVNWP9nW5541d/c4460eeac1d3b5a40e84dbb1fb6cf89f/pasted-image-0--2-.png" />
            
            </figure><p>Attack type distribution</p><p>And in fact, SYN Floods were the second most common L3/4 attack. The third was RST Floods, another type of TCP-based DDoS attack. UDP Floods came in fourth with a 6% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mQ0isNVD7dWQbtnq5DITg/0fb241b6fd61d552d3a579323e37f38b/pasted-image-0--3-.png" />
            
            </figure><p>Top attack vectors</p><p>When analyzing the most common attack vectors, we also check for the attack vectors that experienced the largest growth but didn’t necessarily make it into the top ten list. Among the top growing attack vectors (emerging threats), Jenkins Flood experienced the largest growth of over 826% QoQ.</p><p>Jenkins Flood is a DDoS attack that exploits vulnerabilities in the <a href="https://www.jenkins.io/">Jenkins automation server</a>, specifically through UDP multicast/broadcast and DNS multicast services. Attackers can send small, specially crafted requests to a publicly facing UDP port on Jenkins servers, causing them to respond with disproportionately large amounts of data. This can amplify the traffic volume significantly, overwhelming the target's network and leading to service disruption. Jenkins addressed this vulnerability (<a href="https://smartermsp.com/cybersecurity-threat-advisory-0013-20-jenkins-udp-ddos-attack-cve-2020-2100/">CVE-2020-2100</a>) in 2020 by disabling these services by default in later versions. However, as we can see, even 4 years later, this vulnerability is still being abused in the wild to launch DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZBbtghkPLvvRnFaTAw9d/f1030dfaed7500861fdbc83b1c4d02ab/pasted-image-0--4-.png" />
            
            </figure><p>Attack vectors that experienced the largest growth QoQ</p>
    <div>
      <h3>HTTP/2 Continuation Flood</h3>
      <a href="#http-2-continuation-flood">
        
      </a>
    </div>
    <p>Another attack vector that’s worth discussing is the HTTP/2 Continuation Flood. This attack vector is made possible by a vulnerability that was <a href="https://nowotarski.info/http2-continuation-flood-technical-details/">discovered and reported publicly by researcher Bartek Nowotarski</a> on April 3, 2024.</p><p>The HTTP/2 Continuation Flood vulnerability targets HTTP/2 protocol implementations that improperly handle HEADERS and multiple CONTINUATION frames. The threat actor sends a sequence of CONTINUATION frames without the END_HEADERS flag, leading to potential server issues such as out-of-memory crashes or CPU exhaustion. HTTP/2 Continuation Flood allows even a single machine to disrupt websites and APIs using HTTP/2, with the added challenge of difficult detection due to no visible requests in HTTP access logs.</p><p>This vulnerability poses a potentially severe threat more damaging than the previously known <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">HTTP/2 Rapid Reset</a>, which resulted in some of the largest HTTP/2 DDoS attack campaigns in recorded history. During that campaign, thousands of hyper-volumetric DDoS attacks targeted Cloudflare. The attacks were multi-million requests per second strong. The average attack rate in that campaign, recorded by Cloudflare, was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps. Additional coverage was published in our <a href="/ddos-threat-report-2023-q3/">2023 Q3 DDoS threat report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72mnC1iNyKm6RX3UAwsVG4/5d66586e5833ce492bd2cbfb1eb538eb/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks in 2023 Q3</p><p>Cloudflare's network, its HTTP/2 implementation, and customers using our <a href="https://www.cloudflare.com/application-services/products/waf/">WAF</a>/<a href="https://www.cloudflare.com/application-services/products/cdn/">CDN</a> services are not affected by this vulnerability. Furthermore, we are not currently aware of any threat actors exploiting this vulnerability in the wild.</p><p>Multiple CVEs have been assigned to the various implementations of HTTP/2 that are impacted by this vulnerability. A <a href="https://kb.cert.org/vuls/id/421644">CERT alert</a> published by Christopher Cullen at Carnegie Mellon University, which was covered by <a href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/">Bleeping Computer</a>, lists the various CVEs:</p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Affected service </span></th>
    <th><span>CVE</span></th>
    <th><span>Details</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Node.js HTTP/2 server</span></td>
    <td><span>CVE-2024-27983</span></td>
    <td><span>Sending a few HTTP/2 frames can cause a race condition and memory leak, leading to a potential denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy's oghttp codec</span></td>
    <td><span>CVE-2024-27919</span></td>
    <td><span>Not resetting a request when header map limits are exceeded can cause unlimited memory consumption which can potentially lead to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Tempesta FW</span></td>
    <td><span>CVE-2024-2758</span></td>
    <td><span>Its rate limits are not entirely effective against empty CONTINUATION frames flood, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>amphp/http</span></td>
    <td><span>CVE-2024-2653</span></td>
    <td><span>It collects CONTINUATION frames in an unbounded buffer, risking an out of memory (OOM) crash if the header size limit is exceeded, potentially resulting in a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Go's net/http and net/http2 packages</span></td>
    <td><span>CVE-2023-45288</span></td>
    <td><span>Allows an attacker to send an arbitrarily large set of headers, causing excessive CPU consumption, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>nghttp2 library</span></td>
    <td><span>CVE-2024-28182</span></td>
    <td><span>Involves an implementation using nghttp2 library, which continues to receive CONTINUATION frames, potentially leading to a denial of service event without proper stream reset callback.</span></td>
  </tr>
  <tr>
    <td><span>Apache Httpd</span></td>
    <td><span>CVE-2024-27316</span></td>
    <td><span>A flood of CONTINUATION frames without the END_HEADERS flag set can be sent, resulting in the improper termination of requests, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Apache Traffic Server</span></td>
    <td><span>CVE-2024-31309</span></td>
    <td><span>HTTP/2 CONTINUATION floods can cause excessive resource consumption on the server, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy versions 1.29.2 or earlier</span></td>
    <td><span>CVE-2024-30255</span></td>
    <td><span>Consumption of significant server resources can lead to CPU exhaustion during a flood of CONTINUATION frames, which can potentially lead to a denial of service event.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>When analyzing attack statistics, we use our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">customer’s industry</a> as it is recorded in our systems to determine the most attacked industries. In the first quarter of 2024, the top attacked industry by HTTP DDoS attacks in North America was Marketing and Advertising. In Africa and Europe, the Information Technology and Internet industry was the most attacked. In the Middle East, the most attacked industry was Computer Software. In Asia, the most attacked industry was Gaming and Gambling. In South America, it was the Banking, Financial Services and Insurance (BFSI) industry. Last but not least, in Oceania, was the Telecommunications industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ntlfFKUUah6DeHSlwJSq6/f488dbd9e68e2822a16c448aa55d0c12/Top-Attacked-Industry-by-Region-Q1-2024.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>Globally, the Gaming and Gambling industry was the number one most targeted by HTTP DDoS attacks. Just over seven of every 100 DDoS requests that Cloudflare mitigated were aimed at the <a href="https://www.cloudflare.com/gaming/">Gaming</a> and Gambling industry. In second place, the Information Technology and Internet industry, and in third, Marketing and Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/LNYVB8cgZhctz3H84y4is/c952e53b1475adcebaac1df63fd71352/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks</p><p>With a share of 75% of all network-layer DDoS attack bytes, the Information Technology and Internet industry was the most targeted by network-layer DDoS attacks. One possible explanation for this large share is that Information Technology and Internet companies may be “super aggregators” of attacks and receive DDoS attacks that are actually targeting their end customers. The Telecommunications industry, the <a href="https://www.cloudflare.com/financial-services/">Banking, Financial Services and Insurance (BFSI)</a> industry, the Gaming and Gambling industry and the Computer Software industry accounted for the next three percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/61FwNZ9kUUqXnHpcSmVRaC/479e12abb25cd38a3d302bb28efa51dc/pasted-image-0--6--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given industry, we get a completely different picture. On the HTTP front, Law Firms and Legal Services was the most attacked industry, as over 40% of their traffic was HTTP DDoS attack traffic. The Biotechnology industry came in second with a 20% share of HTTP DDoS attack traffic. In third place, <a href="https://www.cloudflare.com/galileo/">Nonprofits</a> had an HTTP DDoS attack share of 13%. In fourth, Aviation and Aerospace, followed by Transportation, Wholesale, <a href="https://www.cloudflare.com/public-sector/">Government Relations</a>, Motion Pictures and Film, Public Policy, and Adult Entertainment to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4I2FKWUobGjuyukeip0K5U/6f62640b53a76e3807743ed0b1865d03/pasted-image-0--8--1.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks (normalized)</p><p>Back to the network layer, when normalized, Information Technology and Internet remained the number one most targeted industry by L3/4 DDoS attacks, as almost a third of their traffic were attacks. In second, Textiles had a 4% attack share. In third, Civil Engineering, followed by Banking Financial Services and Insurance (BFSI), Military, Construction, Medical Devices, Defense and Space, Gaming and Gambling, and lastly Retail to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNGEFTvu7T1NQj3nO9Jqo/28d249aa64cd6d23789ce5b6ba738642/pasted-image-0--9--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Largest sources of DDoS attacks</h3>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>When analyzing the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">sources of HTTP DDoS attacks</a>, we look at the source IP address to determine the origination location of those attacks. A country/region that's a large source of attacks indicates that there is most likely a large presence of botnet nodes behind <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">Virtual Private Network (VPN)</a> or proxy endpoints that attackers may use to obfuscate their origin.</p><p>In the first quarter of 2024, the United States was the largest source of HTTP DDoS attack traffic, as a fifth of all DDoS attack requests originated from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, Russia, Iran, Singapore, India, and Argentina.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wQLyRJrrtx54hGXPY2HHC/d6e9119a6d8996713f2f4d1befad518e/pasted-image-0--10-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks</p><p>At the network layer, source IP addresses can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. So, instead of relying on IP addresses to understand the source, <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">we use the location of our data centers</a> where the attack traffic was ingested. We can gain geographical accuracy due to Cloudflare’s large global coverage in over 310 cities around the world.</p><p>Using the location of our data centers, we can see that in the first quarter of 2024, over 40% L3/4 DDoS attack traffic was ingested in our US data centers, making the US the largest source of L3/4 attacks. Far behind, in second, Germany at 6%, followed by Brazil, Singapore, Russia, South Korea, Hong Kong, United Kingdom, Netherlands, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vggccrQzkQy6yNuHMQboq/c4de452c39e00a1d38f4c1d7a114c585/pasted-image-0--11-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, we get a totally different lineup. Almost a third of the HTTP traffic originating from Gibraltar was DDoS attack traffic, making it the largest source. In second place, Saint Helena, followed by the British Virgin Islands, Libya, Paraguay, Mayotte, Equatorial Guinea, Argentina, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dYeSLU5tTKxZmMoqkF8y5/ac6ff10b445c97be9a1a5e07374b0643/pasted-image-0--12-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks (normalized)</p><p>Back to the network layer, normalized, things look rather different as well. Almost 89% of the traffic we ingested in our Zimbabwe-based data centers were L3/4 DDoS attacks. In Paraguay, it was over 56%, followed by Mongolia reaching nearly a 35% attack share. Additional top locations included Moldova, Democratic Republic of the Congo, Ecuador, Djibouti, Azerbaijan, Haiti, and Dominican Republic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpyO1vBpvAjoCe50RnZGT/2e6001062ff51ecc9f5bb2bb30e9cf6f/pasted-image-0--13-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Most attacked locations</h3>
      <a href="#most-attacked-locations">
        
      </a>
    </div>
    <p>When analyzing DDoS attacks against our customers, we use their <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country">billing country</a> to determine the “attacked country (or region)”. In the first quarter of 2024, the US was the most attacked by HTTP DDoS attacks. Approximately one out of every 10 DDoS requests that Cloudflare mitigated targeted the US. In second, China, followed by Canada, Vietnam, Indonesia, Singapore, Hong Kong, Taiwan, Cyprus, and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5cGyvb0ljLm8wOQTzLHYfV/b3650336a30e2bafb717e42fc5255098/pasted-image-0--14-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, the list changes drastically. Over 63% of HTTP traffic to Nicaragua was DDoS attack traffic, making it the most attacked location. In second, Albania, followed by Jordan, Guinea, San Marino, Georgia, Indonesia, Cambodia, Bangladesh, and Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6if6kI4aS8Kph16cSCEWjf/20be20d9cfe02034bf123003042dfbbb/pasted-image-0--15-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks (normalized)</p><p>On the network layer, China was the number one most attacked location, as 39% of all DDoS bytes that Cloudflare mitigated during the first quarter of 2024 were aimed at Cloudflare’s Chinese customers. Hong Kong came in second place, followed by Taiwan, the United States, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Nzw0zyRFnxer3C1SQmeHI/ae2081521fd12b399c9776a5a54748c4/pasted-image-0--16-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks</p><p>Back to the network layer, when normalized, Hong Kong takes the lead as the most targeted location. L3/4 DDoS attack traffic accounted for over 78% of all Hong Kong-bound traffic. In second place, China with a DDoS share of 75%, followed by Kazakhstan, Thailand, Saint Vincent and the Grenadines, Norway, Taiwan, Turkey, Singapore, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sUX9I80bmFLo0vrTNRiDu/4a96fd8283f2a5156ff02cd95fcdbda5/pasted-image-0--17-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Cloudflare is here to help - no matter the attack type, size, or duration</h3>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare's mission is to help build a better Internet, a vision where it remains secure, performant, and accessible to everyone. With four out of every 10 HTTP DDoS attacks lasting over 10 minutes and approximately three out of 10 extending beyond an hour, the challenge is substantial. Yet, whether an attack involves over 100,000 requests per second, as is the case in one out of every 10 attacks, or even exceeds a million requests per second — a rarity seen in only four out of every 1,000 attacks — Cloudflare’s defenses remain impenetrable.</p><p>Since pioneering <a href="/unmetered-mitigation">unmetered DDoS Protection</a> in 2017, Cloudflare has steadfastly honored its promise to provide enterprise-grade <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> at no cost to all organizations, ensuring that our advanced technology and robust network architecture do not just fend off attacks but also preserve performance without compromise.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">bRA8E8DuG6NNpZ1vHZCwP</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
    </channel>
</rss>