
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 11:32:26 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How to customize your layer 3/4 DDoS protection settings]]></title>
            <link>https://blog.cloudflare.com/l34-ddos-managed-rules/</link>
            <pubDate>Thu, 09 Dec 2021 13:59:16 GMT</pubDate>
            <description><![CDATA[ Cloudflare Enterprise customers using the Magic Transit and Spectrum services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via the Cloudflare API. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XAmgCsMHnrtq7ExJ8f80q/b6e9f311a614523ffbf7a91a47d96199/image2-28.png" />
            
            </figure><p>After initially providing our customers <a href="/http-ddos-managed-rules/">control over the HTTP-layer DDoS protection settings earlier this year</a>, we’re now excited to extend the control our customers have to the packet layer. Using these new controls, Cloudflare Enterprise customers using the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via the Cloudflare API.</p><p>The new functionality provides customers control over two main DDoS rulesets:</p><ol><li><p><b>Network-layer DDoS Protection</b> <b>ruleset</b> — This ruleset includes rules to detect and mitigate DDoS attacks on layer 3/4 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a> such as UDP floods, SYN-ACK reflection attacks, SYN Floods, and DNS floods. This ruleset is available for Spectrum and Magic Transit customers on the Enterprise plan.</p></li><li><p><b>Advanced TCP Protection</b> <b>ruleset</b> — This ruleset includes rules to detect and mitigate sophisticated out-of-state TCP attacks such as spoofed ACK Floods, Randomized SYN Floods, and distributed SYN-ACK Reflection attacks. This ruleset is available for Magic Transit customers only.</p></li></ol><p>To learn more, review our <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets">DDoS Managed Ruleset developer documentation</a>. We’ve put together a few guides that we hope will be helpful for you:</p><ol><li><p><a href="https://developers.cloudflare.com/ddos-protection/get-started">Onboarding &amp; getting started with Cloudflare DDoS protection</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-negative">Handling false negatives</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-positive">Handling false positives</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/best-practices/third-party">Best practices when using VPNs, VoIP, and other third-party services</a></p></li><li><p><a href="https://developers.cloudflare.com/ddos-protection/reference/simulate-ddos-attack">How to simulate a DDoS attack</a></p></li></ol>
    <div>
      <h2>Cloudflare’s DDoS Protection</h2>
      <a href="#cloudflares-ddos-protection">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS) attack</a> is a type of cyberattack that aims to disrupt the victim’s Internet services. There are many types of DDoS attacks, and they can be generated by attackers at different layers of the Internet. One example is the <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP flood</a>. It aims to disrupt HTTP application servers such as those that power mobile apps and websites. Another example is the <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a>. While this type of attack can be used to disrupt HTTP servers, it can also be used in an attempt to disrupt non-HTTP applications. These include TCP-based and UDP-based applications, networking services such as <a href="/update-on-voip-attacks/">VoIP services</a>, gaming servers, cryptocurrency, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C1TrYyVltpMud4OWi3UgR/693f024b661f0a5231e2a0579360468a/image5-12.png" />
            
            </figure><p>To defend organizations against DDoS attacks, we built and operate software-defined systems that run autonomously. They automatically detect and mitigate DDoS attacks across our entire network. You can read more about our autonomous <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a> and how they work in our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">deep-dive technical blog post</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zVNe9hiMYUaf1DcZzxP2t/281a3ae7d02c862e830cef6e480c7bca/unnamed-33.png" />
            
            </figure>
    <div>
      <h2>Unmetered and unlimited DDoS Protection</h2>
      <a href="#unmetered-and-unlimited-ddos-protection">
        
      </a>
    </div>
    <p>The level of protection that we offer is <a href="/unmetered-mitigation/">unmetered and unlimited</a> — It is not bounded by the size of the attack, the number of the attacks, or the duration of the attacks. This is especially important these days because as we’ve recently seen, attacks are getting larger and more frequent. Consequently, in Q3, network-layer attacks increased by 44% compared to the previous quarter. Furthermore, just recently, our systems automatically detected and mitigated a <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">DDoS attack that peaked just below 2 Tbps</a> — the largest we’ve seen to date.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FDNWzHw3jIcywi8qMcKlq/60fd4b3b9bf13f144c9e72ab8a9c1ba9/image4.jpg" />
            
            </figure><p>Mirai botnet launched an almost 2 Tbps DDoS attack</p><p>Read more about <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q3">recent DDoS trends</a>.</p>
    <div>
      <h2>Managed Rulesets</h2>
      <a href="#managed-rulesets">
        
      </a>
    </div>
    <p>You can think of our autonomous DDoS protection systems as groups (rulesets) of intelligent rules. There are rulesets of HTTP DDoS Protection rules, Network-layer DDoS Protection rules and Advanced TCP Protection rules. In this blog post, we will cover the latter two rulesets. We’ve already covered the former in the blog post <a href="/http-ddos-managed-rules/">How to customize your HTTP DDoS protection settings</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38zn08I5UIGe7IvmFb5aIT/6dac7a5d5ac1ab875410d6e77d765a14/image7-6.png" />
            
            </figure><p>Cloudflare L3/4 DDoS Managed Rules</p><p>In the <b>Network-layer DDoS Protection rulesets</b>, each rule has a unique set of conditional fingerprints, dynamic field masking, activation thresholds, and mitigation actions. These rules are managed (by Cloudflare), meaning that the specifics of each rule is curated in-house by our DDoS experts. Before deploying a new rule, it is first rigorously tested and optimized for mitigation accuracy and efficiency across our entire global network.</p><p>In the <b>Advanced TCP Protection ruleset</b>, we use a novel TCP state classification engine to identify the state of TCP flows. The engine powering this ruleset is <i>flowtrackd</i> — you can read more about it in our <a href="/announcing-flowtrackd/">announcement blog post</a>. One of the unique features of this system is that it is able to operate using only the ingress (inbound) packet flows. The system sees only the ingress traffic and is able to drop, challenge, or allow packets based on their legitimacy. For example, a flood of ACK packets that don’t correspond to open TCP connections will be dropped.</p>
    <div>
      <h2>How attacks are detected and mitigated</h2>
      <a href="#how-attacks-are-detected-and-mitigated">
        
      </a>
    </div>
    
    <div>
      <h3>Sampling</h3>
      <a href="#sampling">
        
      </a>
    </div>
    <p>Initially, traffic is routed through the Internet via <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">BGP Anycast</a> to the nearest Cloudflare edge data center. Once the traffic reaches our data center, our DDoS systems sample it asynchronously allowing for out-of-path analysis of traffic without introducing latency penalties. The Advanced TCP Protection ruleset needs to view the entire packet flow and so it sits inline for Magic Transit customers only. It, too, does not introduce any latency penalties.</p>
    <div>
      <h3>Analysis &amp; mitigation</h3>
      <a href="#analysis-mitigation">
        
      </a>
    </div>
    <p>The analysis for the <b>Advanced TCP Protection ruleset</b> is straightforward and efficient. The system qualifies TCP flows and tracks their state. In this way, packets that don’t correspond to a legitimate connection and its state are dropped or challenged. The mitigation is activated only above certain thresholds that customers can define.</p><p>The analysis for the <b>Network-layer DDoS Protection ruleset</b> is done using data streaming algorithms. Packet samples are compared to the conditional fingerprints and multiple real-time signatures are created based on the dynamic masking. Each time another packet matches one of the signatures, a counter is increased. When the activation threshold is reached for a given signature, a mitigation rule is compiled and pushed inline. The mitigation rule includes the real-time signature and the mitigation action, e.g., drop.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fZ5yjyahUgG57t6OeKuNW/3bff52421a5f96a64c41a0573bf7fcba/image9-1.png" />
            
            </figure>
    <div>
      <h3>​​​​Example</h3>
      <a href="#example">
        
      </a>
    </div>
    <p>As a simple example, one fingerprint could include the following fields: source IP, source port, destination IP, and the TCP sequence number. A packet flood attack with a fixed sequence number would match the fingerprint and the counter would increase for every packet match until the activation threshold is exceeded. Then a mitigation action would be applied.</p><p>However, in the case of a <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> attack where the source IP addresses and ports are randomized, we would end up with multiple signatures for each combination of source IP and port. Assuming a sufficiently randomized/distributed attack, the activation thresholds would not be met and mitigation would not occur. For this reason, we use dynamic masking, i.e. ignoring fields that may not be a strong indicator of the signature. By masking (ignoring) the source IP and port, we would be able to match all the attack packets based on the unique TCP sequence number regardless of how randomized/distributed the attack is.</p>
    <div>
      <h3>Configuring the DDoS Protection Settings</h3>
      <a href="#configuring-the-ddos-protection-settings">
        
      </a>
    </div>
    <p>For now, we’ve only exposed a handful of the Network-layer DDoS protection rules that we’ve identified as the ones most prone to customizations. We will be exposing more and more rules on a regular basis. This shouldn’t affect any of your traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WfQ9IUiHT6kl2R6i2fsu4/d422a01101609b28f3f61c29bae31ebc/image8-4.png" />
            
            </figure><p>Overriding the sensitivity level and mitigation action</p><p>For the <b>Network-layer DDoS Protection ruleset</b>, for each of the available rules, you can override the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/override-parameters#sensitivity-level">sensitivity level</a> (activation threshold), customize the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/override-parameters#action">mitigation action</a>, and apply <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/fields">expression filters</a> to exclude/include traffic from the DDoS protection system based on various packet fields. You can create multiple overrides to customize the protection for your network and your various applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4S7gQPtUwI4ksZFqre6wvy/844f25450258c041d5693ac993f660cb/image3-22.png" />
            
            </figure><p>Configuring expression fields for the DDoS Managed Rules to match on</p><p>In the past, you’d have to go through our support channels to customize the rules. In some cases, this may have taken longer to resolve than desired. With today’s announcement, you can tailor and fine-tune the settings of our autonomous edge system by yourself to quickly improve the accuracy of the protection for your specific network needs.</p><p>For the <b>Advanced TCP Protection ruleset</b>, for now, we’ve only exposed the ability to enable or disable it as a whole in the dashboard. To enable or disable the ruleset per IP prefix, you must use <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-api">the API</a>. At this time, when initially onboarding to Cloudflare, the Cloudflare team must first create a policy for you. After onboarding, if you need to change the sensitivity thresholds, use Monitor mode, or add filter expressions you must contact Cloudflare Support. In upcoming releases, this too will be available via the dashboard and API without requiring help from our Support team.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UG7jeJmxbiKYel0U9qRol/dcf3d05fc6a7a69f975ffe70d4cde261/image1-45.png" />
            
            </figure>
    <div>
      <h2>Pre-existing customizations</h2>
      <a href="#pre-existing-customizations">
        
      </a>
    </div>
    <p>If you previously contacted Cloudflare Support to apply customizations, your customizations have been preserved, and you can visit the dashboard to view the settings of the Network-layer DDoS Protection ruleset and change them if you need. If you require any changes to your Advanced TCP Protection customizations, please reach out to Cloudflare Support.</p><p>If so far you didn't have the need to customize this protection, there is no action required on your end. However, if you would like to view and customize your DDoS protection settings, follow <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-dashboard">this dashboard guide</a> or review the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/network/configure-api">API documentation</a> to programmatically configure the DDoS protection settings.</p>
    <div>
      <h2>Helping Build a Better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, everything we do is guided by our mission to help build a better Internet. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Our first step was to build the autonomous systems that detect and mitigate attacks independently. Done. The second step was to expose the control plane over these systems to our customers (announced today). Done. The next step will be to fully automate the configuration with an auto-pilot feature — training the systems to learn your specific traffic patterns to automatically optimize your DDoS protection settings. You can expect many more improvements, automations, and new capabilities to keep your Internet properties safe, available, and performant.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Managed Rules]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Spectrum]]></category>
            <guid isPermaLink="false">31YKEgNs7eGl1f4G22B5o2</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare thwarts 17.2M rps DDoS attack — the largest ever reported]]></title>
            <link>https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/</link>
            <pubDate>Thu, 19 Aug 2021 12:58:18 GMT</pubDate>
            <description><![CDATA[ Earlier this summer, Cloudflare’s autonomous edge DDoS protection systems automatically detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than any previous one that we're aware of.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This post is also available in </i><a href="/fr-fr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-fr-fr/"><i>Français</i></a><i>, </i><a href="/de-de/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-de-de/"><i>Deutsch</i></a><i>, </i><a href="/zh-cn/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-cn/"><i>简体中文</i></a><i>, </i><a href="/zh-tw/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-tw/"><i>繁體中文</i></a><i>, </i><a href="/ja-jp/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ja-jp/"><i>日本語</i></a><i>, </i><a href="/ko-kr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ko-kr/"><i>한국어</i></a><i>.</i></p><p>Earlier this summer, Cloudflare’s <a href="https://www.cloudflare.com/ddos/">autonomous edge DDoS protection systems</a> automatically detected and mitigated a 17.2 million request-per-second (rps) <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a>, an attack almost three times larger than any previous one that we're aware of. For perspective on how large this attack was: Cloudflare serves over 25 million HTTP requests per second on average. This refers to the average rate of legitimate traffic in 2021 Q2. So peaking at 17.2 million rps, this attack reached 68% of our Q2 average rps rate of legitimate HTTP traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MGeCblBfbMi9xV2fNGQJ7/7235f5c5e8dbf3e724643823a6fb2681/image5-18.png" />
            
            </figure><p>Comparison graph of Cloudflare’s average request per second rate versus the DDoS attack</p>
    <div>
      <h3>Automated DDoS mitigation with Cloudflare’s autonomous edge</h3>
      <a href="#automated-ddos-mitigation-with-cloudflares-autonomous-edge">
        
      </a>
    </div>
    <p>This attack, along with the additional attacks provided in the next sections, were automatically detected and mitigated by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge DDoS protection systems</a>. The system is powered by our very own denial of service daemon (dosd). Dosd is a home-grown software-defined daemon. A unique dosd instance runs in every server in each one of our data centers around the world. Each dosd instance independently analyzes traffic samples out-of-path. Analyzing traffic out-of-path allows us to scan asynchronously for DDoS attacks without causing latency and impacting performance. DDoS findings are also shared between the various dosd instances within a data center, as a form of proactive threat intelligence sharing.</p><p>Once an attack is detected, our systems generate a mitigation rule with a real-time signature that matches the attack patterns. The rule is propagated to the most optimal location in the tech stack. As an example, a <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">volumetric HTTP DDoS attack</a> may be blocked at L4 inside the Linux iptables firewall instead of at L7 inside the L7 reverse proxy which runs in the user space. Mitigating lower in the stack, e.g. dropping the packets at L4 instead of responding with a 403 error page in L7, is more cost-efficient. It reduces our edge CPU consumption and intra-data center bandwidth utilization — thus helping us mitigate large attacks at scale without impacting performance.</p><p>This autonomous approach, along with our network’s global scale and reliability, allow us to mitigate attacks that reach 68% of our average per-second-rate, and higher, without requiring any manual mitigation by Cloudflare personnel, nor causing any performance degradation.</p>
    <div>
      <h3>The resurgence of Mirai and new powerful botnets</h3>
      <a href="#the-resurgence-of-mirai-and-new-powerful-botnets">
        
      </a>
    </div>
    <p>This attack was launched by a powerful <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a>, targeting a Cloudflare customer in the financial industry. Within seconds, the botnet bombarded the Cloudflare edge with over 330 million attack requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gY7BQTsPoARDp6hOSjG9e/9366d2c0d953f840fb8b7eb2f2899d32/image10-1.png" />
            
            </figure><p>Graph of 17.2M rps attack</p><p>The attack traffic originated from more than 20,000 bots in 125 countries around the world. Based on the bots’ source IP addresses, almost 15% of the attack originated from Indonesia and another 17% from India and Brazil combined. Indicating that there may be many malware infected devices in those countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T6eNguCNTubMdWMB3YRxO/38371f7686bd7eae8f09d4f9783e049e/image14.png" />
            
            </figure><p>Distribution of the attack sources by top countries</p>
    <div>
      <h3>Volumetric attacks increase</h3>
      <a href="#volumetric-attacks-increase">
        
      </a>
    </div>
    <p>This 17.2 million rps attack is the largest HTTP DDoS attack that Cloudflare has ever seen to date and almost three times the size of any other reported HTTP DDoS attack. This specific botnet, however, has been seen at least twice over the past few weeks. Just last week it also targeted a different Cloudflare customer, a hosting provider, with an HTTP DDoS attack that peaked just below 8 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50oxuA0Pte28QnkKG2ND9a/3a77c2098743522e6155d30a1e690afe/image13-1.png" />
            
            </figure><p>Graph of 8M rps attack</p><p>Two weeks before, a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a> launched over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. And while the first HTTP attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/waf/">WAF/CDN service</a>, the 1+ Tbps network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications and hosting provider. The other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ry1DG1IpHihc6q2aU3V83/1ed3236f40fff2c224c135a7841376d3/image17.png" />
            
            </figure><p>Graph of Mirai botnet attack peaking at 1.2 Tbps</p><p>The Mirai botnet started with roughly 30K bots and slowly shrinked to approximately 28K. However, despite losing bots from its fleet, the botnet was still able to generate impressive volumes of attack traffic for short periods. In some cases, each burst lasted only a few seconds.</p><p>These attacks join the increase in Mirai-based DDoS attacks that we’ve observed on our network over the past weeks. In July alone, L3/4 Mirai attacks increased by 88% and L7 attacks by 9%. Additionally, based on the current August per-day average of the Mirai attacks, we can expect L7 Mirai DDoS attacks and other similar botnet attacks to increase by 185% and L3/4 attacks by 71% by the end of the month.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4feZMCRVWgTJh3LTGKQVl8/d5a1dabda66860b415f1471b7ee3773d/image11-1.png" />
            
            </figure><p>Graph of change in Mirai based DDoS attacks by month</p>
    <div>
      <h3>Back to the Mirai</h3>
      <a href="#back-to-the-mirai">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a>, which means ‘future’ in Japanese, is a codename for malware that was first discovered in 2016 by <a href="https://en.wikipedia.org/wiki/MalwareMustDie">MalwareMustDie</a>, a non-profit security research workgroup. The malware spreads by infecting Linux-operated devices such as security cameras and routers. It then self-propagates by searching for open Telnet ports 23 and 2323. Once found, it then attempts to gain access to vulnerable devices by <a href="https://www.cloudflare.com/learning/bots/brute-force-attack/">brute forcing</a> known credentials such as factory default usernames and passwords. Later variants of Mirai also took advantage of zero-day exploits in routers and other devices. Once infected, the devices will monitor a Command &amp; Control (C2) server for instructions on which target to attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fNe0WjM3f10tIZWNBTm8C/72ee117740a76a5f4b0b2a1be17b8700/image8-3.png" />
            
            </figure><p>Diagram of Botnet operator controlling the botnet to attack websites</p>
    <div>
      <h3>How to protect your home and business</h3>
      <a href="#how-to-protect-your-home-and-business">
        
      </a>
    </div>
    <p>While the majority of attacks are small and short, we continue to see these types of volumetric attacks emerging more often. It’s important to note that these volumetric short burst attacks can be especially dangerous for legacy DDoS protection systems or organizations without active, always-on cloud-based protection.</p><p>Furthermore, while the short duration may say something about the botnet’s capability to deliver sustained levels of traffic over time, it can be challenging or impossible for humans to react to it in time. In such cases, the attack is over before a security engineer even has time to analyze the traffic or activate their stand-by DDoS protection system. These types of attacks highlight the need for automated, always-on protection.</p>
    <div>
      <h3>How to protect your business and Internet properties</h3>
      <a href="#how-to-protect-your-business-and-internet-properties">
        
      </a>
    </div>
    <ol><li><p><a href="https://dash.cloudflare.com/sign-up">Onboard to Cloudflare</a> to protect your Internet properties.</p></li><li><p>DDoS is enabled out of the box, and you can also <a href="https://support.cloudflare.com/hc/en-us/articles/200172676-Understanding-Cloudflare-DDoS-protection">customize the protection settings</a>.</p></li><li><p>Follow our <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">preventive best practices</a>, to ensure that both your Cloudflare settings and your origin server settings are optimized. As an example, make sure that you allow only traffic from <a href="https://www.cloudflare.com/ips/">Cloudflare’s IP range</a>. Ideally, ask your upstream Internet Service Provider (ISP) to apply an access control list (ACL), otherwise, attackers may target your servers’ IP addresses directly and bypass your protection.</p></li></ol>
    <div>
      <h3>Recommendations on how to protect your home and IoT appliances</h3>
      <a href="#recommendations-on-how-to-protect-your-home-and-iot-appliances">
        
      </a>
    </div>
    <ol><li><p>Change the default username and password of any device that is connected to the Internet such as smart cameras and routers. This will reduce the risk that malware such as Mirai can gain access to your router and IoT devices.</p></li><li><p>Protect your home against malware with <a href="https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families">Cloudflare for Families</a>. Cloudflare for Families is a free service that automatically blocks traffic from your home to malicious websites and malware communication.</p></li></ol> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">14h42eFO3Fqa89ZeO5Ki7U</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[A deep-dive into Cloudflare’s autonomous edge DDoS protection]]></title>
            <link>https://blog.cloudflare.com/deep-dive-cloudflare-autonomous-edge-ddos-protection/</link>
            <pubDate>Thu, 18 Mar 2021 14:18:20 GMT</pubDate>
            <description><![CDATA[ Introducing our autonomous DDoS (Distributed Denial of Service) protection system, globally deployed to all of Cloudflare’s 200+ data centers, and is actively protecting all our customers against DDoS attacks across layers 3 to 7 (in the OSI model) without requiring any human intervention. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, I’m excited to talk about our autonomous DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>) protection system. This system has been deployed globally to all of our 200+ data centers and actively protects all our customers against DDoS attacks across layers 3 to 7 (in the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) without requiring any human intervention. As part of our <a href="/unmetered-mitigation/">unmetered DDoS protection commitment</a>, we won’t charge a customer more just because they got hit by a DDoS.</p>
    <div>
      <h3>Autonomous protection at the edge</h3>
      <a href="#autonomous-protection-at-the-edge">
        
      </a>
    </div>
    <p>To protect our customers quickly and with precision against DDoS attacks, we built an autonomous edge detection and mitigation system that can make decisions on its own without seeking a centralized consensus. It is completely software-defined and runs on our edge on commodity servers. It’s powered by our denial of service daemon (dosd) which originally went live in mid-2019 for protection against L3/4 DDoS attacks. Since then, we’ve been investing in enhancing and improving its capabilities to stay ahead of attackers and to disrupt the economics of attacks. The latest set of improvements have expanded our edge mitigation component to protect against <a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">L7 attacks</a> in addition to <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4</a>.</p><p>This system runs on every single server in all our edge data centers. It constantly analyzes packets and HTTP requests, scanning for DDoS attacks. Upon detection, it immediately pushes a mitigation rule with a real-time generated signature to the most optimal location in the Linux stack where the most cost-efficient mitigation can be applied.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15Hk0Q8gqqwu4pkZXq4foF/c97de51639de77feb3dc93486a2ad8c5/DDoS-mitigation-diagram_2x-1.png" />
            
            </figure><p>A conceptual diagram of Cloudflare DDoS mitigation systems</p><p>Our new edge detection capabilities complement our existing global threat detection mechanism, <a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Gatebot</a>, which resides in our network’s core. Detecting attacks at the network core with Gatebot is great for larger, distributed volumetric attacks that require coordination across the entire Cloudflare edge, but smaller, localized attacks require a different approach. Detecting network-layer and HTTP attacks at the edge means we can sample at a higher rate, detect both small and large attacks, and immediately generate a mitigation rule. Over the past few months, 98.6% of all L3/4 DDoS attacks were detected by dosd. Similarly, since deploying the expanded version of dosd, it has been mitigating 81% of all L7 attacks.</p><p>In previous blogs, we’ve already covered <a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Gatebot</a> and <a href="/announcing-flowtrackd/">flowtrackd</a>. So in this blog, we’ll be focusing on the expanded dosd capabilities.</p>
    <div>
      <h3>Harnessing Linux networking to drop packets and requests at wire speed</h3>
      <a href="#harnessing-linux-networking-to-drop-packets-and-requests-at-wire-speed">
        
      </a>
    </div>
    <p>Ten years ago, Linux networking was slow. Today, we’re dropping packets at wire speed thanks to Linux — specifically, with iptables and the eXpress Data Path (XDP).</p>
    <div>
      <h3>The life of a packet</h3>
      <a href="#the-life-of-a-packet">
        
      </a>
    </div>
    <p>A packet destined for a Cloudflare-protected customer makes its way to the closest <a href="https://www.cloudflare.com/network/">Cloudflare data center</a> through <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">BGP Anycast</a>. Once it arrives, it is passed from the router to a server using equal-cost multi-path routing groups (<a href="https://en.wikipedia.org/wiki/Equal-cost_multi-path_routing">ECMP</a>) algorithm via network switches. When it arrives at a server, the packet is sent into a group of eXpress Data Path (<a href="https://en.wikipedia.org/wiki/Express_Data_Path">XDP</a>) programs. The first group of XDP programs, <a href="/l4drop-xdp-ebpf-based-ddos-mitigations/">L4Drop</a>, applies mitigation rules from previously detected attacks and transmits packet samples to dosd for further analysis.</p><p>If a packet is not dropped as malicious, it’s then passed to <a href="/unimog-cloudflares-edge-load-balancer/">Unimog</a>, our proprietary L4 load balancer. Using server health and performance metrics, Unimog decides whether it should keep the packet in the same server or pass it on to another server in the data center better able to handle it. After Unimog, it is passed through the iptables firewall and then, if targeting an L7 application, e.g., a service protected by the <a href="https://www.cloudflare.com/application-services/products/waf/">Cloudflare WAF</a>, to our HTTP reverse proxy. The reverse-proxy runs in userspace and HTTP requests go through our <a href="https://www.cloudflare.com/waf/">Web Application Firewall</a>, application Firewall rules, and additional customer configurations. If the packet is instead destined for a TCP/UDP application (<a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/">Spectrum</a>) or an IP destination that is routed rather than proxied (<a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a>), it would pass through those systems rather than our HTTP proxy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66UlMrtt1qMkZIKeHkiSF1/dc76094ef0551319f1509063b9d8d4e1/L7-ddos-diagram_2x-1-1.png" />
            
            </figure><p>Life of a packet</p><p>In addition to L4Drop, our HTTP proxy also transmits samples and metadata of HTTP requests to dosd. This edge sampling happens at a rate that’s 10 times greater than core sampling, as signals can now be analyzed (and acted upon) locally rather than shipped to a core data center. Similarly, packets are sampled by dosd at a rate that is 81 times faster than gatebot.</p><p>Together, dosd, gatebot, and flowtrackd analyze samples they receive and apply mitigation rules when DDoS attacks are detected. They push mitigation rules into the web proxy to mitigate HTTP attacks. Attack requests are handled with a block, rate limit, or challenge action, depending on the system’s decision. However, if the attack is highly volumetric, the mitigation rule is pushed down the stack into the iptables firewall and L7 attacks are dropped at L4 using <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/#jails">IP Jails,</a> for a more cost-efficient mitigation. Similarly, L3/4 attacks are mitigated in the iptables firewall using extended Berkeley Packet Filter (<a href="/cloudflare-architecture-and-how-bpf-eats-the-world/">eBPF</a>) programs inside L4Drop. Leveraging these components allows us to automatically <a href="https://www.cloudflare.com/learning/ddos/ddos-mitigation/">mitigate DDoS attacks</a> at scale.</p>
    <div>
      <h3>Disrupting the attack economics</h3>
      <a href="#disrupting-the-attack-economics">
        
      </a>
    </div>
    <p>Our expanded autonomous system, described above, along with our existing threat mitigation components, was developed to protect our customers against DDoS attacks that have become very easy and cheap to launch. These attacks are used by malicious actors that aim to take down a website, mobile app, game, or any Internet-connected property. These expanded protections were a necessary step as during the past year the number of attacks has increased, as we’ve documented in our <a href="/network-layer-ddos-attack-trends-for-q3-2020/">DDoS trends reports</a>. Additionally, the attacks are getting bigger and more <a href="/beat-an-acoustics-inspired-ddos-attack/">sophisticated</a>, such as the attack that imitated acoustic beats. Just as important are small attacks that could take down a small web property; we want to block the large and small.</p><p>In many cases, attackers can launch DDoS attacks for free using publicly available tools, or for a small fee by hiring a DDoS-as-a-service <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a> such as <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">Moobot</a> in the dark web. According to the <a href="https://www.privacyaffairs.com/dark-web-price-index-2020/">Dark Web Price Index for 2020</a>, the price of a DDoS attack starts at $10 for a one-hour attack at a rate of 10-50k requests per second. Attacks are far cheaper to launch than the damage they cause. By causing an outage or even <i>just</i> by degrading the service, attackers can take a substantial toll on their victim. As an example, taking down an <a href="https://www.cloudflare.com/ecommerce/">ecommerce website</a> means that users cannot log in and make purchases. Even increased <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">latency</a> can cause users to abandon their shopping carts and pop over to the competition. A minute of downtime can easily translate to the loss of <a href="https://www.gremlin.com/ecommerce-cost-of-downtime/">tens of thousands of dollars</a>.</p><p>The frequency, sophistication, and size of DDoS attacks require a new approach — one that is fast, accurate, and precise. And this is why we developed the expanded protections described in this post.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet — one that is secure, faster, and more reliable for all. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. In the ’90s and 2000s, <a href="https://en.wikipedia.org/wiki/History_of_email_spam">spam emails became a serious problem</a>. Today, email services filter them out for us, and our objective is to do the same for DDoS attacks.</p><p>For more information about <a href="https://www.cloudflare.com/ddos/">Cloudflare’s DDoS protection</a>, <a href="http://www.cloudflare.com/enterprise">reach out to us</a> or have a go with a hands-on evaluation of <a href="https://www.cloudflare.com/plans/free/">Cloudflare’s free plan</a>.</p><p>By the way, if you are interested in working in the DDoS Protection engineering team, we're currently hiring in our London and Austin offices. Submit your application here:</p><p> Austin: <a href="https://boards.greenhouse.io/cloudflare/jobs/2291040?gh_jid=2291040">https://boards.greenhouse.io/cloudflare/jobs/2291040?gh_jid=2291040</a> London: <a href="https://boards.greenhouse.io/cloudflare/jobs/2291038?gh_jid=2291038">https://boards.greenhouse.io/cloudflare/jobs/2291038?gh_jid=2291038</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Gatebot]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Linux]]></category>
            <guid isPermaLink="false">51RV8t0EDJMvGacfUFdMV0</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>