
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 09:11:14 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Measuring characteristics of TCP connections at Internet scale]]></title>
            <link>https://blog.cloudflare.com/measuring-network-connections-at-scale/</link>
            <pubDate>Wed, 29 Oct 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Researchers and practitioners have been studying connections almost as long as the Internet that supports them. Today, Cloudflare’s global network receives millions of connections per second. We explore various characteristics of TCP connections, including lifetimes, sizes, and more. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Every interaction on the Internet—including loading a web page, streaming a video, or making an API call—starts with a connection. These fundamental logical connections consist of a stream of packets flowing back and forth between devices.</p><p>Various aspects of these network connections have captured the attention of researchers and practitioners for as long as the Internet has existed. The interest in connections even predates the label, as can be seen in the seminal 1991 paper, “<a href="https://dl.acm.org/doi/10.1145/115994.116003"><u>Characteristics of wide-area TCP/IP conversations</u></a>.” By any name, the Internet measurement community has been steeped in characterizations of Internet communication for <i>decades</i>, asking everything from “how long?” and “how big?” to “how often?” – and those are just to start.</p><p>Surprisingly, connection characteristics on the wider Internet are largely unavailable. While anyone can  use tools (e.g., <a href="https://www.wireshark.org/"><u>Wireshark</u></a>) to capture data locally, it’s virtually impossible to measure connections globally because of access and scale. Moreover, network operators generally do not share the characteristics they observe — assuming that non-trivial time and energy is taken to observe them.</p><p>In this blog post, we move in another direction by sharing aggregate insights about connections established through our global CDN. We present characteristics of <a href="https://developers.cloudflare.com/fundamentals/reference/tcp-connections/"><u>TCP</u></a> connections—which account for about <a href="https://radar.cloudflare.com/adoption-and-usage"><u>70% of HTTP requests</u></a> to Cloudflare—providing empirical insights that are difficult to obtain from client-side measurements alone.</p>
    <div>
      <h2>Why connection characteristics matter</h2>
      <a href="#why-connection-characteristics-matter">
        
      </a>
    </div>
    <p>Characterizing system behavior helps us predict the impact of changes. In the context of networks, consider a new routing algorithm or transport protocol: how can you measure its effects? One option is to deploy the change directly on live networks, but this is risky. Unexpected consequences could disrupt users or other parts of the network, making a “deploy-first” approach potentially unsafe or ethically questionable.</p><p>A safer alternative to live deployment as a first step is simulation. Using simulation, a designer can get important insights about their scheme without having to build a full version. But simulating the whole Internet is challenging, as described by another highly seminal work, “<a href="https://dl.acm.org/doi/10.1145/268437.268737"><u>Why we don't know how to simulate the Internet</u></a>”.</p><p>To run a useful simulation, we need it to behave like the real system we’re studying. That means generating synthetic data that mimics real-world behavior. Often, we do this by using statistical distributions — mathematical descriptions of how the real data behaves. But before we can create those distributions, we first need to characterize the data — to measure and understand its key properties. Only then can our simulation produce realistic results.</p>
    <div>
      <h2>Unpacking the dataset</h2>
      <a href="#unpacking-the-dataset">
        
      </a>
    </div>
    <p>The value of any data depends on its collection mechanism. Every dataset has blind spots, biases, and limitations, and ignoring these can lead to misleading conclusions. By examining the finer details — how the data was gathered, what it represents, and what it excludes — we can better understand its reliability and make informed decisions about how to use it. Let’s take a closer look at our collected telemetry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ksUQ7xlzXPWp2hH7eX4dG/124456d20c6fd5e7e185d68865aee6fa/image5.png" />
          </figure><p><b>Dataset Overview</b>. The data describes TCP connections, labeled <i>Visitor to Cloudflare</i> in the above diagram, which serve requests via HTTP 1.0, 1.1, and 2.0 that make up <a href="https://radar.cloudflare.com/adoption-and-usage">about 70%</a> of all 84 million HTTP requests per second, on average, received at our global CDN servers.</p><p><b>Sampling.</b> The passively collected snapshot of data is drawn from a uniformly sampled 1% of all TCP connections to Cloudflare between October 7 and October 15, 2025. Sampling takes place at each individual client-facing server to mitigate biases that may appear by sampling at the datacenter level.</p><p><b>Diversity.</b> Unlike many large operators, whose traffic is primarily their own and dominated by a few services such as search, social media, or streaming video, the vast majority of Cloudflare’s workload comes from our customers, who choose to put Cloudflare in front of their websites to help protect, improve performance, and reduce costs. This diversity of customers brings a wide variety of web applications, services, and users from around the world. As a result, the connections we observe are shaped by a broad range of client devices and application-specific behaviors that are constantly evolving.</p><p><b>What we log.</b> Each entry in the log consists of socket-level metadata captured via the Linux kernel’s <a href="https://man7.org/linux/man-pages/man7/tcp.7.html"><u>TCP_INFO</u></a> struct, alongside the SNI and the number of requests made during the connection. The logs exclude individual HTTP requests, transactions, and details. We restrict our use of the logs to connection metadata statistics such as duration and number of packets transmitted, as well as the number of HTTP requests processed.</p><p><b>Data capture.</b> We have elected to represent ‘useful’ connections in our dataset that have been fully processed, by characterizing only those connections that close gracefully with <a href="https://blog.cloudflare.com/tcp-resets-timeouts/#tcp-connections-from-establishment-to-close"><u>a FIN packet</u></a>. This excludes connections intercepted by attack mitigations, or that timeout, or that abort because of a RST packet.</p><p>Since a graceful close does not in itself indicate a ‘useful’ connection, <b>we additionally require at least one successful HTTP request</b> during the connection to filter out idle or non-HTTP connections from this analysis — interestingly, these make up 11% of all TCP connections to Cloudflare that close with a FIN packet.</p><p>If you’re curious, we’ve also previously blogged about the details of Cloudflare’s <a href="https://blog.cloudflare.com/how-we-make-sense-of-too-much-data/"><u>overall logging mechanism</u></a> and <a href="https://blog.cloudflare.com/http-analytics-for-6m-requests-per-second-using-clickhouse/"><u>post-processing pipeline</u></a>.  </p>
    <div>
      <h2>Visualizing connection characteristics</h2>
      <a href="#visualizing-connection-characteristics">
        
      </a>
    </div>
    <p>Although networks are inherently dynamic and trends can change over time, the large-scale patterns we observe across our global infrastructure remain remarkably consistent over time. While our data offers a global view of connection characteristics, distributions can still vary according to regional traffic patterns.</p><p>In our visualizations we represent characteristics with <a href="https://en.wikipedia.org/wiki/Cumulative_distribution_function"><u>cumulative distribution function (CDF)</u></a> graphs, specifically their <a href="https://en.wikipedia.org/wiki/Empirical_distribution_function"><u>empirical equivalents</u></a>. CDFs are particularly useful for gaining a macroscopic view of the distribution. They give a clear picture of both common and extreme cases in a single view. We use them in the illustrations below to make sense of large-scale patterns. To better interpret the distributions, we also employ log-scaled axes to account for the presence of extreme values common to networking data.</p><p>A long-standing question about Internet connections relates to “<a href="https://en.wikipedia.org/wiki/Elephant_flow"><u>Elephants and Mice</u></a>”; practitioners and researchers are entirely aware that most flows are small and some are huge, yet little data exists to inform the lines that divide them. This is where our presentation begins.</p>
    <div>
      <h3>Packet Counts</h3>
      <a href="#packet-counts">
        
      </a>
    </div>
    <p>Let’s start by taking a look at the distribution of the number of <i>response</i> packets sent in connections by Cloudflare servers back to the clients.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qaPCul0l7bdOQfaxL1Wbn/d0ef9cc108ba35d49593029baed7cb86/image12.png" />
          </figure><p>On the graph, the x-axis represents the number of response packets sent in log-scale, while the y-axis shows the cumulative fraction of connections below each packet count. The average response consists of roughly 240 packets, but the distribution is highly skewed. The median is 12 packets, which indicates that 50% of Internet connections consist of <i>very few packets</i>.<i> </i>Extending further to<i> </i>the 90th percentile, connections carry only 107 packets.</p><p>This stark contrast highlights the heavy-tailed nature of Internet traffic: while a few connections transport massive amounts of data—like video streams or large file transfers—most interactions are tiny, delivering small web objects, microservice traffic, or API responses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Mf6VwD2Xq8aBwQP1V9aX5/1a20d6fa2caab5c719591db8b232f6a1/image11.png" />
          </figure><p>The above plot breaks down the packet count distribution by HTTP protocol version. For HTTP/1.X (both HTTP 1.0 and 1.1 combined) connections, the median response consists of just 10 packets, and 90% of connections carry fewer than 63 response packets. In contrast, HTTP/2 connections show larger responses, with a median of 16 packets and a 90th percentile of 170 packets. This difference likely reflects how HTTP/2 multiplexes multiple streams over a single connection, often consolidating more requests and responses into fewer connections, which increases the total number of packets exchanged per connection. HTTP/2 connections also have additional control-plane frames and flow-control messages that increase response packet counts.</p><p>Despite these differences, the combined view displays the same heavy-tailed pattern: a small fraction of connections carry enormous volumes of data (<a href="https://en.wikipedia.org/wiki/Elephant_flow"><u>elephant flows</u></a>), extending to millions of packets, while most remain lightweight (<a href="https://en.wikipedia.org/wiki/Mouse_flow"><u>mice flows</u></a>).</p><p>So far, we’ve focused on the total number of packets sent from our servers to clients, but another important dimension of connection behavior is the balance between packets sent and received, illustrated below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5VZeU0d2EYLxPl3SaTPJBb/6b46a793d6eea178838c4f5b2572caf1/image2.png" />
          </figure><p>The x-axis shows the ratio of packets sent by our servers to packets received from clients, visualized as a CDF. Across all connections, the median ratio is 0.91, meaning that in half of connections, clients send slightly more packets than the server responds with. This excess of client-side packets primarily reflects <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/"><u>TLS</u></a> handshake initiation (ClientHello), HTTP control request headers, and data acknowledgements (ACKs), causing the client to typically transmit more packets than the server returns with the content payload — particularly for low-volume connections that dominate the distribution.</p><p>The mean ratio is higher, at 1.28, due to a long tail of client-heavy connections, such as large downloads typical of CDN workloads. Most connections fall within a relatively narrow range: 10% of connections have a ratio below 0.67, and 90% are below 1.85. However, the long-tailed behavior highlights the diversity of Internet traffic: extreme values arise from both upload-heavy and download-heavy connections. The variance of 3.71 reflects these asymmetric flows, while the bulk of connections maintain a roughly balanced upload-to-download exchange.</p>
    <div>
      <h3>Bytes sent</h3>
      <a href="#bytes-sent">
        
      </a>
    </div>
    <p>Another dimension to look at the data is using bytes sent by our servers to clients, which captures the actual volume of data delivered over each connection. This metric is derived from tcpi_bytes_sent, also covering (re)transmitted segment payloads while excluding the TCP header, as defined in <a href="https://github.com/torvalds/linux/blob/v6.14/include/uapi/linux/tcp.h#L222-L312"><u>linux/tcp.h</u></a> and aligned with <a href="https://www.rfc-editor.org/rfc/rfc4898.html"><u>RFC 4898</u></a> (TCP Extended Statistics MIB).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VZs6F65RQjyyEUUxZSP2L/b0edd986738e9128c16dcbecb7d83761/image3.png" />
          </figure><p>The plots above break down bytes sent by HTTP protocol version. The x-axis represents the total bytes sent by our servers over each connection. The patterns are generally consistent with what we observed in the packet count distributions.</p><p>For HTTP/1.X, the median response delivers 4.8 KB, and 90% of connections send fewer than 51 KB. In contrast, HTTP/2 connections show slightly larger responses, with a median of 6 KB and a 90th percentile of 146 KB. The mean is much higher—224 KB for HTTP/1.x and 390 KB for HTTP/2—reflecting a small number of very large transfers. These long-tailed extreme flows can reach tens of gigabytes per connection, while some very lightweight connections carry minimal payloads: the minimum for HTTP/1.X is 115 bytes and for HTTP/2 it is 202 bytes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xRYaXYQbte6MszIT92uky/837ebdc842c9784a9c413ad886f7a5d6/image6.png" />
          </figure><p>By making use of the tcpi_bytes_received metric, we can now look at the ratio of bytes sent to bytes received per connection to better understand the balance of data exchange. This ratio captures how asymmetric each connection is — essentially, how much data our servers send compared to what they receive from clients. Across all connections, the median ratio is 3.78, meaning that in half of all cases, servers send nearly four times more data than they receive. The average is far higher at 81.06, showing a strong long tail driven by download-heavy flows. Again we see the heavy long-tailed distribution, a small fraction of extreme cases push the ratio into the millions, with more extreme values of data transfers towards clients.</p>
    <div>
      <h3>Connection duration</h3>
      <a href="#connection-duration">
        
      </a>
    </div>
    <p>While packet and byte counts capture how much data is exchanged, connection duration provides insight into how that exchange unfolds over time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5noP7Acqu2Ky4hCGtETH1F/92c7bd220d57232fb40440624d227a78/image8.png" />
          </figure><p>The CDF above shows the distribution of connection durations (lifetimes) in seconds. A reminder that the x-axis is log-scale. Across all connections, the median duration is just 4.7 seconds, meaning half of connections complete in under five seconds. The mean is much higher at 96 seconds, reflecting a small number of long-lived connections that skew the average. Most connections fall within a window of 0.1 seconds (10th percentile) to 300 seconds (90th percentile). We also observe some extremely long-lived connections lasting multiple days, possibly maintained via <a href="https://developers.cloudflare.com/fundamentals/reference/tcp-connections/#tcp-connections-and-keep-alives"><u>keep-alives</u></a> for connection reuse without hitting <a href="https://developers.cloudflare.com/fundamentals/reference/connection-limits/"><u>our default idle timeout limits</u></a>. These long-lived connections typically represent persistent sessions or multimedia traffic, while the majority of web traffic remains short, bursty, and transient.</p>
    <div>
      <h3>Request counts</h3>
      <a href="#request-counts">
        
      </a>
    </div>
    <p>A single connection can carry multiple HTTP requests for web traffic. This reveals patterns about connection multiplexing.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hsoigL4rFtIyRJpdSUXwh/5ef82b3c0cf5b25b8dc13ed38761f895/image7.png" />
          </figure><p>The above shows the number of HTTP requests (in log-scale) that we see on a single connection, broken down by HTTP protocol version. Right away, we can see that for both HTTP/1.X (mean 3 requests) and HTTP/2 (mean 8 requests) connections, the median number of requests is just 1, reinforcing the prevalence of limited connection reuse. However, because HTTP/2 supports multiplexing multiple streams over a single connection, the 90th percentile rises to 10 requests, with occasional extreme cases carrying thousands of requests, which can be amplified due to <a href="https://blog.cloudflare.com/connection-coalescing-experiments/"><u>connection coalescing</u></a>. In contrast, HTTP/1.X connections have much lower request counts. This aligns with protocol design: HTTP/1.0 followed a “one request per connection” philosophy, while HTTP/1.1 introduced persistent connections — even combining both versions, it’s rare to see HTTP/1.X connections carrying more than two requests at the 90th percentile.</p><p>The prevalence of short-lived connections can be partly explained by automated clients or scripts that tend to open new connections rather than maintaining long-lived sessions. To explore this intuition, we split the data between traffic originating from data centers (likely automated) and typical user traffic (user-driven), using client ASNs as a proxy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1DhUbNv8cjQVGOqKUai7KU/fecc8eaa488ec216bfb14084a518501b/image9.png" />
          </figure><p>The plot above shows that non-DC (user-driven) traffic has slightly higher request counts per connection, consistent with browsers or apps fetching multiple resources over a single persistent connection, with a mean of 5 requests and a 90th percentile of 5 requests per connection. In contrast, DC-originated traffic has a mean of roughly 3 requests and a 90th percentile of 2, validating our expectation. Despite these differences, the median number of requests remains 1 for both groups highlighting that, regardless of origin of connections, most are genuinely brief.</p>
    <div>
      <h2>Inferring path characteristics from connection-level data</h2>
      <a href="#inferring-path-characteristics-from-connection-level-data">
        
      </a>
    </div>
    <p>Connection-level measurements can also provide insights into underlying path characteristics. Let’s examine this in more detail.</p>
    <div>
      <h3>Path MTU</h3>
      <a href="#path-mtu">
        
      </a>
    </div>
    <p>The maximum transmission unit (<a href="https://www.cloudflare.com/learning/network-layer/what-is-mtu/"><u>MTU</u></a>) along the network path is often referred to as the Path MTU (PMTU). PMTU determines the largest packet size that can traverse a connection without fragmentation or packet drop, affecting throughput, efficiency, and latency. The Linux TCP stack on our servers tracks the largest segment size that can be sent without fragmentation along the path for a connection, as part of <a href="https://blog.cloudflare.com/path-mtu-discovery-in-practice/"><u>Path MTU discovery.</u></a></p><p>From that data we saw that the median (and the 90th percentile!) PMTU was 1500 bytes, which aligns with the typical Ethernet MTU and is <a href="https://en.wikipedia.org/wiki/Maximum_transmission_unit"><u>considered standard</u></a> for most Internet paths. Interestingly, the 10th percentile sits at 1,420 bytes, reflecting cases where paths include network links with slightly smaller MTUs—common in some <a href="https://blog.cloudflare.com/migrating-from-vpn-to-access/"><u>VPNs</u></a>, <a href="https://blog.cloudflare.com/increasing-ipv6-mtu/"><u>IPv6tov4 tunnels</u></a>, or older networking equipment that impose stricter limits to avoid fragmentation. At the extreme, we have seen MTU as small as 552 bytes for IPv4 connections which relates to the minimum allowed PMTU value <a href="https://www.kernel.org/doc/html/v6.5/networking/ip-sysctl.html#:~:text=Default%3A%20FALSE-,min_pmtu,-%2D%20INTEGER"><u>by the Linux kernel</u></a>.</p>
    <div>
      <h3>Initial congestion window</h3>
      <a href="#initial-congestion-window">
        
      </a>
    </div>
    <p>A key parameter in transport protocols is the congestion window (CWND), which is the number of packets that can be transmitted without waiting for an acknowledgement from the receiver. We call these packets or bytes “in-flight.” During a connection, the congestion window evolves dynamically throughout a connection.</p><p>However, the initial congestion window (ICWND) at the start of a data transfer can have an outsized impact, especially for short-lived connections, which dominate Internet traffic as we’ve seen above. If the ICWND is set too low, small and medium transfers take additional round-trip times to reach bottleneck bandwidth, slowing delivery. Conversely, if it’s too high, the sender risks overwhelming the network, causing unnecessary packet loss and retransmissions — potentially for all connections that share the bottleneck link.</p><p>A reasonable estimate of the ICWND can be taken as the congestion window size at the instant the TCP sender transitions out of <a href="https://www.rfc-editor.org/rfc/rfc5681#section-3.1"><u>slow start</u></a>. This transition marks the point at which the sender shifts from exponential growth to congestion-avoidance, having inferred that further growth may risk congestion. The figure below shows the distribution of congestion window sizes at the moment slow start exits — as calculated by <a href="https://blog.cloudflare.com/http-2-prioritization-with-nginx/#bbr-congestion-control"><u>BBR</u></a>. The median is roughly 464 KB, which corresponds to about 310 packets per connection with a typical 1,500-byte MTU, while extreme flows carry tens of megabytes in flight. This variance reflects the diversity of TCP connections and the dynamically evolving nature of the networks carrying traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7BzqE6HSQgkriWisqS3Yx3/de4dc12a453d162884e9a015ccb40348/image4.png" />
          </figure><p>It’s important to emphasize that these values reflect a mix of network paths, including not only paths between Cloudflare and end users, but also between Cloudflare and neighboring datacenters, which are typically well provisioned and offer higher bandwidth.</p><p>Our initial inspection of the above distribution left us doubtful, because the values seem very high. We then realized the numbers are an artifact of behaviour specific to BBR, in which it sets the congestion window higher than its estimate of the path’s available capacity, <a href="https://en.wikipedia.org/wiki/Bandwidth-delay_product"><u>bandwidth delay product (BDP)</u></a>. The inflated value is <a href="https://www.ietf.org/archive/id/draft-cardwell-iccrg-bbr-congestion-control-01.html#name-state-machine-operation"><u>by design</u></a>. To prove the hypothesis, we re-plot the distribution from above in the figure below alongside BBR’s estimate of BDP. The difference is clear between BBR’s congestion window of unacknowledged packets and its BDP estimate.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34YFSv4Zdp82qszNM79XsH/3c147dfd5c5006fe55abb53dab47bef1/image10.png" />
          </figure><p>The above plot adds the computed BDP values in context with connection telemetry. The median BDP comes out to be roughly 77 KB, which is roughly 50 packets. If we compare this to the congestion window distribution taken from above, we see BDP estimations from recently closed connections are much more stable.</p><p>We are using these insights to help identify reasonable initial congestion window sizes and the circumstances for them. Our own experiments internally make clear that ICWND sizes can affect performance by as much as 30-40% for smaller connections. Such insights will potentially help to revisit efforts to find better initial congestion window values, which has been a default of <a href="https://datatracker.ietf.org/doc/html/rfc6928"><u>10 packets</u></a> for more than a decade.</p>
    <div>
      <h3>Deeper understanding, better performance</h3>
      <a href="#deeper-understanding-better-performance">
        
      </a>
    </div>
    <p>We observed that Internet connections are highly heterogeneous, confirming decades-long observations of strong heavy-tail characteristics consistent with “<a href="https://en.wikipedia.org/wiki/Elephant_flow"><u>elephants and mice</u></a>” phenomenon. Ratios of upload to download bytes are unsurprising for larger flows, but surprisingly small for short flows, highlighting the asymmetric nature of Internet traffic. Understanding these connection characteristics continues to inform ways to improve connection performance, reliability, and user experience.</p><p>We will continue to build on this work, and plan to publish connection-level statistics on <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> so that others can similarly benefit.</p><p>Our work on improving our network is ongoing, and we welcome researchers, academics, <a href="https://blog.cloudflare.com/cloudflare-1111-intern-program/"><u>interns</u></a>, and anyone interested in this space to reach out at <a><u>ask-research@cloudflare.com</u></a>. By sharing knowledge and working together, we all can continue to make the Internet faster, safer, and more reliable for everyone.</p> ]]></content:encoded>
            <category><![CDATA[Research]]></category>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[TCP]]></category>
            <guid isPermaLink="false">5jyi6dhHiLQu3BVMVGKrVG</guid>
            <dc:creator>Suleman Ahmad</dc:creator>
            <dc:creator>Peter Wu</dc:creator>
        </item>
        <item>
            <title><![CDATA[A framework for measuring Internet resilience]]></title>
            <link>https://blog.cloudflare.com/a-framework-for-measuring-internet-resilience/</link>
            <pubDate>Tue, 28 Oct 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We present a data-driven framework to quantify cross-layer Internet resilience. We also share a list of measurements with which to quantify facets of Internet resilience for geographical areas. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On July 8, 2022, a massive outage at Rogers, one of Canada's largest telecom providers, knocked out Internet and mobile services for over 12 million users. Why did this single event have such a catastrophic impact? And more importantly, why do some networks crumble in the face of disruption while others barely stumble?</p><p>The answer lies in a concept we call <b>Internet resilience</b>: a network's ability not just to stay online, but to withstand, adapt to, and rapidly recover from failures.</p><p>It’s a quality that goes far beyond simple "uptime." True resilience is a multi-layered capability, built on everything from the diversity of physical subsea cables to the security of BGP routing and the health of a competitive market. It's an emergent property much like <a href="https://en.wikipedia.org/wiki/Psychological_resilience"><u>psychological resilience</u></a>: while each individual network must be robust, true resilience only arises from the collective, interoperable actions of the entire ecosystem. In this post, we'll introduce a data-driven framework to move beyond abstract definitions and start quantifying what makes a network resilient. All of our work is based on public data sources, and we're sharing our metrics to help the entire community build a more reliable and secure Internet for everyone.</p>
    <div>
      <h2>What is Internet resilience?</h2>
      <a href="#what-is-internet-resilience">
        
      </a>
    </div>
    <p>In networking, we often talk about "reliability" (does it work under normal conditions?) and "robustness" (can it handle a sudden traffic surge?). But resilience is more dynamic. It's the ability to gracefully degrade, adapt, and most importantly, recover. For our work, we've adopted a pragmatic definition:</p><p><b><i>Internet resilience</i></b><i> is the measurable capability of a national or regional network ecosystem to maintain diverse and secure routing paths in the face of challenges, and to rapidly restore connectivity following a disruption.</i></p><p>This definition links the abstract goal of resilience to the concrete, measurable metrics that form the basis of our analysis.</p>
    <div>
      <h3>Local decisions have global impact</h3>
      <a href="#local-decisions-have-global-impact">
        
      </a>
    </div>
    <p>The Internet is a global system but is built out of thousands of local pieces. Every country depends on the global Internet for economic activity, communication, and critical services, yet most of the decisions that shape how traffic flows are made locally by individual networks.</p><p>In most national infrastructures like water or power grids, a central authority can plan, monitor, and coordinate how the system behaves. The Internet works very differently. Its core building blocks are Autonomous Systems (ASes), which are networks like ISPs, universities, cloud providers or enterprises. Each AS controls autonomously how it connects to the rest of the Internet, which routes it accepts or rejects, how it prefers to forward traffic, and with whom it interconnects. That’s why they’re called Autonomous Systems in the first place! There’s no global controller. Instead, the Internet’s routing fabric emerges from the collective interaction of thousands of independent networks, each optimizing for its own goals.</p><p>This decentralized structure is one of the Internet’s greatest strengths: no single failure can bring the whole system down. But it also makes measuring resilience at a country level tricky. National statistics can hide local structures that are crucial to global connectivity. For example, a country might appear to have many international connections overall, but those connections could be concentrated in just a handful of networks. If one of those fails, the whole country could be affected.</p><p>For resilience, the goal isn’t to isolate national infrastructure from the global Internet. In fact, the opposite is true: healthy integration with diverse partners is what makes both local and global connectivity stronger. When local networks invest in secure, redundant, and diverse interconnections, they improve their own resilience and contribute to the stability of the Internet as a whole.</p><p>This perspective shapes how we design and interpret resilience metrics. Rather than treating countries as isolated units, we look at how well their networks are woven into the global fabric: the number and diversity of upstream providers, the extent of international peering, and the richness of local interconnections. These are the building blocks of a resilient Internet.</p>
    <div>
      <h3>Route hygiene: Keeping the Internet healthy</h3>
      <a href="#route-hygiene-keeping-the-internet-healthy">
        
      </a>
    </div>
    <p>The Internet is constructed according to a <i>layered</i> model, by design, so that different Internet components and features can evolve independent of the others. The Physical layer stores, carries, and forwards, all the bits and bytes transmitted in packets between devices. It consists of cables, routers and switches, but also buildings that house interconnection facilities. The Application layer sits above all others and has virtually no information about the network so that applications can communicate without having to worry about the underlying details, for example, if a network is ethernet or Wi-Fi. The application layer includes web browsers, web servers, as well as caching, security, and other features provided by Content Distribution Networks (CDNs). Between the physical and application layers is the Network layer responsible for Internet routing. It is ‘logical’, consisting of software that learns about interconnection and routes, and makes (local) forwarding decisions that deliver packets to their destinations. </p><p>Good route hygiene works like personal hygiene: it prevents problems before they spread. The Internet relies on the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol</u></a> (BGP) to exchange routes between networks, but BGP wasn’t built with security in mind. A single bad route announcement, whether by mistake or attack, can send traffic the wrong way or cause widespread outages.</p><p>Two practices help stop this: The <b>RPKI</b> (Resource Public Key Infrastructure) lets networks publish cryptographic proof that they’re allowed to announce specific IP prefixes. <b>ROV </b>(Route Origin Validation) checks those proofs before accepting routes.</p><p>Together, they act like passports and border checks for Internet routes, helping filter out hijacks and leaks early.</p><p>Hygiene doesn’t just happen in the routing table – it spans multiple layers of the Internet’s architecture, and weaknesses in one layer can ripple through the rest. At the physical layer, having multiple, geographically diverse cable routes ensures that a single cut or disaster doesn’t isolate an entire region. For example, distributing submarine landing stations along different coastlines can protect international connectivity when one corridor fails. At the network layer, practices like multi-homing and participation in Internet Exchange Points (IXPs) give operators more options to reroute traffic during incidents, reducing reliance on any single upstream provider. At the application layer, Content Delivery Networks (CDNs) and caching keep popular content close to users, so even if upstream routes are disrupted, many services remain accessible. Finally, policy and market structure also play a role: open peering policies and competitive markets foster diversity, while dependence on a single ISP or cable system creates fragility.</p><p>Resilience emerges when these layers work together. If one layer is weak, the whole system becomes more vulnerable to disruption.</p><p>The more networks adopt these practices, the stronger and more resilient the Internet becomes. We actively support the deployment of RPKI, ROV, and diverse routing to keep the global Internet healthy.</p>
    <div>
      <h2>Measuring resilience is harder than it sounds</h2>
      <a href="#measuring-resilience-is-harder-than-it-sounds">
        
      </a>
    </div>
    <p>The biggest hurdle in measuring resilience is data access. The most valuable information, like internal network topologies, the physical paths of fiber cables, or specific peering agreements, is held by private network operators. This is the ground truth of the network.</p><p>However, operators view this information as a highly sensitive competitive asset. Revealing detailed network maps could expose strategic vulnerabilities or undermine business negotiations. Without access to this ground truth data, we're forced to rely on inference, approximation, and the clever use of publicly available data sources. Our framework is built entirely on these public sources to ensure anyone can reproduce and build upon our findings.</p><p>Projects like RouteViews and RIPE RIS collect BGP routing data that shows how networks connect. <a href="https://www.cloudflare.com/en-in/learning/network-layer/what-is-mtr/"><u>Traceroute</u></a> measurements reveal paths at the router level. IXP and submarine cable maps give partial views of the physical layer. But each of these sources has blind spots: peering links often don’t appear in BGP data, backup paths may remain hidden, and physical routes are hard to map precisely. This lack of a single, complete dataset means that resilience measurement relies on combining many partial perspectives, a bit like reconstructing a city map from scattered satellite images, traffic reports, and public utility filings. It’s challenging, but it’s also what makes this field so interesting.</p>
    <div>
      <h3>Translating resilience into quantifiable metrics</h3>
      <a href="#translating-resilience-into-quantifiable-metrics">
        
      </a>
    </div>
    <p>Once we understand why resilience matters and what makes it hard to measure, the next step is to translate these ideas into concrete metrics. These metrics give us a way to evaluate how well different parts of the Internet can withstand disruptions and to identify where the weak points are. No single metric can capture Internet resilience on its own. Instead, we look at it from multiple angles: physical infrastructure, network topology, interconnection patterns, and routing behavior. Below are some of the key dimensions we use. Some of these metrics are inspired from existing research, like the <a href="https://pulse.internetsociety.org/en/resilience/"><u>ISOC Pulse</u></a> framework. All described methods rely on public data sources and are fully reproducible. As a result, in our visualizations we intentionally omit country and region names to maintain focus on the methodology and interpretation of the results. </p>
    <div>
      <h3>IXPs and colocation facilities</h3>
      <a href="#ixps-and-colocation-facilities">
        
      </a>
    </div>
    <p>Networks primarily interconnect in two types of physical facilities: colocation facilities (colos), and Internet Exchange Points (IXPs) often housed within the colos. Although symbiotically linked, they serve distinct functions in a nation’s digital ecosystem. A colocation facility provides the foundational infrastructure —- secure space, power, and cooling – for network operators to place their equipment. The IXP builds upon this physical base to provide the logical interconnection fabric, a role that is transformative for a region’s Internet development and resilience. The networks that connect at these facilities are its members. </p><p>Metrics that reflect resilience include:</p><ul><li><p><b>Number and distribution of IXPs</b>, normalized by population or geography. A higher IXP count, weighted by population or geographic coverage, is associated with improved local connectivity.</p></li><li><p><b>Peering participation rates</b> — the percentage of local networks connected to domestic IXPs. This metric reflects the extent to which local networks rely on regional interconnection rather than routing traffic through distant upstream providers.</p></li><li><p><b>Diversity of IXP membership</b>, including ISPs, CDNs, and cloud providers, which indicates how much critical content is available locally, making it accessible to domestic users even if international connectivity is severely degraded.</p></li></ul><p>Resilience also depends on how well local networks connect globally:</p><ul><li><p>How many <b>local networks peer at international IXPs</b>, increasing their routing options</p></li><li><p>How many <b>international networks peer at local IXPs</b>, bringing content closer to users</p></li></ul><p>A balanced flow in both directions strengthens resilience by ensuring multiple independent paths in and out of a region.</p><p>The geographic distribution of IXPs further enhances resilience. A resilient IXP ecosystem should be geographically dispersed to serve different regions within a country effectively, reducing the risk of a localized infrastructure failure from affecting the connectivity of an entire country. Spatial distribution metrics help evaluate how infrastructure is spread across a country’s geography or its population. Key spatial metrics include:</p><ul><li><p><b>Infrastructure per Capita</b>: This metric – inspired by <a href="https://en.wikipedia.org/wiki/Telephone_density"><u>teledensity</u></a>  – measures infrastructure relative to population size of a sub-region, providing a per-person availability indicator. A low IXP-per-population ratio in a region suggests that users there rely on distant exchanges, increasing the bit-risk miles.</p></li><li><p><b>Infrastructure per Area (Density)</b>: This metric evaluates how infrastructure is distributed per unit of geographic area, highlighting spatial coverage. Such area-based metrics are crucial for critical infrastructures to ensure remote areas are not left inaccessible.</p></li></ul><p>These metrics can be summarized using the <a href="https://www.bls.gov/k12/students/economics-made-easy/location-quotients.pdf"><u>Location Quotient (LQ)</u></a>. The location quotient is a widely used geographic index that measures a region’s share of infrastructure relative to its share of a baseline (such as population or area).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4S52jlwCpQ8WVS6gRSdNqp/4722abb10331624a54b411708f1e576b/image5.png" />
          </figure><p>For example, the figure above represents US states where a region hosts more or less infrastructure that is expected for its population, based on its LQ score. This statistic illustrates how even for the states with the highest number of facilities this number is <i>still</i> lower than would be expected given the population size of those states.</p>
    <div>
      <h4>Economic-weighted metrics</h4>
      <a href="#economic-weighted-metrics">
        
      </a>
    </div>
    <p>While spatial metrics capture the physical distribution of infrastructure, economic and usage-weighted metrics reveal how infrastructure is actually used. These account for traffic, capacity, or economic activity, exposing imbalances that spatial counts miss. <b>Infrastructure Utilization Concentration</b> measures how usage is distributed across facilities, using indices like the <b>Herfindahl–Hirschman Index (HHI)</b>. HHI sums the squared market shares of entities, ranging from 0 (competitive) to 10,000 (highly concentrated). For IXPs, market share is defined through operational metrics such as:</p><ul><li><p><b>Peak/Average Traffic Volume</b> (Gbps/Tbps): indicates operational significance</p></li><li><p><b>Number of Connected ASNs</b>: reflects network reach</p></li><li><p><b>Total Port Capacity</b>: shows physical scale</p></li></ul><p>The chosen metric affects results. For example, using connected ASNs yields an HHI of 1,316 (unconcentrated) for a Central European country, whereas using port capacity gives 1,809 (moderately concentrated).</p><p>The <b>Gini coefficient</b> measures inequality in resource or traffic distribution (0 = equal, 1 = fully concentrated). The <b>Lorenz curve</b> visualizes this: a straight 45° line indicates perfect equality, while deviations show concentration.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30bh4nVHRX5O3HMKvGRYh7/e0c5b3a7cb8294dfe3caaec98a0557d0/Screenshot_2025-10-27_at_14.10.57.png" />
          </figure><p>The chart on the left suggests substantial geographical inequality in colocation facility distribution across the US states. However, the population-weighted analysis in the chart on the right demonstrates that much of that geographic concentration can be explained by population distribution.</p>
    <div>
      <h3>Submarine cables</h3>
      <a href="#submarine-cables">
        
      </a>
    </div>
    <p>Internet resilience, in the context of undersea cables, is defined by the global network’s capacity to withstand physical infrastructure damage and to recover swiftly from faults, thereby ensuring the continuity of intercontinental data flow. The metrics for quantifying this resilience are multifaceted, encompassing the frequency and nature of faults, the efficiency of repair operations, and the inherent robustness of both the network’s topology and its dedicated maintenance resources. Such metrics include:</p><ul><li><p>Number of <b>landing stations</b>, cable corridors, and operators. The goal is to ensure that national connectivity should withstand single failure events, be they natural disaster, targeted attack, or major power outage. A lack of diversity creates single points of failure, as highlighted by <a href="https://www.theguardian.com/news/2025/sep/30/tonga-pacific-island-internet-underwater-cables-volcanic-eruption"><u>incidents in Tonga</u></a> where damage to the only available cable led to a total outage.</p></li><li><p><b>Fault rates</b> and <b>mean time to repair (MTTR)</b>, which indicate how quickly service can be restored. These metrics measure a country’s ability to prevent, detect, and recover from cable incidents, focusing on downtime reduction and protection of critical assets. Repair times hinge on <b>vessel mobilization</b> and <b>government permits</b>, the latter often the main bottleneck.</p></li><li><p>Availability of <b>satellite backup capacity</b> as an emergency fallback. While cable diversity is essential, resilience planning must also cover worst-case outages. The Non-Terrestrial Backup System Readiness metric measures a nation’s ability to sustain essential connectivity during major cable disruptions. LEO and MEO satellites, though costlier and lower capacity than cables, offer proven emergency backup during conflicts or disasters. Projects like HEIST explore hybrid space-submarine architectures to boost resilience. Key indicators include available satellite bandwidth, the number of NGSO providers under contract (for diversity), and the deployment of satellite terminals for public and critical infrastructure. Tracking these shows how well a nation can maintain command, relief operations, and basic connectivity if cables fail.</p></li></ul>
    <div>
      <h3>Inter-domain routing</h3>
      <a href="#inter-domain-routing">
        
      </a>
    </div>
    <p>The network layer above the physical interconnection infrastructure governs how traffic is routed across the Autonomous Systems (ASes). Failures or instability at this layer – such as misconfigurations, attacks, or control-plane outages – can disrupt connectivity even when the underlying physical infrastructure remains intact. In this layer, we look at resilience metrics that characterize the robustness and fault tolerance of AS-level routing and BGP behavior.</p><p><b>AS Path Diversity</b> measures the number and independence of AS-level routes between two points. High diversity provides alternative paths during failures, enabling BGP rerouting and maintaining connectivity. Low diversity leaves networks vulnerable to outages if a critical AS or link fails. Resilience depends on upstream topology.</p><ul><li><p>Single-homed ASes rely on one provider, which is cheaper and simpler but more fragile.</p></li><li><p>Multi-homed ASes use multiple upstreams, requiring BGP but offering far greater redundancy and performance at higher cost.</p></li></ul><p>The <b>share of multi-homed ASes</b> reflects an ecosystem’s overall resilience: higher rates signal greater protection from single-provider failures. This metric is easy to measure using <b>public BGP data</b> (e.g., RouteViews, RIPE RIS, CAIDA). Longitudinal BGP monitoring helps reveal hidden backup links that snapshots might miss.</p><p>Beyond multi-homing rates, <b>the distribution of single-homed ASes per transit provider</b> highlights systemic weak points. For each provider, counting customer ASes that rely exclusively on it reveals how many networks would be cut off if that provider fails. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ECZveUVwyM6TmGa1SaZnl/1222c7579c81fd62a5d8d80d63000ec3/image1.png" />
          </figure><p>The figure above shows Canadian transit providers for July 2025: the x-axis is total customer ASes, the y-axis is single-homed customers. Canada’s overall single-homing rate is 30%, with some providers serving many single-homed ASes, mirroring vulnerabilities seen during the <a href="https://en.wikipedia.org/wiki/2022_Rogers_Communications_outage"><u>2022 Rogers outage</u></a>, which disrupted over 12 million users.</p><p>While multi-homing metrics provide a valuable, static view of an ecosystem’s upstream topology, a more dynamic and nuanced understanding of resilience can be achieved by analyzing the characteristics of the actual BGP paths observed from global vantage points. These path-centric metrics move beyond simply counting connections to assess the diversity and independence of the routes to and from a country’s networks. These metrics include:</p><ul><li><p><b>Path independence</b> measures whether those alternative routes truly avoid shared bottlenecks. Multi-homing only helps if upstream paths are truly distinct. If two providers share upstream transit ASes, redundancy is weak. Independence can be measured with the Jaccard distance between AS paths. A stricter <b>path disjointness score</b> calculates the share of path pairs with no common ASes, directly quantifying true redundancy.</p></li><li><p><b>Transit entropy</b> measures how evenly traffic is distributed across transit providers. High Shannon entropy signals a decentralized, resilient ecosystem; low entropy shows dependence on few providers, even if nominal path diversity is high.</p></li><li><p><b>International connectivity ratios</b> evaluate the share of domestic ASes with direct international links. High percentages reflect a mature, distributed ecosystem; low values indicate reliance on a few gateways.</p></li></ul><p>The figure below encapsulates the aforementioned AS-level resilience metrics into single polar pie charts. For the purpose of exposition we plot the metrics for infrastructure from two different nations with very different resilience profiles.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PKxDcl4m1XXCAuvFUcTdZ/d0bce797dcbd5e1baf39ca66e7ac0056/image4.png" />
          </figure><p>To pinpoint critical ASes and potential single points of failure, graph centrality metrics can provide useful insights. <b>Betweenness Centrality (BC)</b> identifies nodes lying on many shortest paths, but applying it to BGP data suffers from vantage point bias. ASes that provide BGP data to the RouteViews and RIS collectors appear falsely central. <b>AS Hegemony</b>, developed by<a href="https://dl.acm.org/doi/10.1145/3123878.3131982"><u> Fontugne et al.</u></a>, corrects this by filtering biased viewpoints, producing a 0–1 score that reflects the true fraction of paths crossing an AS. It can be applied globally or locally to reveal Internet-wide or AS-specific dependencies.</p><p><b>Customer cone size</b> developed by <a href="https://asrank.caida.org/about#customer-cone"><u>CAIDA</u></a> offers another perspective, capturing an AS’s economic and routing influence via the set of networks it serves through customer links. Large cones indicate major transit hubs whose failure affects many downstream networks. However, global cone rankings can obscure regional importance, so <a href="https://www.caida.org/catalog/papers/2023_on_importance_being_as/on_importance_being_as.pdf"><u>country-level adaptations</u></a> give more accurate resilience assessments.</p>
    <div>
      <h4>Impact-Weighted Resilience Assessment</h4>
      <a href="#impact-weighted-resilience-assessment">
        
      </a>
    </div>
    <p>Not all networks have the same impact when they fail. A small hosting provider going offline affects far fewer people than if a national ISP does. Traditional resilience metrics treat all networks equally, which can mask where the real risks are. To address this, we use impact-weighted metrics that factor in a network’s user base or infrastructure footprint. For example, by weighting multi-homing rates or path diversity by user population, we can see how many people actually benefit from redundancy — not just how many networks have it. Similarly, weighting by the number of announced prefixes highlights networks that carry more traffic or control more address space.</p><p>This approach helps separate theoretical resilience from practical resilience. A country might have many multi-homed networks, but if most users rely on just one single-homed ISP, its resilience is weaker than it looks. Impact weighting helps surface these kinds of structural risks so that operators and policymakers can prioritize improvements where they matter most.</p>
    <div>
      <h3>Metrics of network hygiene</h3>
      <a href="#metrics-of-network-hygiene">
        
      </a>
    </div>
    <p>Large Internet outages aren’t always caused by cable cuts or natural disasters — sometimes, they stem from routing mistakes or security gaps. Route hijacks, leaks, and spoofed announcements can disrupt traffic on a national scale. How well networks protect themselves against these incidents is a key part of resilience, and that’s where network hygiene comes in.</p><p>Network hygiene refers to the security and operational practices that make the global routing system more trustworthy. This includes:</p><ul><li><p><b>Cryptographic validation</b>, like RPKI, to prevent unauthorized route announcements. <b>ROA Coverage</b> measures the share of announced IPv4/IPv6 space with valid Route Origin Authorizations (ROAs), indicating participation in the RPKI ecosystem. <b>ROV Deployment</b> gauges how many networks drop invalid routes, but detecting active filtering is difficult. Policymakers can improve visibility by supporting independent measurements, data transparency, and standardized reporting.</p></li><li><p><b>Filtering and cooperative norms</b>, where networks block bogus routes and follow best practices when sharing routing information.</p></li><li><p><b>Consistent deployment across both domestic networks and their international upstreams</b>, since traffic often crosses multiple jurisdictions.</p></li></ul><p>Strong hygiene practices reduce the likelihood of systemic routing failures and limit their impact when they occur. We actively support and monitor the adoption of these mechanisms, for instance through <a href="https://isbgpsafeyet.com/"><u>crowd-sourced measurements</u></a> and public advocacy, because every additional network that validates routes and filters traffic contributes to a safer and more resilient Internet for everyone.</p><p>Another critical aspect of Internet hygiene is mitigating DDoS attacks, which often rely on IP address spoofing to amplify traffic and obscure the attacker’s origin. <a href="https://datatracker.ietf.org/doc/bcp38/"><u>BCP-38</u></a>, the IETF’s network ingress filtering recommendation, addresses this by requiring operators to block packets with spoofed source addresses, reducing a region’s role as a launchpad for global attacks. While BCP-38 does not prevent a network from being targeted, its deployment is a key indicator of collective security responsibility. Measuring compliance requires active testing from inside networks, which is carried out by the <a href="https://spoofer.caida.org/summary.php"><u>CAIDA Spoofer Project</u></a>. Although the global sample remains limited, these metrics offer valuable insight into both the technical effectiveness and the security engagement of a nation’s network community, complementing RPKI in strengthening the overall routing security posture.</p>
    <div>
      <h3>Measuring the collective security posture</h3>
      <a href="#measuring-the-collective-security-posture">
        
      </a>
    </div>
    <p>Beyond securing individual networks through mechanisms like RPKI and BCP-38, strengthening the Internet’s resilience also depends on collective action and visibility. While origin validation and anti-spoofing reduce specific classes of threats, broader frameworks and shared measurement infrastructures are essential to address systemic risks and enable coordinated responses.</p><p>The <a href="https://manrs.org/"><u>Mutually Agreed Norms for Routing Security (MANRS)</u></a> initiative promotes Internet resilience by defining a clear baseline of best practices. It is not a new technology but a framework fostering collective responsibility for global routing security. MANRS focuses on four key actions: filtering incorrect routes, anti-spoofing, coordination through accurate contact information, and global validation using RPKI and IRRs. While many networks implement these independently, MANRS participation signals a public commitment to these norms and to strengthening the shared security ecosystem.</p><p>Additionally, a region’s participation in public measurement platforms reflects its Internet observability, which is essential for fault detection, impact assessment, and incident response. <a href="https://atlas.ripe.net/"><u>RIPE Atlas</u></a> and <a href="https://www.caida.org/projects/ark/"><u>CAIDA Ark</u></a> provide dense data-plane measurements; <a href="https://www.routeviews.org/routeviews/"><u>RouteViews</u></a> and <a href="https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris/"><u>RIPE RIS</u></a> collect BGP routing data to detect anomalies; and <a href="https://www.peeringdb.com/"><u>PeeringDB</u></a> documents interconnection details, reflecting operational maturity and integration into the global peering fabric. Together, these platforms underpin observatories like <a href="https://ioda.inetintel.cc.gatech.edu/"><u>IODA</u></a> and <a href="https://grip.oie.gatech.edu/home"><u>GRIP</u></a>, which combine BGP and active data to detect outages and routing incidents in near real time, offering critical visibility into Internet health and security.</p>
    <div>
      <h2>Building a more resilient Internet, together</h2>
      <a href="#building-a-more-resilient-internet-together">
        
      </a>
    </div>
    <p>Measuring Internet resilience is complex, but it's not impossible. By using publicly available data, we can create a transparent and reproducible framework to identify strengths, weaknesses, and single points of failure in any network ecosystem.</p><p>This isn't just a theoretical exercise. For policymakers, this data can inform infrastructure investment and pro-competitive policies that encourage diversity. For network operators, it provides a benchmark to assess their own resilience and that of their partners. And for everyone who relies on the Internet, it's a critical step toward building a more stable, secure, and reliable global network.</p><p><i>For more details of the framework, including a full table of the metrics and links to source code, please refer to the full paper: </i> <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5376106"><u>Regional Perspectives for Route Resilience in a Global Internet: Metrics, Methodology, and Pathways for Transparency</u></a> published at <a href="https://www.tprcweb.com/tprc23program"><u>TPRC23</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Research]]></category>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Routing Security]]></category>
            <category><![CDATA[Insights]]></category>
            <guid isPermaLink="false">48ry6RI3JhA9H3t280EWUX</guid>
            <dc:creator>Vasilis Giotsas</dc:creator>
            <dc:creator>Cefan Daniel Rubin</dc:creator>
            <dc:creator>Marwan Fayed</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network trends and natural language: Cloudflare Radar’s new Data Explorer & AI Assistant]]></title>
            <link>https://blog.cloudflare.com/radar-data-explorer-ai-assistant/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare Radar Data Explorer provides a simple Web-based interface to build more complex API queries, including comparisons and filters, and visualize the results. The accompanying AI Assistant translates a user’s natural language statements or questions into the appropriate Radar API calls. ]]></description>
            <content:encoded><![CDATA[ <p><b></b><a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> showcases global Internet traffic patterns, attack activity, and technology trends and insights. It is powered by data from Cloudflare's global network, as well as aggregated and anonymized data from Cloudflare's <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS Resolver</u></a>, and is built on top of a rich, publicly accessible <a href="https://developers.cloudflare.com/radar/"><u>API</u></a>. This API allows users to explore Radar data beyond the default set of visualizations, for example filtering by protocol, comparing metrics across multiple locations or autonomous systems, or examining trends over two different periods of time. However, not every user has the technical know-how to make a raw API query or process the JSON-formatted response.</p><p>Today, we are launching the <a href="https://radar.cloudflare.com/explorer"><u>Cloudflare Radar Data Explorer</u></a>, which provides a simple Web-based interface to enable users to easily build more complex API queries, including comparisons and filters, and visualize the results. And as a complement to the Data Explorer, we are also launching an AI Assistant, which uses <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Workers AI</u></a> to translate a user’s natural language statements or questions into the appropriate Radar API calls, the results of which are visualized in the Data Explorer. Below, we introduce the AI Assistant and Data Explorer, and also dig into how we used Cloudflare Developer Platform tools to build the AI Assistant.</p>
    <div>
      <h2>Ask the AI Assistant</h2>
      <a href="#ask-the-ai-assistant">
        
      </a>
    </div>
    <p>Sometimes, a user may know what they are looking for, but aren’t quite sure how to build the relevant API query by selecting from the available options and filters. (The sheer number may appear overwhelming.) In those cases, they can simply pose a question to the AI Assistant, like “Has there been an uptick in malicious email over the last week?” The AI Assistant makes a series of Workers AI and Radar API calls to retrieve the relevant data, which is visualized within seconds:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HRBy5Bm5aNQ1gUj1MBCj5/e0fcd717765a8f234996b9e98e43389a/image8.png" />
          </figure><p>The AI Assistant pane is found on the right side of the page in desktop browsers, and appears when the user taps the “AI Assistant” button on a mobile browser. To use the AI Assistant, users just need to type their question into the “Ask me something” area at the bottom of the pane and submit it. A few sample queries are also displayed by default to provide examples of how and what to ask, and clicking on one submits it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79srygHorwU84nyQg9KLSl/be609d62b0ebf4a708f6f523fed817f1/Screenshot_2024-09-26_at_20.32.43.png" />
          </figure><p>The submitted question is evaluated by the AI Assistant (more <a href="#AIAssistant"><u>below</u></a> on how that happens), and the resulting visualization is displayed in the <b>Results</b> section of the Data Explorer. In addition to the visualization of the results, the appropriate <b>Data</b>, <b>Filter</b>, and <b>Compare</b> options are selected in the <b>Query</b> section above the visualization, allowing the user to further tune or refine the results if necessary. The <i>Keep current filters</i> toggle within the AI Assistant pane allows users to build on the previous question. For example, with that toggle active, a user could ask “Traffic in the United States”, see the resultant graph, and then ask “Compare it with traffic in Mexico” to add Mexico’s data to the graph.</p>
    <div>
      <h2>Building a query directly</h2>
      <a href="#building-a-query-directly">
        
      </a>
    </div>
    <p>For users that prefer a more hands-on approach, a wide variety of Radar datasets are available to explore, including traffic metrics, attacks, Internet quality, email security, and more. Once the user selects a dataset, the <i>Breakdown By:</i> dropdown is automatically populated with relevant options (if any), and <b>Filter</b> options are also dynamically populated. As the user selects additional options, the visualization in the <b>Result</b> section is automatically updated.</p><p>In addition to building the query of interest, Data Explorer also enables the user to compare the results, both against a specific date range and/or another location or <a href="https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (AS)</u></a>. To compare results with the immediately previous period (the last seven days with the seven days before that, for instance), just toggle on the <i>Previous period</i> switch. Otherwise, clicking on the <i>Date Range</i> field brings up a calendar that enables the user to select a starting date — the corresponding date range is intelligently selected, based on the date range selected in the <b>Filter</b> section. To compare results across locations or ASNs, clicking on the “Location or ASN” field brings up a search box in which the user can enter a location (country/region) name, AS name, or AS number, with search results updating as the user types. Note that locations can be compared with other locations or ASes, and ASes can be compared with other ASes or locations. This enables a user, for example, to compare trends for their ISP with trends for their country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R9F5Cxe8gkJCUHzLitNH3/87225186868c22f4a3b17a19c1bddd8c/image7.png" />
            
            </figure>
    <div>
      <h2>Visualizing the results</h2>
      <a href="#visualizing-the-results">
        
      </a>
    </div>
    <p>Much of the value of Cloudflare Radar comes from its visualizations – the graphs, maps, and tables that illustrate the underlying data, and Data Explorer does not disappoint here. Depending on the dataset and filters selected, and the volume of data returned, results may be visualized in a time series graph, bar chart, <a href="https://en.wikipedia.org/wiki/Treemapping"><u>treemap</u></a>, or global <a href="https://en.wikipedia.org/wiki/Choropleth_map"><u>choropleth map</u></a>. The visualization type is determined automatically based on the contents of the API response. For example, the presence of countryalpha2 keys in the response means a choropleth map will be used, the presence of timestamps in the response means a line graph (“xychart”) should be shown, and more than 40 items in the response selects a treemap as the visualization type.</p><p>To illustrate the extended visualizations available in Data Explorer, the figure below is an expanded version of one that would normally be found on <a href="https://radar.cloudflare.com/adoption-and-usage/us#http-1-x-vs-http-2-vs-http-3"><u>Radar’s </u><b><u>Adoption &amp; Usage</u></b><u> page</u></a>. The “standard” version of the graph plots the shares of the HTTP versions over the last seven days for the United States, as well as the summary share values. In this <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=http_version&amp;loc=US&amp;filters=botClass%253DLikely_Human%252CdeviceType%253DMobile&amp;dt=7d&amp;timeCompare=1&amp;compareWith=701"><u>extended version of the graph generated in the Data Explorer</u></a>, we compare data for the United States with HTTP version share data for <a href="https://radar.cloudflare.com/as701"><u>AS701 (Verizon)</u></a>, for both the past seven days and the previous seven-day period. In addition to the comparisons plotted on the time series graph, the associated summary values are also compared in an accompanying bar chart. This comprehensive visualization makes comparisons easy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Euh3n9A79zjXN05GQsTu0/e53fcfc5630beba215babd237875c610/image2.png" />
          </figure><p>For some combinations of datasets/filters/comparisons, time series graphs can get quite busy, with a significant number of lines being plotted. To isolate just a single line on the graph, double-click on the item in the legend. To add/remove additional lines back to/from the graph, single-click on the relevant legend item.</p><p>Similar to other visualizations on Radar, the resulting graphs or maps can be downloaded, copied, or embedded into another website or application. Simply click on the “Share” button above the visualization card to bring up the <b>Share</b> modal dialog. We hope to see these graphs shared in articles, blog posts, and presentations, and to see embedded visualizations with real-time data in your portals and operations centers!</p>
    <div>
      <h2>Still want to use the API? No problem.</h2>
      <a href="#still-want-to-use-the-api-no-problem">
        
      </a>
    </div>
    <p>Although Data Explorer was designed to simplify the process of building, and viewing the results of, more complex API queries, we recognize that some users may still want to retrieve data directly from the API. To enable that, Data Explorer’s <b>API</b> section provides copyable API calls as a direct request URL and a <a href="https://curl.se"><u>cURL</u></a> command. The raw data returned by the query is also available to copy or download as a JSON blob, for those users that want to save it locally, or paste it into another application for additional manipulation or analysis.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W3Zqrpfdtb0BgTnyV0bhu/e65e49260a67d0460b3e6e5d41fb7ae7/image6.png" />
          </figure><h2>How we built the AI Assistant</h2><p>Knowing all that AI is capable of these days, we thought that creating a system for an <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-large-language-model/"><u>LLM</u></a> to answer questions didn’t seem like an overly complex task. While there were some challenges, Cloudflare’s developer platform tools thankfully made it fairly straightforward. </p>
    <div>
      <h3>LLM-assisted API querying</h3>
      <a href="#llm-assisted-api-querying">
        
      </a>
    </div>
    <p>The main challenge we encountered in building the API Assistant was the large number of combinations of datasets and parameters that can potentially be visualized in the Data Explorer. There are around 100 <a href="https://developers.cloudflare.com/radar/"><u>API endpoints</u></a> from which the data can be fetched, with most able to take multiple parameters.</p><p>There were a few potential approaches to getting started. One was to take a previously trained LLM and further train it with the API endpoint descriptions in order to have it return the output in the required structured format which would then be used to execute the API query. However, for the first version, we decided against this approach of <a href="https://developers.cloudflare.com/workers-ai/fine-tunes/"><u>fine-tuning</u></a>, as we wanted to quickly test a few different models supported by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, and we wanted the flexibility to easily add or remove parameter combinations, as Data Explorer development was still under way. As such, we decided to start with prompt engineering, where all the endpoint-specific information is placed in the instructions sent to the LLM.</p><p>Putting the full detailed description of the API endpoints supported by the Data Explorer into the system prompt would be possible for an LLM with a larger context window (the number of tokens the model takes as input before generating output). Newer models are getting better with the <a href="https://github.com/gkamradt/LLMTest_NeedleInAHaystack"><u>needle in a haystack problem</u></a>, which refers to the issue whereby LLMs do not retrieve information (the needle) equally well if it is placed in different positions within the long textual input (the haystack). However, <a href="https://cs.stanford.edu/~nfliu/papers/lost-in-the-middle.arxiv2023.pdf"><u>it has been empirically shown</u></a> that the position of information within the large context still matters. Additionally, many of the Radar API endpoints have quite similar descriptions, and putting all the descriptions in a single instruction could be more confusing for the model, and the processing time also increases with larger contexts. Based on this, we adopted the approach of having multiple inference calls to an LLM.</p><p>First, when the user enters a question, a <a href="https://workers.cloudflare.com/"><u>Worker</u></a> sends this question and a short general description of the available datasets to the LLM, asking it to determine the topic of the question. Then, based on the topic returned by the model, a system prompt is generated with the endpoint descriptions, including only those related to the topic. This prompt, along with the original question, is sent to the LLM asking it to select the appropriate endpoint and its specific parameters. At the same time, two parallel inference calls to the model are also made, one with the question and the system prompt related to the description of location parameters, and another with the description of time range parameters. Then, all three model outputs are put together and validated.</p><p>If the final output is a valid dataset and parameter combination, it is sent back to the Data Explorer, which executes the API query and displays the resulting visualization for the user. Different LLMs were tested for this task, and at the end, <a href="https://developers.cloudflare.com/workers-ai/models/openhermes-2.5-mistral-7b-awq/"><u>openhermes-2.5-mistral-7b</u></a>, trained on code datasets, was selected as the best option. To give the model more context, not only is the user’s current question sent to the model, but the previous one and its response are as well, in case the next question asked by the user is related to the previous one. In addition, calls to the model are sent through Cloudflare’s <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, to allow for caching, rate limiting, and logging.</p><p>After the user is shown the result, they can indicate whether what was shown to them was useful or not by clicking the “thumbs up” or “thumbs down” icons in the response. This rating information is saved with the original question in <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, our <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database</a>, so the results can be analyzed and applied to future AI Assistant improvements.</p><p>The full end-to-end data flow for the Cloudflare Radar AI Assistant is illustrated in the diagram below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EMv28isng00dvxUwmVKWE/958791d319985a3441cbce7234fa1588/image1.png" />
          </figure>
    <div>
      <h3>When the LLM doesn’t know the answer</h3>
      <a href="#when-the-llm-doesnt-know-the-answer">
        
      </a>
    </div>
    <p>In some cases, however, the LLM may not “know” the answer to the question posed by the user. If the model does not generate a valid final response, then the user is shown three alternative questions. The intent here is to guide the user into asking an answerable question — that is, a question that is answerable with data from Radar.</p><p>This is achieved using a previously compiled (static) list of various questions related to different Radar datasets. For each of these questions, their <a href="https://www.cloudflare.com/en-gb/learning/ai/what-are-embeddings/"><u>embedding</u></a> is calculated using an <a href="https://developers.cloudflare.com/workers-ai/models/bge-small-en-v1.5"><u>embeddings model</u></a>, and stored in our <a href="https://developers.cloudflare.com/vectorize/"><u>Vectorize</u></a> <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-vector-database/"><u>vector database</u></a>. “Embeddings” are  numerical representations of textual data (vectors) capturing their semantic meaning and relationships, with similar text having vectors that are closer. When a user’s question does not generate a valid model response, the embedding of that question is calculated, and its vector is compared against all the stored vectors from the vector database, and the three most similar ones are selected. These three questions, determined to be similar to the user's original question, are then shown to the user.</p><p>There are also cases when the LLM gives answers which do not correspond to what the user asked, as hallucinations <a href="https://arxiv.org/pdf/2401.11817"><u>are currently inevitable</u></a> in LLMs, or when time durations are calculated inaccurately, as LLMs sometimes struggle with mathematical calculations. To help guard against this, AI Assistant responses are first validated against the API schema to confirm that the dataset and the parameter combination is valid. Additionally, Data Explorer dropdown options are automatically populated based on the AI Assistant’s response, and the chart titles are also automatically generated, so the user always knows exactly what data is shown in the visualization, even if it might not answer their actual question. </p>
    <div>
      <h2>Looking ahead</h2>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>We’re excited to enable more granular access to the rich datasets that currently power Cloudflare Radar. As we add new datasets in the future, such as DNS metrics, these will be available through Data Explorer and AI Assistant as well.</p><p>As noted above, Radar offers a predefined set of visualizations, and these serve as an excellent starting point for further exploration. We are adding links from each Radar visualization into Data Explorer, enabling users to further analyze the associated data to answer more specific questions. Clicking the “pie chart” icon next to a graph’s description brings up a Data Explorer page with the relevant metrics, options, and filters selected.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O1sG7QnjASEX81lu6ooBy/d81664234dfc8024121eedba75aaef6d/image5.png" />
          </figure><p>Correlating observations across two different metrics is another capability that we are also working on adding to Data Explorer. For example, if you are investigating an Internet disruption, you will be able to plot traffic trends and announced IP address space for a given country or autonomous system on the same graph to determine if both dropped concurrently.</p><p>But for now, use the Data Explorer and AI Assistant to go beyond what Cloudflare Radar offers, finding answers to your questions about what’s happening on the Internet.  If you share Data Explorer visualizations on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). You can also reach out on social media, or contact us via email, with suggestions for future Data Explorer and AI Assistant functionality.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LCKQEfkvBhOQFugqOGhy2/239db21c6fc18a830b8643171534372f/image4.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4R2kUv9mZSgnAXmKOKTbLz</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the Harris-Trump US presidential debate influenced Internet traffic]]></title>
            <link>https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic/</link>
            <pubDate>Wed, 11 Sep 2024 16:00:00 GMT</pubDate>
            <description><![CDATA[ See how the first 2024 US presidential debate between Kamala Harris and Donald Trump influenced Internet traffic patterns compared to the Biden-Trump debate. We also review email trends and observed attack activity. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Much has changed in the 2024 <a href="https://en.wikipedia.org/wiki/2024_United_States_presidential_election"><u>United States presidential election</u></a> since the June 27 debate between Donald Trump and Joe Biden, then the presumptive nominees for the November election. Now, over two months later, on September 10, the debate was between Kamala Harris, the Democratic nominee, and Donald Trump, the Republican nominee. In this post, we will explore the event's impact on Internet traffic in specific states where there was a bigger impact than during the Biden-Trump debate, as well as examine cyberattacks, email phishing trends, and general DNS data on candidates, news, and election-related activity.</p><p>We’ve been tracking the 2024 elections globally through our <a href="https://blog.cloudflare.com/tag/election-security/"><u>blog</u></a> and <a href="https://radar.cloudflare.com/reports/elections-2024"><u>election report on Cloudflare Radar</u></a>, covering some of the more than 60 national elections this year. Regarding the US elections, we have previously reported on trends surrounding the first <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>Biden vs. Trump debate</u></a>, the <a href="https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention"><u>attempted assassination of Trump, the Republican National Convention</u></a>, and the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention"><u>Democratic National Convention</u></a>.</p><p>Typically, we have observed that election days don’t come with significant changes to Internet traffic, and the same is true for debates. Yet, debates can also draw attention that impacts traffic, especially when there is heightened anticipation. The 2024 debates were not only aired on broadcast and cable television, but also streamed on platforms like YouTube, increasing their reach and impact.</p><p>Key takeaways:</p><ul><li><p>The September 10 Harris-Trump debate caused bigger drops in Internet traffic in the US than the Biden-Trump debate on June 27. </p></li><li><p>There was also a noticeable increase in DNS traffic to both Kamala Harris-related and Donald Trump-related domains, with Trump-related DNS traffic peaking around the start of the debate and Harris-related DNS traffic peaking after the debate ended, around the time Taylor Swift announced she was endorsing Harris.</p></li><li><p>We also observed increases in DNS traffic to US news media outlets and election-related domains right after the debate ended.</p></li><li><p>Donald Trump remains the candidate with the most mentions in email subjects and the highest percentages of emails classified as spam (26.7%) and malicious (2.4%). Since mid-August, there has been a slight increase in the percentage of spam and malicious emails mentioning Kamala Harris.</p></li></ul>
    <div>
      <h3>Traffic drop in the US</h3>
      <a href="#traffic-drop-in-the-us">
        
      </a>
    </div>
    <p>During the September 10, 2024, debate between Harris and Trump, hosted by ABC News at 21:00 EST (01:00 UTC) in Philadelphia, Pennsylvania, Cloudflare noted a trend similar to the Biden-Trump debate, with a clear drop in nationwide Internet requests, falling as much as 9% below the same time a week prior at 21:15 EST (01:15 UTC). At the end of the debate, around 22:45 EST (02:45 UTC), the drop was less evident, at just 2%. Traffic increased slightly just after the debate.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NDKkH19A2c1dCtYbOftPI/c0d484d1b0282421a08fa54412da8266/image4.png" />
          </figure><p><sub><i>Note: there were two four-minute breaks during the debate, at around 22:00 and 22:30, and our data here has 15-minute granularity.</i></sub></p><p>There’s a clear difference between this second debate, with a drop of up to 9%, and the first one between Biden and Trump on June 27, when the traffic dropped just 2% below the same time a week prior. Interestingly, the biggest drop occurred at the same time in both debates, right after they started, at 21:15 EST (01:15 UTC).</p>
    <div>
      <h3>Internet traffic dips across US states</h3>
      <a href="#internet-traffic-dips-across-us-states">
        
      </a>
    </div>
    <p>Traffic shifts at the time of the debate, as compared to the previous week, can reveal more detail at a state-level perspective than at the country level. The map below summarizes traffic changes observed at a state level. A key observation is that traffic declines at a state level were much more pronounced during the Harris-Trump debate, than during the <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends/"><u>Biden-Trump debate</u></a> in late June.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TgbUaEpFzqZk0wvhmK4BO/62ba75f9c5be76b83dabd05e1cad95af/image14.png" />
          </figure><p><sub><i>(Source: Cloudflare; created with Datawrapper)</i></sub></p><p>The most significant traffic drops were observed in Vermont (-25%), Montana (-22%), and Idaho (-19%). More populous states such as California (-11%), Texas (-10%), and New York (-14%) also experienced notable declines in traffic.</p><p>Just for comparison, here’s the state map from that June 27 Biden-Trump debate:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pVGpCCKOLSP4pwO5GQiSD/a5ccad9f394ecfcdc09a7b0633e8e7ac/image5.png" />
          </figure><p><sub><i>(Source: Cloudflare; created with Datawrapper)</i></sub></p><p>The initial minutes of the Harris-Trump debate triggered the largest traffic declines in most states, at least up until the first break, at around 21:30 ET (01:30 UTC).</p><p>In the next table, we provide a detailed breakdown of the same perspective shown on the US map ordered by the magnitude of the drop in traffic. We include the time of the biggest traffic drop compared to the previous week, at a 5-minute granularity, and also the percentage of the drop compared to the previous week. As noted above, the largest declines appeared to occur earlier in the debate.</p><table><tr><td><p><b>State</b></p></td><td><p><b>Drop in traffic (%)</b></p></td><td><p><b>Local Time</b></p></td><td><p><b>UTC</b></p></td></tr><tr><td><p>Vermont</p></td><td><p>-25%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Montana</p></td><td><p>-22%</p></td><td><p>19:10 MDT</p></td><td><p>1:10</p></td></tr><tr><td><p>Idaho</p></td><td><p>-19%</p></td><td><p>19:10 MDT</p></td><td><p>1:10</p></td></tr><tr><td><p>Wyoming</p></td><td><p>-19%</p></td><td><p>19:15 MDT</p></td><td><p>1:15</p></td></tr><tr><td><p>North Dakota</p></td><td><p>-18%</p></td><td><p>20:15 CDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Delaware</p></td><td><p>-15%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Illinois</p></td><td><p>-15%</p></td><td><p>20:20 CDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Mississippi</p></td><td><p>-14%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>New York</p></td><td><p>-14%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Rhode Island</p></td><td><p>-14%</p></td><td><p>21:45 EDT</p></td><td><p>1:45</p></td></tr><tr><td><p>West Virginia</p></td><td><p>-14%</p></td><td><p>21:15 EDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Alabama</p></td><td><p>-13%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Georgia</p></td><td><p>-13%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>South Carolina</p></td><td><p>-13%</p></td><td><p>21:15 EDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Virginia</p></td><td><p>-13%</p></td><td><p>21:15 EDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Colorado</p></td><td><p>-12%</p></td><td><p>19:45 MDT</p></td><td><p>1:45</p></td></tr><tr><td><p>Connecticut</p></td><td><p>-12%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Nevada</p></td><td><p>-12%</p></td><td><p>18:20 PDT</p></td><td><p>1:20</p></td></tr><tr><td><p>New Jersey</p></td><td><p>-12%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Alaska</p></td><td><p>-11%</p></td><td><p>17:15 AKDT</p></td><td><p>1:15</p></td></tr><tr><td><p>California</p></td><td><p>-11%</p></td><td><p>18:15 PDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Florida</p></td><td><p>-11%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>North Carolina</p></td><td><p>-11%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Wisconsin</p></td><td><p>-11%</p></td><td><p>20:20 CDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Arkansas</p></td><td><p>-10%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>District of Columbia</p></td><td><p>-10%</p></td><td><p>21:55 EDT</p></td><td><p>1:55</p></td></tr><tr><td><p>Missouri</p></td><td><p>-10%</p></td><td><p>20:25 CDT</p></td><td><p>1:25</p></td></tr><tr><td><p>Oregon</p></td><td><p>-10%</p></td><td><p>18:40 PDT</p></td><td><p>1:40</p></td></tr><tr><td><p>Pennsylvania</p></td><td><p>-10%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>South Dakota</p></td><td><p>-10%</p></td><td><p>20:20 CDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Texas</p></td><td><p>-10%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Maryland</p></td><td><p>-9%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Massachusetts</p></td><td><p>-9%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>New Hampshire</p></td><td><p>-9%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Oklahoma</p></td><td><p>-9%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Arizona</p></td><td><p>-8%</p></td><td><p>18:15 MST</p></td><td><p>1:15</p></td></tr><tr><td><p>Indiana</p></td><td><p>-8%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Iowa</p></td><td><p>-8%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Kentucky</p></td><td><p>-8%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Maine</p></td><td><p>-8%</p></td><td><p>21:15 EDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Nebraska</p></td><td><p>-8%</p></td><td><p>19:45 MDT</p></td><td><p>1:45</p></td></tr><tr><td><p>Kansas</p></td><td><p>-7%</p></td><td><p>20:25 CDT</p></td><td><p>1:25</p></td></tr><tr><td><p>Louisiana</p></td><td><p>-7%</p></td><td><p>20:20 CDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Michigan</p></td><td><p>-7%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Minnesota</p></td><td><p>-7%</p></td><td><p>20:30 CDT</p></td><td><p>1:30</p></td></tr><tr><td><p>New Mexico</p></td><td><p>-7%</p></td><td><p>19:25 MDT</p></td><td><p>1:25</p></td></tr><tr><td><p>Washington</p></td><td><p>-7%</p></td><td><p>18:05 PDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Hawaii</p></td><td><p>-6%</p></td><td><p>15:20 HST</p></td><td><p>1:20</p></td></tr><tr><td><p>Ohio</p></td><td><p>-6%</p></td><td><p>21:15 EDT</p></td><td><p>1:15</p></td></tr><tr><td><p>Tennessee</p></td><td><p>-6%</p></td><td><p>20:05 CDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Utah</p></td><td><p>-6%</p></td><td><p>19:10 MDT</p></td><td><p>1:10</p></td></tr></table>
    <div>
      <h3>Swing state drops in traffic higher than first debate</h3>
      <a href="#swing-state-drops-in-traffic-higher-than-first-debate">
        
      </a>
    </div>
    <p>The seven swing states that are <a href="https://www.bbc.com/news/articles/c511pyn3xw3o"><u>said</u></a> to be decisive in the election — Arizona, Georgia, Michigan, Nevada, North Carolina, Pennsylvania, and Wisconsin — each saw traffic drop between 8% and 13%, which is more than during the Biden-Trump debate (between 5% and 8% at that time). Here’s a more focused view of those swing states for easier visualization:</p><table><tr><td><p><b>State</b></p></td><td><p><b>Drop in traffic</b></p></td><td><p><b>Local Time</b></p></td><td><p><b>UTC</b></p></td></tr><tr><td><p>Arizona</p></td><td><p>-8%</p></td><td><p>18:15 MST</p></td><td><p>1:15</p></td></tr><tr><td><p>Georgia</p></td><td><p>-13%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Michigan</p></td><td><p>-7%</p></td><td><p>21:20 EDT</p></td><td><p>1:20</p></td></tr><tr><td><p>Nevada</p></td><td><p>-12%</p></td><td><p>18:20 PDT</p></td><td><p>1:20</p></td></tr><tr><td><p>North Carolina</p></td><td><p>-11%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Pennsylvania</p></td><td><p>-10%</p></td><td><p>21:05 EDT</p></td><td><p>1:05</p></td></tr><tr><td><p>Wisconsin</p></td><td><p>-11%</p></td><td><p>20:20 CDT</p></td><td><p>1:20</p></td></tr></table>
    <div>
      <h3>DNS trends </h3>
      <a href="#dns-trends">
        
      </a>
    </div>
    <p>Shifting our attention to domain trends, our <a href="http://1.1.1.1/"><u>1.1.1.1</u></a> resolver data highlights a more targeted impact during and around the debate. Let’s start with Kamala Harris-related insights. </p>
    <div>
      <h3>Harris and the Taylor Swift effect</h3>
      <a href="#harris-and-the-taylor-swift-effect">
        
      </a>
    </div>
    <p>Since July 21, the date of Biden’s withdrawal and endorsement of Harris, daily DNS traffic to Harris-related domains has significantly increased, with notable peaks on August 30 (the day after the <a href="https://apnews.com/article/election-2024-harris-walz-interview-94eff1aa1247e471b48948d03faf0edf"><u>Harris-Walz interview</u></a> on CNN) and September 10 (the debate with Trump).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qhBs6j0q5reKqxDE0v7lW/0794a2c2dfe2e0200ac8ecc48beed645/image10.png" />
          </figure><p>From an hourly perspective, the impact of the debate on Kamala Harris-related sites is evident, with increased DNS traffic throughout the day (September 10). The peak occurred at the debate's start (21:00 ET / 01:00 UTC) with a 54% increase from the previous week, and again after it ended (23:00 ET / 03:00 UTC) with a 56% rise. This spike coincided with <a href="https://apnews.com/article/taylor-swift-endorse-kamala-harris-president-3a36b6f9695c20153891bba35c47f21d"><u>Taylor Swift's endorsement</u></a> of Kamala Harris.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70eWvFzEhszKMGxiIGvOBk/d8962d39ca382dae1dbace7d0bf0c62a/image8.png" />
          </figure>
    <div>
      <h3>Trump and the Elon Musk interview effect</h3>
      <a href="#trump-and-the-elon-musk-interview-effect">
        
      </a>
    </div>
    <p>Donald Trump, having a longer-standing campaign and websites compared to Kamala Harris, shows different trends. Aggregated daily DNS traffic to Trump-related domains has also increased in recent months. Significant peaks were observed on July 15 (two days after the <a href="https://en.wikipedia.org/wiki/Attempted_assassination_of_Donald_Trump"><u>assassination attempt</u></a>), then during the Republican National Convention (July 15-18), with the highest spike occurring on August 12, following <a href="https://apnews.com/article/election-2024-musk-trump-x-interview-troubles-51dfc560065aae825e6bb3f826090e4b"><u>Elon Musk's interview with Trump</u></a> on X.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Pgktdcz88MpeYZBhEYUGD/3cb64ced3ae25cb8c2312e256dd79b8f/image13.png" />
          </figure><p>Hourly data shows the debate’s impact on Trump-related sites with a noticeable increase around the debate's start (21:00 ET / 01:00 UTC), where DNS traffic was 46% higher than the previous week. This elevated traffic continued for a few hours, after the debate ended.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PDl4esHVZiIHy8MqWomSs/34be82e03090374cd9e9ee1d5a7fb847/image2.png" />
          </figure>
    <div>
      <h3>From news to election-related sites</h3>
      <a href="#from-news-to-election-related-sites">
        
      </a>
    </div>
    <p>Like previous US election-related events, the debate generated significant interest in US news organizations, leading to a rise in aggregated DNS traffic to general US news sites. This increase peaked during the debate at 22:00 ET (02:00 UTC), with DNS traffic 62% higher than the previous week. The elevated DNS traffic began before the debate and persisted afterward, with a 19% increase at 20:00 ET (00:00 UTC) and a 25% increase at 00:00 ET (04:00 UTC).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/twSabxoeykuYTwP0DMy15/bf7fb140c49bc2763d264e6a45d2b621/image8.png" />
          </figure><p>Microblogging social platforms like X or Threads outperformed their previous week’s traffic throughout the debate, peaking at 16% growth around 22:00 ET (02:00 UTC).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56cI0x0BeWHxkTpUUk7Rmv/f9432ba3d426a85c31481c5b6413b111/image3.png" />
          </figure><p>Additionally, there was a notable increase in DNS traffic to election-related websites, including official voting registration and election sites. During the morning of September 10 in the US, DNS traffic was 38% higher at 10:00 ET (14:00 UTC), with a significant spike at 23:00 ET (03:00 UTC) right after the debate, where DNS traffic surged by 76% compared to the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QYWSH3R9rLe5hSmMV5Yme/525bf9f247bb59b4567ce04dd7e8d235/image1.png" />
          </figure>
    <div>
      <h3>Harris-Trump: spam and malicious emails</h3>
      <a href="#harris-trump-spam-and-malicious-emails">
        
      </a>
    </div>
    <p>From a cybersecurity perspective, trending <a href="https://blog.cloudflare.com/paris-2024-olympics-recap"><u>events</u></a>, topics, and individuals often attract more emails, including malicious, phishing, and spam messages. Our <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>earlier</u></a> analysis covered email trends involving “Joe Biden” and “Donald Trump” since January. We’ve since updated it to include Kamala Harris after the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic Convention</u></a>.</p><p>From June 1, 2024, through August 21, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare’s Cloud Email Security</u></a> service processed over 16 million emails that included the names “Donald Trump”, “Joe Biden”, or “Kamala Harris” in the subject, with 8.7 million referencing Trump, 4.8 million referencing Biden, and 3 million referencing Harris.</p><p>The chart below highlights a surge in emails mentioning Trump in mid-July, contrasting with a drop in the number of emails mentioning Biden in the subject and an increase in emails mentioning Harris.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fSM04F2UGXsJLxOHvyFAT/12b6721a4a477dd6aca524c109dbdffa/image15.png" />
          </figure><p>Since July 21, following changes in the presumptive Democratic candidate, over 4.5 million emails mentioned “Donald Trump,” over 1.5 million mentioned “Joe Biden,” and around 2.8 million mentioned “Kamala Harris” in the subject. Of these, 26.7% of emails with Trump’s name were classified as spam, and 2.4% were classified as malicious. For Kamala Harris, 1.1% were classified as spam and 0.2% were classified as malicious, while Biden’s figures were 1.1% for spam and 0.1% for malicious.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SNRLMGgWnOEDRWR21H2rY/750a024abee2a5729c93f1c615f99b73/image7.png" />
          </figure><p>Since mid-August, there has been a slight increase in the percentage of spam and malicious emails mentioning Kamala Harris. Trump remains the candidate with the most mentions in email subjects and the highest percentages of emails classified as spam and malicious.</p>
    <div>
      <h3>September attacks on political and news sites</h3>
      <a href="#september-attacks-on-political-and-news-sites">
        
      </a>
    </div>
    <p>In our blog posts about several of the <a href="https://blog.cloudflare.com/tag/election-security/"><u>2024 elections</u></a>, we have noted that attacks on politically-related websites have remained a significant threat this year. In Europe, we’ve seen political parties and associated websites targeted around <a href="https://blog.cloudflare.com/tag/election-security"><u>elections</u></a>. We previously reported on DDoS attacks around the <a href="https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention"><u>Republican National Convention</u></a> and <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic National Convention</u></a>.</p><p>In our post about the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic National Convention</u></a>, we showed that during late July and August, Cloudflare blocked DDoS attacks targeting three US politically related organizations, including a site associated with one of the major parties, with attacks occurring just before the Democratic Convention.</p><p>The largest DDoS attack recorded in recent days against politically-related websites targeted specifically a US political-party related website on September 4, peaking at 140,000 requests per second (rps) and lasting about 5 minutes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/662RaTxgugevr87EQBR54p/8a6baa2578ca39a0a3ff8af6c4e4790e/image9.png" />
          </figure><p>But it’s not only US politically-related websites that could be the target of cyber attacks. News organizations are often attacked during relevant events, as we saw during the first year of the <a href="https://blog.cloudflare.com/one-year-of-war-in-ukraine/"><u>war in Ukraine</u></a>, for example. Already in September, we’ve seen an example of a relevant US news organization that covers politics being the target of a DDoS attack on September 3, peaking at 343,000 requests per second (rps) and lasting about 5 minutes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1viftsC3HgJEtchwUwZNqg/ac6e4290a4c5753a25b9d161bd29be38/image12.png" />
          </figure><p>As highlighted in our <a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q2"><u>Q2 DDoS report</u></a>, most DDoS attacks are short-lived, as exemplified by the two mentioned attacks. Also, 81% of HTTP DDoS attacks peak at under 50,000 requests per second (rps), and only 7% reach between 100,000 and 250,000 rps. While a 140,000 rps attack might seem minor to Cloudflare, it can be devastating for websites not equipped to handle such high levels of traffic.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>In this analysis of the Harris-Trump debate, we’ve observed that the September 10 debate caused bigger drops in traffic in the US than the Biden-Trump debate in late June. There was also a noticeable increase in DNS traffic to both Kamala Harris-related and Donald Trump-related domains, as well as to US news media outlets and election-related domains — in this case, right after the debate ended.</p><p>If you’re interested in more trends and insights about the Internet and elections, check out <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>, specifically our <a href="https://radar.cloudflare.com/reports/elections-2024"><u>2024 Elections Insights</u></a> report. It will be updated throughout the year as elections (or election-related events) occur.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[USA]]></category>
            <guid isPermaLink="false">4NI7PBab9zePZzucqLYhPh</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exploring the 2024 EU Election: Internet traffic trends and cybersecurity insights]]></title>
            <link>https://blog.cloudflare.com/exploring-the-2024-eu-election-internet-traffic-trends-and-cybersecurity-insights/</link>
            <pubDate>Mon, 10 Jun 2024 15:27:43 GMT</pubDate>
            <description><![CDATA[ The 2024 EU Parliament election caused declines in Internet traffic during voting and spikes during results announcements, with persistent cyber threats targeting government sites ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The <a href="https://en.wikipedia.org/wiki/2024_European_Parliament_election">2024 European Parliament</a> election took place June 6-9, 2024, with hundreds of millions of Europeans from the 27 countries of the European Union electing 720 members of the European Parliament. This was the first election after Brexit and without the UK, and it had an impact on the Internet. In this post, we will review some of the Internet traffic trends observed during the election days, as well as providing insight into cyberattack activity.</p><p>Elections matter, and as we have mentioned before (<a href="/protecting-global-democracy-against-threats-from-emerging-technology">1</a>, <a href="/internet-insights-on-2024-elections-in-the-netherlands-south-africa-iceland-india-and-mexico">2</a>), 2024 is considered “the year of elections”, with voters going to the polls in at least 60 countries, as well as the 27 EU member states. That’s why we’re publishing a regularly updated <a href="https://radar.cloudflare.com/reports/elections-2024">election report</a> on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>. We’ve already included <a href="/internet-insights-on-2024-elections-in-the-netherlands-south-africa-iceland-india-and-mexico">our analysis</a> of recent elections in South Africa, India, Iceland, and Mexico, and provided a <a href="/eu-elections-2024">policy view</a> on the EU elections.</p><p>The European Parliament election coincided with several other national or local elections in European Union member states, leading to direct consequences. For example, in Belgium, the prime minister announced his resignation, resulting in a drop in Internet traffic during the speech followed by a clear increase after the speech was over. In France, we saw a similar pattern with the announcement of legislative snap elections.</p><p>From analyzing patterns seen during previous elections in <a href="/elections-france-2022/">France</a> and <a href="/how-the-brazilian-presidential-elections-affected-internet-traffic/">Brazil</a>, we know that Internet traffic often decreases during voting hours, though not as significantly as during other major events like national holidays. This usual drop is typically followed by an increase in traffic as election results are announced.</p><p>Let’s start with a wider picture of the 2024 European Parliament election, focusing on the time of the biggest drop in Internet HTTP requests during the election days as compared to the previous week. Note that there were some national or local elections taking place at the same time, and European Union elections are known to have low turnout compared to national and local ones.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZDlXZaoLvNoLBfYsY03FR/9c57a6fb82df0a64b20feeaf5acb8082/image14-1.png" />
            
            </figure><p><i>Source: Cloudflare; created with Datawrapper</i></p><p>Drops greater than 10% were observed only in the Czech Republic, Luxembourg, Slovakia, Cyprus, Belgium, Estonia, and Croatia. The table below includes the percentage that traffic dropped and the specific time during the election day it occurred. In countries with more than one election day, we considered the time and day of the biggest drop.</p>
<table><thead>
  <tr>
    <th><span>Countries</span></th>
    <th><span>Elections day(s)</span></th>
    <th><span>Local time</span></th>
    <th><span>Drop in traffic %</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Czech Republic</span></td>
    <td><span>June 7 - 8</span></td>
    <td><span>June 8, 14:30</span></td>
    <td><span>-20%</span></td>
  </tr>
  <tr>
    <td><span>Luxembourg</span></td>
    <td><span>June 9</span></td>
    <td><span>12:45</span></td>
    <td><span>-18%</span></td>
  </tr>
  <tr>
    <td><span>Slovakia</span></td>
    <td><span>June 8</span></td>
    <td><span>15:45; 19:00</span></td>
    <td><span>-16%</span></td>
  </tr>
  <tr>
    <td><span>Cyprus</span></td>
    <td><span>June 9</span></td>
    <td><span>10:00</span></td>
    <td><span>-16%</span></td>
  </tr>
  <tr>
    <td><span>Belgium</span></td>
    <td><span>June 9</span></td>
    <td><span>11:45</span></td>
    <td><span>-14%</span></td>
  </tr>
  <tr>
    <td><span>Estonia</span></td>
    <td><span>June 7-9</span></td>
    <td><span>June 9, 9:00</span></td>
    <td><span>-13%</span></td>
  </tr>
  <tr>
    <td><span>Croatia</span></td>
    <td><span>June 9</span></td>
    <td><span>18:00</span></td>
    <td><span>-12%</span></td>
  </tr>
  <tr>
    <td><span>Poland</span></td>
    <td><span>June 9</span></td>
    <td><span>18:00</span></td>
    <td><span>-10%</span></td>
  </tr>
  <tr>
    <td><span>Netherlands</span></td>
    <td><span>June 6</span></td>
    <td><span>10:15</span></td>
    <td><span>-10%</span></td>
  </tr>
  <tr>
    <td><span>Germany</span></td>
    <td><span>June 9</span></td>
    <td><span>13:45</span></td>
    <td><span>-10%</span></td>
  </tr>
  <tr>
    <td><span>Ireland</span></td>
    <td><span>June 7</span></td>
    <td><span>7:15</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Finland</span></td>
    <td><span>June 9</span></td>
    <td><span>9:00</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Portugal</span></td>
    <td><span>June 9</span></td>
    <td><span>15:45</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Malta</span></td>
    <td><span>June 8</span></td>
    <td><span>12:15</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Latvia</span></td>
    <td><span>June 8</span></td>
    <td><span>08:30, 16:15</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Slovenia</span></td>
    <td><span>June 9</span></td>
    <td><span>18:00</span></td>
    <td><span>-8%</span></td>
  </tr>
  <tr>
    <td><span>Hungary</span></td>
    <td><span>June 9</span></td>
    <td><span>6:00</span></td>
    <td><span>-8%</span></td>
  </tr>
  <tr>
    <td><span>Austria</span></td>
    <td><span>June 9</span></td>
    <td><span>12:30</span></td>
    <td><span>-7%</span></td>
  </tr>
  <tr>
    <td><span>Italy</span></td>
    <td><span>June 8 - 9</span></td>
    <td><span>June 9, 16:00</span></td>
    <td><span>-6%</span></td>
  </tr>
  <tr>
    <td><span>France</span></td>
    <td><span>June 9</span></td>
    <td><span>13:30</span></td>
    <td><span>-6%</span></td>
  </tr>
  <tr>
    <td><span>Bulgaria</span></td>
    <td><span>June 9</span></td>
    <td><span>19:45</span></td>
    <td><span>-5%</span></td>
  </tr>
  <tr>
    <td><span>Greece</span></td>
    <td><span>June 9</span></td>
    <td><span>8:00</span></td>
    <td><span>-5%</span></td>
  </tr>
  <tr>
    <td><span>Spain</span></td>
    <td><span>June 9</span></td>
    <td><span>13:00</span></td>
    <td><span>-4%</span></td>
  </tr>
  <tr>
    <td><span>Lithuania</span></td>
    <td><span>June 9</span></td>
    <td><span>8:00</span></td>
    <td><span>-3%</span></td>
  </tr>
  <tr>
    <td><span>Romania</span></td>
    <td><span>June 9</span></td>
    <td><span>9:45</span></td>
    <td><span>-1%</span></td>
  </tr>
  <tr>
    <td><span>Denmark</span></td>
    <td><span>June 9</span></td>
    <td><span>-</span></td>
    <td><span>-</span></td>
  </tr>
  <tr>
    <td><span>Sweden</span></td>
    <td><span>June 9</span></td>
    <td><span>-</span></td>
    <td><span>-</span></td>
  </tr>
</tbody></table><p>The data in the list above shows that Central European countries had the highest drop in Internet traffic, particularly the Czech Republic and Slovakia. Eastern Europe saw significant drops in Estonia and Poland. Southern Europe had consistent moderate drops across multiple countries, with Cyprus and Croatia showing higher losses. Northern Europe showed minimal to no traffic drop in Scandinavian countries, with Finland and Ireland experiencing moderate declines.</p><p>Looking at the specific (local) times of day during voting periods on election days, morning drops (06:00 - 10:00) were more common in Northern and Eastern Europe. Late morning to early afternoon drops (10:15 - 14:30) were predominantly observed in Western and Central Europe. Late afternoon drops (15:45 - 19:45) were more common in Central and Southern Europe.</p>
    <div>
      <h3>Impact of notable announcements in Belgium and France</h3>
      <a href="#impact-of-notable-announcements-in-belgium-and-france">
        
      </a>
    </div>
    <p>There’s more to say when we look at specific country trends. The 27 members of the European Union bring diversity in habits, languages, and cultures. That also impacted traffic, and this election in particular had a national impact in some of the countries.</p><p>In Belgium, national and regional elections took place on the same day, June 9. After polling stations closed at 16:00 local time (14:00 UTC), HTTP requests followed the typical pattern of increasing, peaking at 21:15 local time (19:15 UTC), with 7% more requests than the previous week. This trend was interrupted by Prime Minister Alexander De Croo’s speech at around 22:00 local time (20:00 UTC), admitting defeat in the national elections. This pattern is typical when important announcements are broadcast on TV, impacting Internet traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nKrhOSa5oNsNh8ZwMmEqy/4b860e37ed3723ed250f1b3b02473de8/unnamed--1--1.png" />
            
            </figure><p>How about France? President Emmanuel Macron announced at around 21:00 local time (19:00 UTC) that he would dissolve the national parliament for a snap legislative election. This followed the EU elections that gave a victory to his rival Marine Le Pen’s National Rally in the European Parliament vote. At the time of his speech, requests dropped 6% compared to the previous week, and increased right after Macron’s speech, peaking at 22:15 local time (20:15 UTC) with a 6% increase.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/jRTMzGuFPp7pTql88XmmW/7a0dc1adaac42e5a4ce5599a9769e218/unnamed-1.png" />
            
            </figure>
    <div>
      <h3>After voting ends, traffic increases</h3>
      <a href="#after-voting-ends-traffic-increases">
        
      </a>
    </div>
    <p>It was not only Belgium and France that had typical increases in HTTP requests at night when the first projections and results started to be announced. The same happened in the Netherlands, the first European country to enter the 2024 European Parliament election, on Thursday, June 6.— We have previously written about <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">Dutch political websites being attacked</a> on that day. Traffic was 4% higher than usual after 20:30 local time (18:30 UTC), and peaked at 01:15 with a 15% increase compared to the previous week.</p><p>Similar trends were seen in Italy on June 9, and in Germany on the same day. In Germany, at 21:45 (19:45 UTC), requests were already 8% higher, with a 23:00 (21:00 UTC) drop of 2% during election speeches, and a peak at 00:30 (22:30 UTC) with an 18% increase.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2JhoxbKgBN8NXp58s24fzo/e6a92b04cfb55e355ce0337ff6cc9ecb/unnamed--2--1.png" />
            
            </figure><p>The same night-time trends were observed in other countries:</p><ul><li><p>Slovakia had a peak increase of 24% at 23:45 local time (21:45 UTC) on June 8.</p></li><li><p>Spain saw a 21% peak increase at 21:00 local time (19:00 UTC) on June 9.</p></li><li><p>Poland had a 9% peak increase at 01:45 local time (23:45 UTC).</p></li><li><p>Portugal experienced a 29% peak increase at 00:15 local time (23:15 UTC).</p></li><li><p>Croatia had a 19% peak increase at 23:00 (21:00 UTC).</p></li><li><p>Slovenia had a 19% peak increase at 22:45 (20:45 UTC).</p></li><li><p>Lithuania had a 22% peak increase at 23:00 (20:00 UTC).</p></li><li><p>Estonia saw the highest peak increase, reaching 35% at 00:00 (21:00 UTC).</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YZHTfFuCqdYESKZizCexA/5f29d10006bbbd37b9fc7ec0de9bf597/unnamed--3--1.png" />
            
            </figure>
    <div>
      <h3>Growing interest in election information and news</h3>
      <a href="#growing-interest-in-election-information-and-news">
        
      </a>
    </div>
    <p>Switching to domain trends, DNS traffic (using our <a href="http://1.1.1.1/">1.1.1.1</a> resolver) shows a more specific impact related to elections. Social media platforms invited users in Europe to vote, sometimes giving European or local websites as a reference. Here’s an example from Instagram:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tdJlkW3c90zWFKqU2sFiq/058939a36eaeefbfe5c87263cdf57333/Screenshot-2024-06-10-at-16.20.26-1.png" />
            
            </figure><p>Did this increase traffic to election-related sites in the <a href="https://elections.europa.eu/">European Union</a>? Our DNS data shows a 26x peak growth at 19:00 UTC on Sunday, June 9, 2024. DNS traffic was already much higher compared to the previous week on June 8, with a peak growth of 8x at 17:00 UTC.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ggrcLee8fWYuaR9nDqL00/60c2457e02f72fdc1180ac427ec3cedd/unnamed--4-.png" />
            
            </figure><p>Looking at European news outlets’ domains, there was an initial 1.68x increase (compared to the previous week) at 13:00 UTC on June 9, 2024, and a second peak at 19:00 UTC.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/114WK6ZrC4uNwQYc4VhCpe/1ea2a60d2120c774b15fa3fcf830a2e8/unnamed--5-.png" />
            
            </figure><p>For local election-results sites, there was a significant 55x peak growth at 22:00 UTC on June 9, 2024, compared to the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50XHlzJXipVjzhLnKZiWy1/d30e6ceace3d3718a97b5fcbb880b7b1/unnamed--6-.png" />
            
            </figure>
    <div>
      <h3>Government-focused cyberattacks</h3>
      <a href="#government-focused-cyberattacks">
        
      </a>
    </div>
    <p>Focusing on attacks, as mentioned above, we recently published a <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">blog post</a> about the cyberattack on Dutch political-related websites that lasted two days – June 5 and 6. The main DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>) attack on June 5, the day before the Dutch election, reached 73,000 requests per second (rps).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kE6ZWUQ6GzYVSTSLL6RvQ/a5a2de066ab8af32b5ecb65863588733/unnamed--7-.png" />
            
            </figure><p>Looking at government or state-related websites in the European Union in 2024, there have been several spikes in attacks targeting defense organizations, European courts, and educational institutions since the year started.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63uYWWXj6H0Vega7vQVmxq/9a5679c43493d59de84f35df5a4cf66d/unnamed.jpg" />
            
            </figure><p>The main one was on February 25, 2024, when Cloudflare blocked a DDoS attack on a French government website that reached 420 million requests per hour and lasted over three hours.</p><p>Between January and June 2024, government sites in Belgium, France, and Germany were the main targets, receiving 49%, 25%, and 10% respectively of attack requests targeting EU government-related sites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nVHudIbf3cL4wQleFWDP1/9262507f92cf16aadb8122ad3d964491/unnamed--8-.png" />
            
            </figure><p>In a broader view, from January 1 to June 9, Cloudflare mitigated 8.6 billion threats to government websites in the EU, with 68% of those being DDoS threats. This amounts to an average of 53.42 million threats mitigated per day. These trends highlight the ongoing threat to critical infrastructure across Europe, with government sites frequently targeted by cyberattacks.</p>
    <div>
      <h3>Just before the elections</h3>
      <a href="#just-before-the-elections">
        
      </a>
    </div>
    <p>Focusing on the five weeks before the EU election, we didn’t see significant attacks on European election-related organizations. However, there were a few DDoS threats that targeted government sites from European Union member states. Notable instances include attacks on the Bulgarian government on June 6, the French government on May 11 and June 9, another in France on May 23, Sweden on May 18 and April 29, and Denmark on May 7.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m400AW88G0ub5GYoR2fL2/97812afa3160f2264f79a6de45aab450/unnamed--9-.png" />
            
            </figure><p>These attacks were not very large compared to others mentioned. The largest targeted the Bulgarian government on June 6, with 122 million daily DDoS requests and a peak of 110,500 requests per second at 11:29 local time (08:29 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2llB7YxvWpEfGHWkNZcEQV/1b3d90a4b603d905bea5c3e7b2b7f9ea/unnamed--10-.png" />
            
            </figure><p>On election day in France, June 9, a French government website was also the target of a smaller attack, with 42,000 DDoS requests per second at 11:57 local time (09:57 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LId8zDZFmoY3mCyzEWcXJ/879d7eaa7ea0d4cf70e6de3dd739c8ca/unnamed--11-.png" />
            
            </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The 2024 European Parliament election had some clear impacts on Internet traffic, and cyber threats were looming in the weeks before, most notably the Dutch political-related attack around election day.</p><p>While voting led to typical drops in Internet traffic, the announcement of results and significant political events caused spikes in activity.</p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024"><i>2024 Elections Insights</i></a> report, that we’re updating as elections take place throughout the year.</p><p><i>(Jorge Pacheco contributed to the cyberattacks section of this blog post)</i></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Insights]]></category>
            <guid isPermaLink="false">5HsQvCW7mRnYmv23CIiIG4</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Internet insights on 2024 elections in the Netherlands, South Africa, Iceland, India, and Mexico]]></title>
            <link>https://blog.cloudflare.com/internet-insights-on-2024-elections-in-the-netherlands-south-africa-iceland-india-and-mexico/</link>
            <pubDate>Fri, 07 Jun 2024 20:40:57 GMT</pubDate>
            <description><![CDATA[ 2024 brings a global increase in election activity. Here, we highlight traffic and cyberattack trends witnessed in countries like the Netherlands, South Africa, Iceland, India, and Mexico. Additionally, we provide an up-to-date 2024 Election Insights report on Cloudflare Radar ]]></description>
            <content:encoded><![CDATA[ <p></p><p>2024 is being called by the <a href="https://time.com/6550920/world-elections-2024/">media</a> “the” year of elections. More voters than ever are going to the polls in at least 60 countries for national elections, plus the 27 member states of the European Union. This includes eight of the world’s 10 most populous nations, impacting around half of the world’s population.</p><p>To track and analyze these significant global events, we’ve created the <a href="https://radar.cloudflare.com/reports/elections-2024">2024 Election Insights</a> report on Cloudflare Radar, which will be regularly updated as elections take place.</p><p>Our data shows that during elections, there is often a decrease in Internet traffic during polling hours, followed by an increase as results are announced. This trend has been observed before in countries like <a href="/elections-france-2022/">France</a> and <a href="/how-the-brazilian-presidential-elections-affected-internet-traffic/">Brazil</a>, and more recently in Mexico and India — where elections were held between April 19 and June 1 in seven phases. Some regions, like <a href="https://x.com/CloudflareRadar/status/1748326986936635764">Comoros</a> and <a href="/q1-2024-internet-disruption-summary#governmentdirected">Pakistan</a>, have experienced government-directed Internet disruptions around election time.</p><p>Below, you’ll find a review of the trends we saw in elections in South Africa (May 29), to Mexico (June 2), India (April 19 - June 1) and Iceland (June 1). This includes election-related shifts in traffic, as well at attacks. For example, during the <a href="/eu-elections-2024">European Parliament election</a> (June 6-9, 2024), <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">DDoS attacks targeted Dutch political websites</a> for two days, peaking at 73,000 requests per second.</p><p>We’ll also be keeping an eye on upcoming elections. The United Kingdom recently scheduled its general election for July 4, making it the latest addition to the electoral calendar.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6q0UiHJhHz8WwHFW3w1Jf5/daccfa205b9d58681247ff5a1cb6ffc0/image4-2.png" />
            
            </figure><p><i>Locations with national elections in 2024 (over 60, plus EU elections with 27 countries participating). Including local elections, over 100 countries will hold elections. In several countries, there will be multiple elections in 2024.</i></p>
    <div>
      <h2>Dutch political websites hit by cyber attacks</h2>
      <a href="#dutch-political-websites-hit-by-cyber-attacks">
        
      </a>
    </div>
    <p><b>Europe: 2024 European Parliament election (June 6-9)</b></p><p>As mentioned above, we recently published a blog post about the <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">cyber attack on Dutch political-related</a> websites. The 2024 <a href="https://en.wikipedia.org/wiki/2024_European_Parliament_election">European Parliament election</a> started in the Netherlands on June 6, and continues through June 9 in the other 26 countries that are part of the European Union. Cloudflare observed DDoS attacks targeting multiple election or politically-related Internet properties on election day in the Netherlands, as well as the preceding day.</p><p>The main June 5 DDoS attack on one of the websites peaked at 14:13 UTC (16:13 local time), reaching 73,000 requests per second (rps) in an attack that lasted for a few hours. This attack is illustrated by the blue line in the graph below, which shows that it ramped slowly over the first half of the day, and then appeared to abruptly stop at 18:06. And on June 6, the main attack on the second website peaked at 11:01 UTC (13:01 local time) with 52,000 rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p6ecgzfeCQAGrKeVItiDn/9b917e765426a4d1c96c5f728a75eaa2/image15.png" />
            
            </figure><p>More information can be found in the dedicated <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">blog post</a> and the <a href="https://radar.cloudflare.com/reports/elections-2024">elections report</a>.</p>
    <div>
      <h3>A European Union perspective</h3>
      <a href="#a-european-union-perspective">
        
      </a>
    </div>
    <p>In Europe, cyberattacks have been a significant issue. In March 2024, <a href="https://www.politico.eu/article/french-government-hit-with-cyberattacks-of-unprecedented-intensity/">French government websites</a> faced attacks of “unprecedented intensity,” according to a spokesperson. Just days earlier, on February 25, 2024, Cloudflare blocked a major DDoS attack on a French government website, which reached 420 million requests per hour and lasted over three hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/53vfOhKPefne9dsP1lm2vF/58315b7559fff6baffef769b61ab2cf7/image16.png" />
            
            </figure><p>Looking at government or state-related websites in the European Union in 2024, there have been several spikes in attacks targeting defense organizations, European courts, and educational institutions.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6k0BvW6ig90xLfiL7HjyUc/91f7c93f5398f25b4751d14ff465efdb/image9.jpg" />
            
            </figure><p>These incidents highlight the ongoing threat to critical infrastructure across Europe, with government sites frequently targeted by cyberattacks.</p>
    <div>
      <h2>Mexicans go offline: early traffic drops on election day</h2>
      <a href="#mexicans-go-offline-early-traffic-drops-on-election-day">
        
      </a>
    </div>
    <p><b>Mexico: Presidential, Senate, and Chamber of Deputies elections (June 2)</b></p><p><a href="https://en.wikipedia.org/wiki/2024_Mexican_general_election">General elections</a> were held in Mexico on Sunday, June 2, 2024, resulting in the election of the first female president, Claudia Sheinbaum, from the Morena political party. Cloudflare data shows a typical election day pattern in Mexico, mirroring trends seen in other countries: when polling stations are open, HTTP requests dip below normal levels. On June 2, traffic decreased between 08:00 and 20:00 CST (14:00 and 02:00 UTC), gradually recovering afterward as polling stations closed at 18:00 CST. Throughout the day, traffic experienced drops of up to 11% at 09:30 and 13:00 CST, with daily traffic decreasing by 3%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qa4CwCDwofwpFmD2gpl13/cb438e00f7b76b8f398c0c8e5fdedcdd/image14.png" />
            
            </figure><p>The first official results were released after 23:00 (05:00 UTC in the chart above), coinciding with an 8% increase in traffic compared to the previous week. This growth peaked at 01:30 (07:30 UTC), with a 14% surge in HTTP requests, maintaining elevated levels until 07:30 in Mexico.</p><p>A similar trend was observed at the state level, with the period between 10:00 CST and 14:00 being the one with the most significant drop in traffic, with voting taking place all over the country.</p><p>(We provide a full table of the biggest drops in traffic and the specific time of that drop on election day by Mexican state in our <i>Radar</i> <a href="https://radar.cloudflare.com/reports/elections-2024"><i>2024 Election Insights</i></a> report)<i>.</i></p>
    <div>
      <h3>Website trends: traffic spikes from news and election results</h3>
      <a href="#website-trends-traffic-spikes-from-news-and-election-results">
        
      </a>
    </div>
    <p>Switching to domain trends, DNS traffic (using our <a href="http://1.1.1.1">1.1.1.1</a> resolver) to election results sites in Mexico grew by almost 116x compared to the previous week, peaking at 20:00 CST (02:00 UTC), and remained up to 80x higher, until 23:00 CST (05:00 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GEvTYIWhG0Jaqhc4XexA9/0db4146163a5d4636e37c31e8714fb5f/image3-2.png" />
            
            </figure><p>Examining news media outlets, there was noticeable growth in DNS queries on Election Day, June 2, with traffic significantly higher than the previous week in the early morning. By 20:00 CST (02:00 UTC), traffic surged to 1.8x higher, then skyrocketed to a 4.8x increase by 23:00 CST (05:00 UTC), reaching a peak at 01:00 CST (07:00 UTC) with a staggering 1057% more DNS traffic than the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/z4GYcME7kOHjPGRnwOJ0T/f499329f997df6d2460a972d1c5712b2/image1-9.png" />
            
            </figure>
    <div>
      <h3>Attacks: early May election-related DDoS spike</h3>
      <a href="#attacks-early-may-election-related-ddos-spike">
        
      </a>
    </div>
    <p>We didn’t see any unusual attacks targeting Mexico before the election, except for one targeting a state electoral organization. A specific DDoS attack on May 6 targeted a state electoral organization, reaching 130 million HTTP requests per hour, with a peak of 113,000 requests per second at 09:12 CST (15:12 UTC). The attack lasted about 30 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/0klxi0BldH4ivrqRjbZVR/27b4d75ef6c40d7cf02eea846f02efb6/image10.png" />
            
            </figure>
    <div>
      <h2>India’s elections: 44 days of traffic dips and mobile spikes</h2>
      <a href="#indias-elections-44-days-of-traffic-dips-and-mobile-spikes">
        
      </a>
    </div>
    <p><b>India: General election (April 19 - June 1)</b></p><p>In India, <a href="https://en.wikipedia.org/wiki/2024_Indian_general_election">general elections</a> were held from April 19 to June 1, 2024 in seven phases, with incumbent Prime Minister Narendra Modi winning by a smaller margin than in the previous election. More than 968 million people out of a population of 1.4 billion were eligible to vote, and there was a 66% <a href="https://indianexpress.com/elections/2024-lok-sabha-elections-voter-turnout-9376670/">turnout</a>, making it the largest election in human history.</p><p>Not all states voted on the same days, leading to mixed HTTP request patterns. On April 18, the day before the first election day, traffic was 10% higher than the previous week, marking the biggest increase of the year, something we’ve seen in other ​​elections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IIXk2g88hckiavRBKNmBc/0d2375e9da188986f379e9aa0e2bad01/image5-1.png" />
            
            </figure><p>Some of the seven election days had a nationwide impact. Not all states in India voted on the same days. However, days with more constituencies or populous states participating saw bigger traffic changes. For example, May 7, 2024, saw 11 states, including the most populous ones, voting. This day (highlighted in the next chart) experienced the biggest nationwide drop in traffic, with a 6% decrease compared to the previous week. May 20 and May 25 also saw drops of 4% and 3%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/dcqTHOWMoorEU4bPrnZM6/8f8308dc8aff6863db098b21867e0564/image2-4.png" />
            
            </figure><p>The period between 15:30 and 19:30 local time (10:00 - 14:00 UTC) typically witnessed the most significant drop in traffic on election days.</p><p>In Uttar Pradesh, the most populous Indian state, the first day of elections on April 19 saw the biggest drop (9%). May 20 and 25, with more constituencies voting, also experienced significant traffic drops, especially May 20, with traffic lower than usual between 10:30 and 22:30 UTC (05:00 - 17:00 UTC), and a 5% daily drop compared to the previous week.</p><p>In Maharashtra, home to the capital Mumbai, May 20 saw the most impact, with a 17% drop in daily traffic compared to the previous week. On this day, traffic hit its lowest point at 14:30 local time (09:00 UTC), with a drop of approximately 20%.</p><p>(We provide a full table of the states in India with the biggest drop in daily traffic over the several election days in our Radar <a href="https://radar.cloudflare.com/reports/elections-2024"><b><i>2024 Election Insights</i></b></a> report**)**<i>.</i></p>
    <div>
      <h3>Mobile devices first in India</h3>
      <a href="#mobile-devices-first-in-india">
        
      </a>
    </div>
    <p>India is a mobile-first country, with most election days during the week. On weekends, mobile devices are used more, especially on Sundays when they can reach 69% of all traffic. During the week, usage is typically between 61% and 62%. On election days, mobile device usage increased to around 64%.</p><p>Saturday, June 1, 2024, the last election day, was the Saturday of the year in India with the highest daily mobile device traffic percentage, reaching 68% (typically around 65-66%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4P8FiTyaKXOUdbcCHelawZ/34b3b92ff89a8077e33ce70815f82fd7/image11.png" />
            
            </figure><p>The increase in mobile device usage on election days was more noticeable during the day, particularly between 10:00 and 13:00 local time (04:30 - 07:30 UTC). May 13 and May 20 showed the biggest differences compared to typical days, reaching up to 62% during those times. In India, mobile usage during weekends is higher at night than during the day.</p>
    <div>
      <h3>Attacks</h3>
      <a href="#attacks">
        
      </a>
    </div>
    <p>Since April 2024, Cloudflare hasn’t observed any unusual or potentially election-related attacks targeting India. However, there have been large attacks on online financial services, consulting firms, and online casinos. The most targeted industries during this period have been Information Technology and Services, BFSI (Banking, Financial Services, and Insurance), and Gaming/Gambling.</p>
    <div>
      <h2>Iceland’s 2024 election: impact before and after extended voting day</h2>
      <a href="#icelands-2024-election-impact-before-and-after-extended-voting-day">
        
      </a>
    </div>
    <p><b>Iceland: Presidential election (June 1)</b></p><p>Iceland held its <a href="https://en.wikipedia.org/wiki/2024_Icelandic_presidential_election">presidential election</a> on Saturday, June 1, 2024, and Halla Tómasdóttir was elected as the new president. She is the second woman to become president in Iceland and the fourth woman to hold a top leadership position, including prime ministers.</p><p>In terms of HTTP requests, there wasn’t much change during election day. This might be because polling stations in Iceland were open from 09:00 to 22:00 local time (same as UTC), spreading out the impact. However, traffic increased the days before and after the election.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/0Q5LlTkuHJQEnEPBs4Vc5/179e1647732fbd2d80ce5c5d557c1406/image7-1.png" />
            
            </figure><p>On May 31, the day before the election, daily traffic in Iceland was 7% lower than the previous week. It remained stable on election day and increased by 14% on Sunday when results were announced. This increase was only surpassed by two days in 2024:</p><ul><li><p>May 2: +17%, driven by a 9% drop the previous week due to the national holiday, the first day of summer.</p></li><li><p>March 19: +16%, due to a volcanic eruption that led to a <a href="https://crisis24.garda.com/alerts/2024/03/iceland-volcanic-eruption-ongoing-in-the-reykjanes-peninsula-as-of-march-19-update-1">state of emergency</a>, evacuations, and road closures.</p></li></ul><p>Looking deeper into election day traffic with 15-minute granularity, traffic was around 12% lower between 14:00 and 16:00 local time (same as UTC), with the biggest drop, 20%, at 15:30.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cGvRhbuGMAQmg8kCGJEiO/8d8ae9914aed35b37b976a5f44c20d6d/image6-1.png" />
            
            </figure>
    <div>
      <h3>Mobile devices usage changes</h3>
      <a href="#mobile-devices-usage-changes">
        
      </a>
    </div>
    <p>June 2 and June 1, election day, were also the days in 2024 with the highest percentage of mobile device usage in Iceland, at 47% and 45%, respectively. June 1’s percentage is tied with March 2, the day the famous Blue Lagoon was <a href="https://www.cnn.com/2024/03/02/travel/iceland-blue-lagoon-evacuated-imminent-eruption-intl-hnk/index.html">evacuated</a> due to nearby seismic activity suggesting an “imminent” volcanic eruption, and January 1, the first day of the year.</p>
    <div>
      <h3>Attacks</h3>
      <a href="#attacks">
        
      </a>
    </div>
    <p>Cloudflare didn’t observe any relevant attacks during the election period targeting Iceland and its Internet properties. Since the beginning of April 2024, the most attacked industries were Retail and Gaming.</p>
    <div>
      <h2>South Africa: traffic surges pre-voting, 16% decrease during voting</h2>
      <a href="#south-africa-traffic-surges-pre-voting-16-decrease-during-voting">
        
      </a>
    </div>
    <p><b>South Africa: 2024 general election (May 29)</b></p><p>On <a href="https://en.wikipedia.org/wiki/2024_South_African_general_election">general election</a> day in South Africa, which took place on Wednesday, May 29, 2024, HTTP requests dipped while polling stations were open. Traffic remained lower than usual from around 05:30 local time (03:30 UTC), with a 16% drop observed at 05:45 (03:45 UTC) and a 14% decrease by 11:00 (09:00 UTC), persisting until 18:00 (16:00 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2APc8KE2827lF9c6k1YiFB/e1e89ddc9e8e6204b62d2da122f47c32/image13.png" />
            
            </figure><p>However, as shown in the chart above, the night leading up to the election saw a traffic surge, peaking at a 25% increase around midnight local time (22:00 UTC). Following the election, traffic rose compared to the previous week, with a 6% increase at 23:30 local time and a 12% to 8% rise around 04:00 and 09:00 local time (02:00 - 07:00 UTC) on May 30.</p><p>Daily traffic overall was 6% lower than the previous week, with mobile device usage increasing to 63%, compared to 57% the previous week.</p>
    <div>
      <h3>Attacks: news under attack</h3>
      <a href="#attacks-news-under-attack">
        
      </a>
    </div>
    <p>Cloudflare didn’t detect any major threats targeting government or election-related online platforms. However, in the lead-up to election day, on May 7, a significant DDoS attack targeted a major news site in South Africa, with 773 million daily requests. This attack peaked at 16:06 local time (14:06 UTC) with 54,000 requests per second and continued in the following days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vlgREJo7FVyqH6LbuVLJ1/751371faab6336f14e8f4cedc9999cc4/image12.png" />
            
            </figure>
    <div>
      <h2>Geopolitics are here to stay</h2>
      <a href="#geopolitics-are-here-to-stay">
        
      </a>
    </div>
    <p>Elections, geopolitical changes, and disputes impact the online world. Our <a href="/ddos-threat-report-for-2024-q1">DDoS threat report</a> for Q1 2024 gives a few recent examples. One notable case was the 466% surge in DDoS attacks on Sweden after its acceptance into the NATO alliance, mirroring the pattern observed during Finland’s NATO accession in 2023.</p><p>Real-world conflicts and wars often lead to Internet pattern changes, disruptions, or cyberattacks. For instance, during the first year of the <a href="/one-year-of-war-in-ukraine">war in Ukraine</a>, and more recently, Cloudflare’s <a href="/disrupting-flyingyeti-campaign-targeting-ukraine/">Cloudforce One</a> thwarted a phishing attack by the Russia-aligned threat actor FlyingYeti. Our recent <a href="/galileo10anniversaryradardashboard">Project Galileo blog post</a> also details how we protected Meduza, an independent news outlet focused on Russia, from online attacks in late 2023.</p><p>We’ve also reported (<a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks">1</a>, <a href="/cyber-attacks-in-the-israel-hamas-war">2</a>) on Internet changes, disruptions, and increased cyberattacks following the start of the Israel-Hamas war on October 7, 2023.If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024"><i>2024 Elections Insights</i></a> report, that we’re updating as national and European elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Elections]]></category>
            <guid isPermaLink="false">5XIbWHxLKBJrlkxFeelb4v</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure your unprotected assets with Security Center: quick view for CISOs]]></title>
            <link>https://blog.cloudflare.com/security-insights-quick-ciso-view/</link>
            <pubDate>Tue, 05 Mar 2024 14:02:00 GMT</pubDate>
            <description><![CDATA[ Today we are excited to introduce a new set of capabilities within the Security Center to directly address a common challenge: ensuring comprehensive deployment across your infrastructure. Gain precise insights into where and how to optimize your security posture ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7M5yJ8aoOlRhR4sSsV4rgM/4634f2c04e6bef1400ce6ea024a032d7/image3-1.png" />
            
            </figure><p>We understand that one of the significant hurdles faced by our customers, especially larger organizations, is obtaining a clear view of the deployment of Cloudflare services throughout their vast and complex infrastructures. The question isn't just whether Cloudflare is deployed, but whether it's fully optimized across every asset and service. Addressing this challenge head-on, we're rolling out a new feature set designed to provide better visibility and control over your security posture.</p>
    <div>
      <h3>The problem we are addressing</h3>
      <a href="#the-problem-we-are-addressing">
        
      </a>
    </div>
    <p>The core problem we're tackling is the growing complexity of cyber threats and <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">the expanding attack surface</a>, which complicates maintaining a strong security posture for our customers.</p><p>It's not uncommon for organizations to deploy a variety of security solutions, including ours, without fully optimizing and implementing their configurations. This results in a false sense of security, underutilized investments and, more critically, exposed vulnerabilities. Our customers frequently express concerns about not having a clear picture of their security posture across their entire infrastructure, uncertain if critical assets are adequately protected or if specific Cloudflare security features could be better leveraged.</p><p>We want to bring users comprehensive visibility into their security configurations and the state of their deployments across Cloudflare's suite of products. By providing actionable insights into underconfigured areas, unassigned resources, or unutilized features, we aim to close the security gaps and enhance the overall defense mechanisms of our customers' digital ecosystems. This improvement is not just about leveraging technology but about promoting a culture of proactive security management, where every piece of the digital infrastructure is consistently and optimally protected.</p>
    <div>
      <h3>How we're solving this inside Security Center</h3>
      <a href="#how-were-solving-this-inside-security-center">
        
      </a>
    </div>
    <p><a href="/security-center/">More than two years ago</a>, we took on the mission to consolidate our extensive suite of security products, security expertise, and our unique insights into Internet threats into one comprehensive solution — the Cloudflare <a href="https://www.cloudflare.com/en-gb/application-services/products/securitycenter/">Security Center</a>. Launched with the vision to simplify attack surface management and make advanced security intelligence actionable for organizations of all sizes, Security Center has since become the one-stop quick view to evaluate your security posture.</p><p>Today, we build on this foundation to address a pain point for many of our large customers: ensuring complete Cloudflare protection across their entire digital infrastructure.</p><p>Our latest update in the Security Center focuses on delivering detailed insights into Cloudflare's deployment status across your digital assets. This encompasses identifying applications where critical services like WAF, Access, and other <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">security protection tools</a> might not be fully configured or optimized, thereby weakening your security posture.</p><p>In addition to these insights, we are introducing a quick view within Security Center Insights, designed to offer <a href="https://www.cloudflare.com/ciso/">CISOs</a> and security teams a quick and comprehensive view of their current Cloudflare product configurations at any given moment, along with recommendations for enhancements, under the Security optimization snapshot on the dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48Ts4LyhRSDf9Ls61ftOHD/34e3f3f5eb8115fa81158295af8c9335/image1-2.png" />
            
            </figure><p>Leveraging these new insights, Cloudflare users can now take proactive steps to close any gaps in their security framework. By offering a granular view of where specific Cloudflare services can be better utilized, we're not just solving a visibility problem — we're delivering actionable security intelligence. This means decisions can be made swiftly, ensuring that your defenses not only keep pace with, but stay ahead of, potential threats.</p><p>For instance, we'll highlight if WAF is deployed on only a portion of your zones, where Email Security could be leveraged, or if certain assets are unprotected by Access controls. We’re also making it easier for you to see if you are missing any critical setup like Page Shield, ensuring the product is configured, so you are not just one step closer to becoming compliant with standards like PCI DSS, but are also protected against evolving threats. We are outlining newly discovered API endpoints that require your attention as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FZV6K08ssc7UM60Za47zs/f93d568b1b851dbfd144562312b91fc1/image2-1.png" />
            
            </figure><p>Finally, users can now export their Security Insights using our <a href="https://developers.cloudflare.com/api/operations/get-security-center-issue-types">public API</a>, and will soon be able to do the same directly from the Cloudflare Dashboard, with a simple click of a button!</p>
    <div>
      <h3>Accessing Security Center Insights</h3>
      <a href="#accessing-security-center-insights">
        
      </a>
    </div>
    <p>Security Center Insights is available to all Cloudflare dashboard users that are Administrators of their Cloudflare account.</p><p>Regardless of the size or scope of your deployment, our goal is to empower every user with the tools needed to achieve a robust security posture, which they can continuously influence by improving existing configurations, adding new solutions, and discovering new vulnerabilities.</p>
    <div>
      <h3>Future Security Center roadmap</h3>
      <a href="#future-security-center-roadmap">
        
      </a>
    </div>
    <p>We’re constantly adding other relevant security insights to help improve your security posture, covering exposed infrastructure, insecure configurations, optimisations, new products, and more, including the ability to easily export these for reporting purposes. Moreover, stay tuned for a completely new reporting platform that will automatically deliver curated and contextualized security insights directly into your inbox — showcasing the power of Cloudflare’s security portfolio. The periodic reports will be complemented by a personalized interactive in-dashboard reporting experience.</p><p>Check out your security insights under your account’s Security Center now and take action to improve your security posture with Cloudflare!</p><p>If you would like to join us in building the Security Center or other exciting Cloudflare products, see our <a href="https://www.cloudflare.com/careers/jobs/">open positions</a> and learn more about <a href="https://www.cloudflare.com/en-gb/careers/">life@Cloudflare</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security Center]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Security Posture]]></category>
            <category><![CDATA[Insights]]></category>
            <guid isPermaLink="false">2lC0z3ZmqQffklxIp7UXzw</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q4/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:25 GMT</pubDate>
            <description><![CDATA[ Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dLcyHxuJpOmtuilCdmlMv/226d5f6d0704e7ef443e924750799873/image14-1.png" />
            
            </figure><p>Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year.</p>
    <div>
      <h2>What are DDoS attacks?</h2>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites and online services for users, making them unavailable by overwhelming them with more traffic than they can handle. They are similar to car gridlocks that jam roads, preventing drivers from getting to their destination.</p><p>There are three main types of DDoS attacks that we will cover in this report. The first is an <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP request</a> intensive DDoS attack that aims to overwhelm HTTP servers with more requests than they can handle to cause a denial of service event. The second is an <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/">IP packet</a> intensive DDoS attack that aims to overwhelm in-line appliances such as routers, firewalls, and servers with more packets than they can handle. The third is a bit-intensive attack that aims to saturate and clog the Internet link causing that ‘gridlock’ that we discussed. In this report, we will highlight various techniques and insights on all three types of attacks.</p><p>Previous editions of the report can be found <a href="/tag/ddos-reports">here</a>, and are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. Cloudflare Radar showcases global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities for zooming in on insights of specific countries, industries, and service providers. Cloudflare Radar also offers a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet usage across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    <ol><li><p>In Q4, we observed a 117% year-over-year increase in network-layer DDoS attacks, and overall increased DDoS activity targeting retail, shipment and public relations websites during and around Black Friday and the holiday season.</p></li><li><p>In Q4, DDoS attack traffic targeting Taiwan registered a 3,370% growth, compared to the previous year, amidst the upcoming general election and reported tensions with China. The percentage of DDoS attack traffic targeting Israeli websites grew by 27% quarter-over-quarter, and the percentage of DDoS attack traffic targeting Palestinian websites grew by 1,126% quarter-over-quarter — as the military conflict between Israel and Hamas continues.</p></li><li><p>In Q4, there was a staggering 61,839% surge in DDoS attack traffic targeting Environmental Services websites compared to the previous year, coinciding with the 28th United Nations Climate Change Conference (COP 28).</p></li></ol><p>For an in-depth analysis of these key findings and additional insights that could redefine your understanding of current cybersecurity challenges, read on!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZbT93S5MJZLC4lm3oEFA/2beb24271129aabf3ca98b66f69f92cb/image1.png" />
            
            </figure><p>Illustration of a DDoS attack</p>
    <div>
      <h2>Hyper-volumetric HTTP DDoS attacks</h2>
      <a href="#hyper-volumetric-http-ddos-attacks">
        
      </a>
    </div>
    <p>2023 was the year of uncharted territories. DDoS attacks reached new heights — in size and sophistication. The wider Internet community, including Cloudflare, faced a persistent and deliberately engineered campaign of thousands of hyper-volumetric DDoS attacks at never before seen rates.</p><p>These attacks were highly complex and exploited an <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 vulnerability</a>. Cloudflare developed purpose-built technology to mitigate the vulnerability’s effect and worked with others in the industry to responsibly disclose it.</p><p>As part of this DDoS campaign, in Q3 our systems mitigated the largest attack we’ve ever seen — 201 million requests per second (rps). That’s almost 8 times larger than our previous 2022 record of 26 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49CXz2EGW8rzgjsaRcSFyT/f6f06108590316e1a3bdf0e0f69dbc89/pasted-image-0.png" />
            
            </figure><p>Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
    <div>
      <h2>Growth in network-layer DDoS attacks</h2>
      <a href="#growth-in-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>After the hyper-volumetric campaign subsided, we saw an unexpected drop in HTTP DDoS attacks. Overall in 2023, our automated defenses mitigated over 5.2 million HTTP DDoS attacks consisting of over 26 trillion requests. That averages at 594 HTTP DDoS attacks and 3 billion mitigated requests every hour.</p><p>Despite these astronomical figures, the amount of HTTP DDoS attack requests actually declined by 20% compared to 2022. This decline was not just annual but was also observed in 2023 Q4 where the number of HTTP DDoS attack requests decreased by 7% YoY and 18% QoQ.</p><p>On the network-layer, we saw a completely different trend. Our automated defenses mitigated 8.7 million network-layer DDoS attacks in 2023. This represents an 85% increase compared to 2022.</p><p>In 2023 Q4, Cloudflare’s automated defenses mitigated over 80 petabytes of network-layer attacks. On average, our systems auto-mitigated 996 network-layer DDoS attacks and 27 terabytes every hour. The number of network-layer DDoS attacks in 2023 Q4 increased by 175% YoY and 25% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Da5bEJbgh9FT5UQb6qPWo/4cf631e2688ca806bcbe996a357e5d5f/HTTP-and-Network-layer-DDoS-attacks-by-quarter-1.png" />
            
            </figure><p>HTTP and Network-layer DDoS attacks by quarter</p>
    <div>
      <h3>DDoS attacks increase during and around COP 28</h3>
      <a href="#ddos-attacks-increase-during-and-around-cop-28">
        
      </a>
    </div>
    <p>In the final quarter of 2023, the landscape of cyber threats witnessed a significant shift. While the Cryptocurrency sector was initially leading in terms of the volume of HTTP DDoS attack requests, a new target emerged as a primary victim. The Environmental Services industry experienced an unprecedented surge in HTTP DDoS attacks, with these attacks constituting half of all its HTTP traffic. This marked a staggering 618-fold increase compared to the previous year, highlighting a disturbing trend in the cyber threat landscape.</p><p>This surge in cyber attacks coincided with COP 28, which ran from November 30th to December 12th, 2023. The conference was a pivotal event, signaling what many considered the <a href="https://unfccc.int/news/cop28-agreement-signals-beginning-of-the-end-of-the-fossil-fuel-era">'beginning of the end' for the fossil fuel era</a>. It was observed that in the period leading up to COP 28, there was a noticeable spike in HTTP attacks targeting Environmental Services websites. This pattern wasn't isolated to this event alone.</p><p>Looking back at historical data, particularly during COP 26 and COP 27, as well as other UN environment-related resolutions or announcements, a similar pattern emerges. Each of these events was accompanied by a corresponding increase in cyber attacks aimed at Environmental Services websites.</p><p>In February and March 2023, significant environmental events like the UN's resolution on <a href="https://www.unep.org/news-and-stories/story/un-resolution-billed-turning-point-climate-justice">climate justice</a> and the launch of United Nations Environment Programme’s <a href="https://www.unep.org/news-and-stories/press-release/largest-river-and-wetland-restoration-initiative-history-launched-un">Freshwater Challenge</a> potentially heightened the profile of environmental websites, possibly correlating with an increase in attacks on these sites​​​​.</p><p>This recurring pattern underscores the growing intersection between environmental issues and cyber security, a nexus that is increasingly becoming a focal point for attackers in the digital age.</p>
    <div>
      <h2>DDoS attacks and Iron Swords</h2>
      <a href="#ddos-attacks-and-iron-swords">
        
      </a>
    </div>
    <p>It’s not just UN resolutions that trigger DDoS attacks. Cyber attacks, and particularly DDoS attacks, have long been a tool of war and disruption. We witnessed an increase in DDoS attack activity in the Ukraine-Russia war, and now we’re also witnessing it in the Israel-Hamas war. We first reported the cyber activity in our report <a href="/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a>, and we continued to monitor the activity throughout Q4.</p><p>Operation “Iron Swords” is the <a href="https://en.wikipedia.org/wiki/2023_Israel%E2%80%93Hamas_war#Israeli_response">military offensive launched by Israel against Hamas</a> following the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel">Hamas-led 7 October attack</a>. During this ongoing armed conflict, we continue to see DDoS attacks targeting both sides.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31johknCeQ8F1pbczj7Neq/2f91e03e355a539043c734e7c5140ff1/pasted-image-0--1-.png" />
            
            </figure><p>DDoS attacks targeting Israeli and Palestinian websites, by industry</p><p>Relative to each region's traffic, the Palestinian territories was the second most attacked region by HTTP DDoS attacks in Q4. Over 10% of all HTTP requests towards Palestinian websites were DDoS attacks, a total of 1.3 billion DDoS requests — representing a 1,126% increase in QoQ. 90% of these DDoS attacks targeted Palestinian Banking websites. Another 8% targeted Information Technology and Internet platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uYrGNHSPfp3nEmFkhTGpa/317d1cb4ead40504677565360d836641/pasted-image-0--2-.png" />
            
            </figure><p>Top attacked Palestinian industries</p><p>Similarly, our systems automatically mitigated over 2.2 billion HTTP DDoS requests targeting Israeli websites. While 2.2 billion represents a decrease compared to the previous quarter and year, it did amount to a larger percentage out of the total Israel-bound traffic. This normalized figure represents a 27% increase QoQ but a 92% decrease YoY. Notwithstanding the larger amount of attack traffic, Israel was the 77th most attacked region relative to its own traffic. It was also the 33rd most attacked by total volume of attacks, whereas the Palestinian territories was 42nd.</p><p>Of those Israeli websites attacked, Newspaper &amp; Media were the main target — receiving almost 40% of all Israel-bound HTTP DDoS attacks. The second most attacked industry was the Computer Software industry. The Banking, Financial Institutions, and Insurance (BFSI) industry came in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N6E8K9fZJZUFID7t0liAB/c0e58eb814bd8f6ee51319c6fa9ac97d/pasted-image-0--3-.png" />
            
            </figure><p>Top attacked Israeli industries</p><p>On the network layer, we see the same trend. Palestinian networks were targeted by 470 terabytes of attack traffic — accounting for over 68% of all traffic towards Palestinian networks. Surpassed only by China, this figure placed the Palestinian territories as the second most attacked region in the world, by network-layer DDoS attack, relative to all Palestinian territories-bound traffic. By absolute volume of traffic, it came in third. Those 470 terabytes accounted for approximately 1% of all DDoS traffic that Cloudflare mitigated.</p><p>Israeli networks, though, were targeted by only 2.4 terabytes of attack traffic, placing it as the 8th most attacked country by network-layer DDoS attacks (normalized). Those 2.4 terabytes accounted for almost 10% of all traffic towards Israeli networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fk4fxxDf20Wt6BmMTDPNq/bf0d999fc9f6b4ca98eb3f4c5b819432/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked countries</p><p>When we turned the picture around, we saw that 3% of all bytes that were ingested in our Israeli-based data centers were network-layer DDoS attacks. In our Palestinian-based data centers, that figure was significantly higher — approximately 17% of all bytes.</p><p>On the application layer, we saw that 4% of HTTP requests originating from Palestinian IP addresses were DDoS attacks, and almost 2% of HTTP requests originating from Israeli IP addresses were DDoS attacks as well.</p>
    <div>
      <h2>Main sources of DDoS attacks</h2>
      <a href="#main-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>In the third quarter of 2022, China was the largest source of HTTP DDoS attack traffic. However, since the fourth quarter of 2022, the US took the first place as the largest source of HTTP DDoS attacks and has maintained that undesirable position for five consecutive quarters. Similarly, our data centers in the US are the ones ingesting the most network-layer DDoS attack traffic — over 38% of all attack bytes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQRkEFpGgYH1o7Ld5m3LH/6e3452323058567ed6e244024644a379/imageLikeEmbed.png" />
            
            </figure><p>HTTP DDoS attacks originating from China and the US by quarter</p><p>Together, China and the US account for a little over a quarter of all HTTP DDoS attack traffic in the world. Brazil, Germany, Indonesia, and Argentina account for the next twenty-five percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OJH3XgpVKTtd93Lhv9pQd/1a4d6d5fb7d6349609c62c9ed5524471/pasted-image-0--6-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks</p><p>These large figures usually correspond to large markets. For this reason, we also normalize the attack traffic originating from each country by comparing their outbound traffic. When we do this, we often get small island nations or smaller market countries that a disproportionate amount of attack traffic originates from. In Q4, 40% of Saint Helena’s outbound traffic were HTTP DDoS attacks — placing it at the top. Following the ‘<a href="https://en.wikipedia.org/wiki/Saint_Helena">remote volcanic tropical island</a>’, Libya came in second, <a href="https://en.wikipedia.org/wiki/Eswatini">Swaziland</a> (also known as Eswatini) in third. Argentina and Egypt follow in fourth and fifth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hyX9SLpTS3ncRB5QZnR9R/447df8e913314ab249c0d5a430efcdcc/pasted-image-0--7-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks with respect to each country’s traffic</p><p>On the network layer, Zimbabwe came in first place. Almost 80% of all traffic we ingested in our Zimbabwe-based data center was malicious. In second place, Paraguay, and Madagascar in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sln1Hbv1Wz7j4oCCL9XRA/56f1f5fa42ab7846b0a0dc33c796afd0/pasted-image-0--8-.png" />
            
            </figure><p>Top source of Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>By volume of attack traffic, Cryptocurrency was the most attacked industry in Q4. Over 330 billion HTTP requests targeted it. This figure accounts for over 4% of all HTTP DDoS traffic for the quarter. The second most attacked industry was Gaming &amp; Gambling. These industries are known for being coveted targets and attract a lot of traffic and attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UoOV6PIx9DqJ0monxhfwu/20411132ba585c3314941bc2aec93e43/pasted-image-0--9-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks</p><p>On the network layer, the Information Technology and Internet industry was the most attacked — over 45% of all network-layer DDoS attack traffic was aimed at it. Following far behind were the Banking, Financial Services and Insurance (BFSI), Gaming &amp; Gambling, and Telecommunications industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tlGK3k5YutHhSEbvm1va0/5842c447cbb6c8dd18630bbb0c63db1f/pasted-image-0--10-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks</p><p>To change perspectives, here too, we normalized the attack traffic by the total traffic for a specific industry. When we do that, we get a different picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DxEla6GwSvU7OBnjGmhJX/dc12c491f1444662e00636b63cf92637/Top-Attacked-Industry-by-Region-Q4-2023.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>We already mentioned in the beginning of this report that the Environmental Services industry was the most attacked relative to its own traffic. In second place was the Packaging and Freight Delivery industry, which is interesting because of its timely correlation with online shopping during Black Friday and the winter holiday season. Purchased gifts and goods need to get to their destination somehow, and it seems as though attackers tried to interfere with that. On a similar note, DDoS attacks on retail companies increased by 16% compared to the previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14CXtsmUxjRwOB1kmYHA6Q/9c8b079ac33d94f8494e53d1ef50c4a6/pasted-image-0--11-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks with respect to each industry’s traffic</p><p>On the network layer, Public Relations and Communications was the most targeted industry — 36% of its traffic was malicious. This too is very interesting given its timing. Public Relations and Communications companies are usually linked to managing public perception and communication. Disrupting their operations can have immediate and widespread reputational impacts which becomes even more critical during the Q4 holiday season. This quarter often sees increased PR and communication activities due to holidays, end-of-year summaries, and preparation for the new year, making it a critical operational period — one that some may want to disrupt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NLJAkykpHhrRuFA2OVuKg/a6ca3bebb6f29c610292cd630a6746cc/pasted-image-0--12-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks with respect to each industry’s traffic</p>
    <div>
      <h2>Most attacked countries and regions</h2>
      <a href="#most-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>Singapore was the main target of HTTP DDoS attacks in Q4. Over 317 billion HTTP requests, 4% of all global DDoS traffic, were aimed at Singaporean websites. The US followed closely in second and Canada in third. Taiwan came in as the fourth most attacked region — amidst the upcoming <a href="https://www.bbc.co.uk/news/world-asia-67770782">general elections and the tensions with China</a>. Taiwan-bound attacks in Q4 traffic increased by 847% compared to the previous year, and 2,858% compared to the previous quarter. This increase is not limited to the absolute values. When normalized, the percentage of HTTP DDoS attack traffic targeting Taiwan relative to all Taiwan-bound traffic also significantly increased. It increased by 624% quarter-over-quarter and 3,370% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/730lynQatPwtsRfi10TXOi/fc993988b6f38b8d00501f3451a16c18/pasted-image-0--13-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks</p><p>While China came in as the ninth most attacked country by HTTP DDoS attacks, it's the number one most attacked country by network-layer attacks. 45% of all network-layer DDoS traffic that Cloudflare mitigated globally was China-bound. The rest of the countries were so far behind that it is almost negligible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MIf27g0zSIEZYQxUsFlTh/62c50ec1d0c25ae82045a71cd41c24c2/pasted-image-0--14-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks</p><p>When normalizing the data, Iraq, Palestinian territories, and Morocco take the lead as the most attacked regions with respect to their total inbound traffic. What’s interesting is that Singapore comes up as fourth. So not only did Singapore face the largest amount of HTTP DDoS attack traffic, but that traffic also made up a significant amount of the total Singapore-bound traffic. By contrast, the US was second most attacked by volume (per the application-layer graph above), but came in the fiftieth place with respect to the total US-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LX2zl13YVM9hZB60Ucedg/1b2ba78c2aeac99a3d9725ea4e418bd4/pasted-image-0--15-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks with respect to each country’s traffic</p><p>Similar to Singapore, but arguably more dramatic, China is both the number one most attacked country by network-layer DDoS attack traffic, and also with respect to all China-bound traffic. Almost 86% of all China-bound traffic was mitigated by Cloudflare as network-layer DDoS attacks. The Palestinian territories, Brazil, Norway, and again Singapore followed with large percentages of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2n9rHcScBY63Q4yX01yKu5/d19a7fc7ccd43c72911897245cc91dc3/pasted-image-0--16-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Attack vectors and attributes</h2>
      <a href="#attack-vectors-and-attributes">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are short and small relative to Cloudflare’s scale. However, unprotected websites and networks can still suffer disruption from short and small attacks without proper inline automated protection — underscoring the need for organizations to be proactive in <a href="https://www.cloudflare.com/cybersecurity-risk-management/">adopting a robust security posture</a>.</p><p>In 2023 Q4, 91% of attacks ended within 10 minutes, 97% peaked below 500 megabits per second (mbps), and 88% never exceeded 50 thousand packets per second (pps).</p><p>Two out of every 100 network-layer DDoS attacks lasted more than an hour, and exceeded 1 gigabit per second (gbps). One out of every 100 attacks exceeded 1 million packets per second. Furthermore, the amount of network-layer DDoS attacks exceeding 100 million packets per second increased by 15% quarter-over-quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YPOZlyzEHc5u5DeFbQXqW/d8dc22556a3f9510ee075b507b699a42/DDoS-attacks-stats-2023-Q4_a.png" />
            
            </figure><p>DDoS attack stats you should know</p><p>One of those large attacks was a Mirai-botnet attack that peaked at 160 million packets per second. The packet per second rate was not the largest we’ve ever seen. The largest we’ve ever seen was <a href="/mitigating-a-754-million-pps-ddos-attack-automatically">754 million packets per second</a>. That attack occurred in 2020, and we have yet to see anything larger.</p><p>This more recent attack, though, was unique in its bits per second rate. This was the largest network-layer DDoS attack we’ve seen in Q4. It peaked at 1.9 terabits per second and originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It was a multi-vector attack, meaning it combined multiple attack methods. Some of those methods included UDP fragments flood, UDP/Echo flood, SYN Flood, ACK Flood, and TCP malformed flags.</p><p>This attack targeted a known European Cloud Provider and originated from over 18 thousand unique IP addresses that are assumed to be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. It was automatically detected and mitigated by Cloudflare’s defenses.</p><p>This goes to show that even the largest attacks end very quickly. Previous large attacks we’ve seen ended within seconds — underlining the need for an in-line automated defense system. Though still rare, attacks in the terabit range are becoming more and more prominent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10QBHlFJPubkFIG1R2uPf1/06c522bfa3aca7713d823d44d9f6c002/pasted-image-0--17-.png" />
            
            </figure><p>1.9 Terabit per second Mirai DDoS attacks</p><p>The use of Mirai-variant botnets is still very common. In Q4, almost 3% of all attacks originate from Mirai. Though, of all attack methods, DNS-based attacks remain the attackers’ favorite. Together, DNS Floods and DNS Amplification attacks account for almost 53% of all attacks in Q4. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> follows in second and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> in third. We’ll cover the two DNS attack types here, and you can visit the hyperlinks to learn more about UDP and SYN floods in our Learning Center.</p>
    <div>
      <h3>DNS floods and amplification attacks</h3>
      <a href="#dns-floods-and-amplification-attacks">
        
      </a>
    </div>
    <p>DNS floods and DNS amplification attacks both exploit the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a>, but they operate differently. DNS is like a phone book for the Internet, translating human-friendly domain names like "<a href="http://www.cloudflare.com">www.cloudflare.com</a>" into numerical IP addresses that computers use to identify each other on the network.</p><p>Simply put, DNS-based DDoS attacks comprise the method computers and servers used to identify one another to cause an outage or disruption, without actually ‘taking down’ a server. For example, a server may be up and running, but the DNS server is down. So clients won't be able to connect to it and will experience it as an outage.</p><p>A <b>DNS flood</b> attack bombards a DNS server with an overwhelming number of DNS queries. This is usually done using a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">DDoS botnet</a>. The sheer volume of queries can overwhelm the DNS server, making it difficult or impossible for it to respond to legitimate queries. This can result in the aforementioned service disruptions, delays or even an outage for those trying to access the websites or services that rely on the targeted DNS server.</p><p>On the other hand, a <b>DNS amplification</b> attack involves sending a small query with a spoofed IP address (the address of the victim) to a DNS server. The trick here is that the DNS response is significantly larger than the request. The server then sends this large response to the victim's IP address. By exploiting open DNS resolvers, the attacker can amplify the volume of traffic sent to the victim, leading to a much more significant impact. This type of attack not only disrupts the victim but also can congest entire networks.</p><p>In both cases, the attacks exploit the critical role of DNS in network operations. Mitigation strategies typically include securing DNS servers against misuse, implementing rate limiting to manage traffic, and filtering DNS traffic to identify and block malicious requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UolIGOVG2jx7ST3CeoF0j/2b78eeb7eb633c49394390086a641dc5/pasted-image-0--18--1.png" />
            
            </figure><p>Top attack vectors</p><p>Amongst the emerging threats we track, we recorded a 1,161% increase in ACK-RST Floods as well as a 515% increase in CLDAP floods, and a 243% increase in SPSS floods, in each case as compared to last quarter. Let’s walk through some of these attacks and how they’re meant to cause disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ac5D51H55vXbKPbWnSGEx/c4c12e4aadc06d6843f7d4c33b60679f/pasted-image-0--19-.png" />
            
            </figure><p>Top emerging attack vectors</p>
    <div>
      <h3>ACK-RST floods</h3>
      <a href="#ack-rst-floods">
        
      </a>
    </div>
    <p>An ACK-RST Flood exploits the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Transmission Control Protocol (TCP)</a> by sending numerous ACK and RST packets to the victim. This overwhelms the victim's ability to process and respond to these packets, leading to service disruption. The attack is effective because each ACK or RST packet prompts a response from the victim’s system, consuming its resources. ACK-RST Floods are often difficult to filter since they mimic legitimate traffic, making detection and mitigation challenging.</p>
    <div>
      <h3>CLDAP floods</h3>
      <a href="#cldap-floods">
        
      </a>
    </div>
    <p>CLDAP (Connectionless Lightweight Directory Access Protocol) is a variant of LDAP (Lightweight Directory Access Protocol). It's used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement which allows attackers to spoof the IP address thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
    <div>
      <h3>SPSS floods</h3>
      <a href="#spss-floods">
        
      </a>
    </div>
    <p>Floods abusing the SPSS (Source Port Service Sweep) protocol is a network attack method that involves sending packets from numerous random or spoofed source ports to various destination ports on a targeted system or network. The aim of this attack is two-fold: first, to overwhelm the victim's processing capabilities, causing service disruptions or network outages, and second, it can be used to scan for open ports and identify vulnerable services. The flood is achieved by sending a large volume of packets, which can saturate the victim's network resources and exhaust the capacities of its firewalls and intrusion detection systems. To mitigate such attacks, it's essential to leverage in-line automated detection capabilities.</p>
    <div>
      <h2>Cloudflare is here to help - no matter the attack type, size, or duration</h2>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we believe that a better Internet is one that is secure, performant, and available to all. No matter the attack type, the attack size, the attack duration or the motivation behind the attack, Cloudflare’s defenses stand strong. Since we pioneered <a href="/unmetered-mitigation">unmetered DDoS Protection in 2017</a>, we’ve made and kept our commitment to make enterprise-grade DDoS protection free for all organizations alike — and of course, without compromising performance. This is made possible by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">unique technology</a> and robust network architecture.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/waf/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>. And, if you’d like to benefit from our easy to use, best-in-class protection against DDoS and other attacks on the Internet, you can sign up — for free! — at <a href="https://www.cloudflare.com/plans/">cloudflare.com</a>. If you’re under attack, register or call the <a href="https://www.cloudflare.com/under-attack-hotline/">cyber emergency hotline number</a> for a rapid response.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Black Friday]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Israel]]></category>
            <guid isPermaLink="false">78R5sLaHmAgKy9ndDVHkN7</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q3]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q3/</link>
            <pubDate>Thu, 26 Oct 2023 13:00:58 GMT</pubDate>
            <description><![CDATA[ In the past quarter, DDoS attacks surged by 65%. Gaming and Gambling companies were the most attacked and Cloudflare mitigated thousands of hyper-volumetric DDoS attacks. The largest attacks we saw peaked at 201 million rps and 2.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vJM3Cw70UHjDC2hq8rRqv/7d62354485355a253d2b997d3249df82/image19.png" />
            
            </figure><p>Welcome to the third DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.</p><p>We see a lot of DDoS attacks of all types and sizes, and our <a href="https://www.cloudflare.com/network/">network</a> is one of the largest in the world spanning more than 300 cities in over 100 countries. Through this network we serve over 64 million HTTP requests per second at peak and about 2.3 billion DNS queries every day. On average, we mitigate 140 billion cyber threats each day. This colossal amount of data gives us a unique vantage point to understand the threat landscape and provide the community access to insightful and actionable DDoS trends.</p><p>In recent weeks, we've also observed a surge in DDoS attacks and other cyber attacks against Israeli newspaper and media websites, as well as financial institutions and government websites. Palestinian websites have also seen a significant increase in DDoS attacks. View the full coverage <a href="/cyber-attacks-in-the-israel-hamas-war/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZyOmncoxhr4spfWrvzu4I/fb65af9e3364a5c9c10551e622f6acb2/pasted-image-0--7--1.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p>
    <div>
      <h2>The global DDoS threat landscape</h2>
      <a href="#the-global-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In the third quarter of 2023, Cloudflare faced one of the most sophisticated and persistent DDoS attack campaigns in recorded history.</p><ol><li><p>Cloudflare mitigated thousands of hyper-volumetric HTTP DDoS attacks, 89 of which exceeded 100 million requests per second (rps) and with the largest peaking at 201 million rps — a figure three times higher than the previous <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/?">largest attack on record</a> (71M rps).</p></li><li><p>The campaign contributed to an overall increase of 65% in HTTP DDoS attack traffic in Q3 compared to the previous quarter. Similarly, L3/4 DDoS attacks also increased by 14% alongside numerous attacks in the terabit-per-second range — the largest attack targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a> and peaked at 2.6 Tbps.</p></li><li><p>Gaming and Gambling companies were bombarded with the largest volume of HTTP DDoS attack traffic, overtaking the Cryptocurrency industry from last quarter.</p></li></ol><p><i>Reminder: an interactive version of this report is also available as a</i> <a href="https://radar.cloudflare.com/reports/ddos-2023-q3"><i>Cloudflare Radar Report</i></a><i>. On</i> <a href="https://radar.cloudflare.com/"><i>Radar</i></a><i>, you can also dive deeper and explore traffic trends, attacks, outages and many more insights for your specific industry, network and country.</i></p>
    <div>
      <h3>HTTP DDoS attacks and hyper-volumetric attacks</h3>
      <a href="#http-ddos-attacks-and-hyper-volumetric-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attack</a> is a DDoS attack over the <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">Hypertext Transfer Protocol (HTTP)</a>. It targets HTTP Internet properties such as mobile application servers, ecommerce websites, and API gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MzFZZekp5KTt2jQlOoG0M/69a332e07a45dcb6c922f7d7f7cc82c0/Untitled.png" />
            
            </figure><p>Illustration of an HTTP DDoS attack</p><p><a href="https://developers.cloudflare.com/support/network/understanding-cloudflare-http2-and-http3-support/#http2">HTTP/2</a>, which accounts for 62% of HTTP traffic, is a version of the protocol that’s meant to improve application performance. The downside is that HTTP/2 can also help <i>improve</i> a botnet’s performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gt0Zfq2TByTxHFxMJe6BP/ccba571bf7ffb3e37782e64ebaa5e0cf/pasted-image-0-1.png" />
            
            </figure><p>Distribution of HTTP versions by Radar</p>
    <div>
      <h3>Campaign of hyper-volumetric DDoS attacks exploiting HTTP/2 Rapid Resets</h3>
      <a href="#campaign-of-hyper-volumetric-ddos-attacks-exploiting-http-2-rapid-resets">
        
      </a>
    </div>
    <p>Starting in late August 2023, Cloudflare and various other vendors were subject to a sophisticated and persistent DDoS attack campaign that exploited the <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack/">HTTP/2 Rapid Reset</a> vulnerability (<a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1zfCtXueNXLlsmlk7A8coq/84f13ed42f5dc510dfc9bad46ed7b8b3/pasted-image-0--1--1.png" />
            
            </figure><p>Illustration of an HTTP/2 Rapid Reset DDoS attack</p><p>The DDoS campaign included thousands of hyper-volumetric DDoS attacks over HTTP/2 that peaked in the range of millions of requests per second. The average attack rate was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WoXAia8UYzUqUvdwsxuXW/eccf1cdae4f0cb46d709b89395004e6a/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks</p><p>Cloudflare’s systems automatically detected and mitigated the vast majority of attacks. We deployed emergency countermeasures and improved our mitigation systems’ efficacy and efficiency to ensure the availability of our network and of our customers’.</p><p>Check out our engineering blog that <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">dives deep into the land of HTTP/2</a>, what we learned and what actions we took to make the Internet safer.</p>
    <div>
      <h3>Hyper-volumetric DDoS attacks enabled by VM-based botnets</h3>
      <a href="#hyper-volumetric-ddos-attacks-enabled-by-vm-based-botnets">
        
      </a>
    </div>
    <p>As we’ve seen in this campaign and previous <a href="/ddos-threat-report-2023-q1/">ones</a>, botnets that leverage cloud computing platforms and exploit HTTP/2 are able to generate up to <b>x5,000</b> more force per botnet node. This allowed them to launch hyper-volumetric DDoS attacks with a small botnet ranging 5-20 thousand nodes alone. To put that into perspective, in the past, IoT based botnets consisted of fleets of millions of nodes and barely managed to reach a few million requests per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aY3QDbXwT06ndT5ruv6Ms/4acf652835acec7f5bd28b0aca80bf32/pasted-image-0--3--1.png" />
            
            </figure><p>Comparison of an Internet of Things (IoT) based botnet and a Virtual Machine (VM) based botnet</p><p>When analyzing the two-month-long DDoS campaign, we can see that Cloudflare infrastructure was the main target of the attacks. More specifically, 19% of all attacks targeted Cloudflare websites and infrastructure. Another 18% targeted Gaming companies, and 10% targeted well known VoIP providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TsjdpB4iSwOB0brlTf454/b0dbbad2c5d475fc719d76423328337a/pasted-image-0--4--1.png" />
            
            </figure><p>Top industries targeted by the HTTP/2 Rapid Reset DDoS attacks</p>
    <div>
      <h3>HTTP DDoS attack traffic increased by 65%</h3>
      <a href="#http-ddos-attack-traffic-increased-by-65">
        
      </a>
    </div>
    <p>The attack campaign contributed to an overall increase in the amount of attack traffic. Last quarter, the volume of HTTP DDoS attacks increased by 15% QoQ. This quarter, it grew even more. Attacks volume increased by 65% QoQ to a total staggering figure of 8.9 trillion HTTP DDoS requests that Cloudflare systems automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GZPXFg1uZKMn9HLpcTQSS/cb9d2cd146b5a2d68baa1b94651f315e/Untitled9.png" />
            
            </figure><p>Aggregated volume of HTTP DDoS attack requests by quarter</p><p>Alongside the 65% increase in HTTP DDoS attacks, we also saw a minor increase of 14% in L3/4 DDoS attacks — similar to the figures we saw in the first quarter of this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60R9Zo2MFYlW9w8KfNge4C/78c978588db6977529abebcfbb8221d3/pasted-image-0--5--1.png" />
            
            </figure><p>L3/4 DDoS attack by quarter</p><p>A rise in large volumetric DDoS attacks contributing to this increase. In Q3, our DDoS defenses automatically detected and mitigated numerous DDoS attacks in the terabit-per-second range. The largest attacks we saw peaked at 2.6 Tbps. This attack was part of a broader campaign that targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a>. It was a <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> that was launched by a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Uxn6gNTYNEWO9KACtfKpN/8cc96fb699be51869db0691269335008/pasted-image-007.png" />
            
            </figure>
    <div>
      <h2>Top sources of HTTP DDoS attacks</h2>
      <a href="#top-sources-of-http-ddos-attacks">
        
      </a>
    </div>
    <p>When comparing the global and country-specific HTTP DDoS attack request volume, we see that the US remains the largest source of HTTP DDoS attacks. One out of every 25 HTTP DDoS requests originated from the US. China remains in second place. Brazil replaced Germany as the third-largest source of HTTP DDoS attacks, as Germany fell to fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50dCj8uTPa6ovls8JnBbeV/0e84a5263c930cb59616544d82bc91fd/pasted-image-0--6-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to all attack traffic</p><p>Some countries naturally receive more traffic due to various factors such as the population and Internet usage, and therefore also receive/generate more attacks. So while it’s interesting to understand the total amount of attack traffic originating from or targeting a given country, it is also helpful to remove that bias by normalizing the attack traffic by all traffic to a given country.</p><p>When doing so, we see a different pattern. The US doesn’t even make it into the top ten. Instead, Mozambique is in first place (again). One out of every five HTTP requests that originated from Mozambique was part of an HTTP DDoS attack traffic.</p><p>Egypt remains in second place — approximately 13% of requests originating from Egypt were part of an HTTP DDoS attack. Libya and China follow as the third and fourth-largest source of HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wuw45dUbZjsMYTpxcaFrv/b065d46bbfcbff8466a570a97d3c022b/pasted-image-0--8-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top sources of L3/4 DDoS attacks</h2>
      <a href="#top-sources-of-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When we look at the origins of L3/4 DDoS attacks, we ignore the source IP address because it can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. Instead, we rely on the location of Cloudflare’s data center where the traffic was ingested. Thanks to our large network and global coverage, we’re able to achieve geographical accuracy to understand where attacks come from.</p><p>In Q3, approximately 36% of all <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4 DDoS attack</a> traffic that we saw originated from the US. Far behind, Germany came in second place with 8% and the UK followed in third place with almost 5%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RrBJ1xpV90NhBGOAmP3Au/bb3251e7566f5715b2e70737569efc75/pasted-image-0--9-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to all attack traffic</p><p>When normalizing the data, we see that Vietnam dropped to the second-largest source of L3/4 DDoS attacks after being first for two consecutive quarters. New Caledonia, a French territory comprising dozens of islands in the South Pacific, grabbed the first place. Two out of every four bytes ingested in Cloudflare’s data centers in New Caledonia were attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m7OrC60ttRI190S1ripAi/acc86e9508f687fbb4e1d7afb2199994/pasted-image-0--10-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top attacked industries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-industries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>In terms of absolute volume of HTTP DDoS attack traffic, the Gaming and Gambling industry jumps to first place overtaking the Cryptocurrency industry. Over 5% of all HTTP DDoS attack traffic that Cloudflare saw targeted the Gaming and Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4g1US6Pgze6K9cktcoxExV/356942816a4b30030ba953059f5462e3/pasted-image-0--11--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to all attack traffic</p><p>The Gaming and Gambling industry has long been one of the most attacked industries compared to others. But when we look at the HTTP DDoS attack traffic relative to each specific industry, we see a different picture. The Gaming and Gambling industry has so much user traffic that, despite being the most attacked industry <i>by volume</i>, it doesn’t even make it into the top ten when we put it into the per-industry context.</p><p>Instead, what we see is that the Mining and Metals industry was targeted by the most attacks compared to its total traffic — 17.46% of all traffic to Mining and Metals companies were DDoS attack traffic.</p><p>Following closely in second place, 17.41% of all traffic to Non-profits were HTTP DDoS attacks. Many of these attacks are directed at more than 2,400 Non-profit and independent media organizations in 111 countries that Cloudflare protects for free as part of Project Galileo, which celebrated its <a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">ninth anniversary</a> this year. Over the past quarter alone, Cloudflare mitigated an average of 180.5 million cyber threats against Galileo-protected websites every day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IdazsRvY8JcFF5ByZprTK/e7d3886bde7415b9ebca9509dc0d5b91/pasted-image-0--12--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to their own traffic</p><p>Pharmaceuticals, Biotechnology and Health companies came in third, and US Federal Government websites in fourth place. Almost one out of every 10 HTTP requests to US Federal Government Internet properties were part of an attack. In fifth place, Cryptocurrency and then Farming and Fishery not far behind.</p>
    <div>
      <h3>Top attacked industries by region</h3>
      <a href="#top-attacked-industries-by-region">
        
      </a>
    </div>
    <p>Now let’s dive deeper to understand which industries were targeted the most in each region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SgX9S1bbrxWXAQHtWECiz/ec7a1d4c2cfc8c65aa82943d721249e2/Top-Attacked-Industry-by-Region-Q3-2023.png" />
            
            </figure><p>HTTP DDoS attacks: Top industries targeted by HTTP DDoS attacks by region</p>
    <div>
      <h2>Regional deepdives</h2>
      <a href="#regional-deepdives">
        
      </a>
    </div>
    
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    <p>After two consecutive quarters as the most attacked industry, the Telecommunications industry dropped from first place to fourth. Media Production companies were the most attacked industry in Africa. The Banking, Financial Services and Insurance (BFSI) industry follows as the second most attacked. Gaming and Gambling companies in third.</p>
    <div>
      <h3>Asia</h3>
      <a href="#asia">
        
      </a>
    </div>
    <p>The Cryptocurrency industry remains the most attacked in APAC for the second consecutive quarter. Gaming and Gambling came in second place. Information Technology and Services companies in third.</p>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>For the fourth consecutive quarter, the Gaming and Gambling industry remains the most attacked industry in Europe. Retail companies came in second, and Computer Software companies in third.</p>
    <div>
      <h3>Latin America</h3>
      <a href="#latin-america">
        
      </a>
    </div>
    <p>Farming was the most targeted industry in Latin America in Q3. It accounted for a whopping 53% of all attacks towards Latin America. Far behind, Gaming and Gambling companies were the second most targeted. Civic and Social Organizations were in third.</p>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    <p>Retail companies were the most targeted in the Middle East in Q3. Computer Software companies came in second and the Gaming and Gambling industry in third.</p>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    <p>After two consecutive quarters, the Marketing and Advertising industry dropped from the first place to the second. Computer Software took the lead. In third place, Telecommunications companies.</p>
    <div>
      <h3>Oceania</h3>
      <a href="#oceania">
        
      </a>
    </div>
    <p>The Telecommunications industry was, by far, the most targeted in Oceania in Q3 — over 45% of all attacks to Oceania. Cryptocurrency and Computer Software companies came in second and third places respectively.</p>
    <div>
      <h2>Top attacked industries by L3/4 DDoS attacks</h2>
      <a href="#top-attacked-industries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When descending the layers of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>, the Internet networks and services that were most targeted belonged to the Information Technology and Services industry. Almost 35% of all L3/4 DDoS attack traffic (in bytes) targeted the Information Technology and Internet industry.</p><p>Far behind, Telecommunication companies came in second with a mere share of 3%. Gaming and Gambling came in third, Banking, Financial Services and Insurance companies (BFSI) in fourth.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MfrOUrxk9nvOVu3UJz4VN/f8297c3bb90969df2b1a5530621c0fd5/pasted-image-0--13--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to all attack traffic</p><p>When comparing the attacks on industries to all traffic for that specific industry, we see that the Music industry jumps to the first place, followed by Computer and Network Security companies, Information Technology and Internet companies and Aviation and Aerospace.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DfOZGUxDtZjNG32es9K4K/ecb5f8a71a998a896dfd71592c6f4896/pasted-image-0--14--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to their own traffic</p>
    <div>
      <h2>Top attacked countries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-countries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>When examining the total volume of attack traffic, the US remains the main target of HTTP DDoS attacks. Almost 5% of all HTTP DDoS attack traffic targeted the US. Singapore came in second and China in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UGa4GWaTX9dLLMudmE8x8/c781750cd8b72074946581454d350ed0/pasted-image-0--15--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to all traffic</p><p>If we normalize the data per country and region and divide the attack traffic by the total traffic, we get a different picture. The top three most attacked countries are Island nations.</p><p>Anguilla, a small set of islands east of Puerto Rico, jumps to the first place as the most attacked country. Over 75% of all traffic to Anguilla websites were HTTP DDoS attacks. In second place, American Samoa, a group of islands east of Fiji. In third, the British Virgin Islands.</p><p>In fourth place, Algeria, and then Kenya, Russia, Vietnam, Singapore, Belize, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dKlIvgbduDoug2Zlxn49q/2f8fdf78b30024ddb05e7b2aedef3da3/pasted-image-0--16-.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h3>Top attacked countries by L3/4 DDoS attacks</h3>
      <a href="#top-attacked-countries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>For the second consecutive quarter, Chinese Internet networks and services remain the most targeted by L3/4 DDoS attacks. These China-bound attacks account for 29% of all attacks we saw in Q3.</p><p>Far, far behind, the US came in second place (3.5%) and Taiwan in third place (3%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1MliH893yCW3CV3jqpjZmw/0ca7b37530fc93682052961774b52c19/pasted-image-0--17-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to all traffic</p><p>When normalizing the amount of attack traffic compared to all traffic to a country, China remains in first place and the US disappears from the top ten. Cloudflare saw that 73% of traffic to China Internet networks were attacks. However, the normalized ranking changes from second place on, with the Netherlands receiving the second-highest proportion of attack traffic (representing 35% of the country’s overall traffic), closely followed by Thailand, Taiwan and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m9M6zzn5dSwaubzw5PXQG/a3b6cdff495954f94a9173206142d8c3/pasted-image-0--18-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h2>Top attack vectors</h2>
      <a href="#top-attack-vectors">
        
      </a>
    </div>
    <p>The Domain Name System, or <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, serves as the phone book of the Internet. DNS helps translate the human-friendly website address (e.g., <a href="https://www.cloudflare.com/">www.cloudflare.com</a>) to a machine-friendly IP address (e.g., 104.16.124.96). By disrupting DNS servers, attackers impact the machines’ ability to connect to a website, and by doing so making websites unavailable to users.</p><p>For the second consecutive quarter, <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS-based DDoS attacks</a> were the most common. Almost 47% of all attacks were DNS-based. This represents a 44% increase compared to the previous quarter. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> remain in second place, followed by RST floods, <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>, and <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YGOLx5BKnhvVEXB8awpxU/2b651344c3572a0c0aa2e5fdf3dbf9f2/pasted-image-0--19-.png" />
            
            </figure><p>Top attack vectors</p>
    <div>
      <h3>Emerging threats - <i>reduced, reused and recycled</i></h3>
      <a href="#emerging-threats-reduced-reused-and-recycled">
        
      </a>
    </div>
    <p>Aside from the most common attack vectors, we also saw significant increases in lesser known attack vectors. These tend to be very volatile as threat actors try to <i>“reduce, reuse and recycle”</i> older attack vectors. These tend to be UDP-based protocols that can be exploited to launch amplification and reflection DDoS attacks.</p><p>One well-known tactic that we continue to see is the use of amplification/reflection attacks. In this attack method, the attacker bounces traffic off of servers, and aims the responses towards their victim. Attackers are able to aim the bounced traffic to their victim by various methods such as <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a>.</p><p>Another form of reflection can be achieved differently in an attack named ‘DNS Laundering attack’. In a DNS Laundering attack, the attacker will query subdomains of a domain that is managed by the victim’s DNS server. The prefix that defines the subdomain is randomized and is never used more than once or twice in such an attack. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes all together.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sMVuA99lvODrsKQNBXFqs/e67a7b2cc1c7f07ba0642b25768a7142/pasted-image-0--20-.png" />
            
            </figure><p>Illustration of a reflection and amplification attack</p><p>Overall in Q3, Multicast DNS (mDNS) based DDoS attacks was the attack method that increased the most. In second place were attacks that exploit the Constrained Application Protocol (CoAP), and in third, the Encapsulating Security Payload (ESP). Let’s get to know those attack vectors a little better.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zpAljr3yzAfQXITi9rSnX/83db014c34690385fa4f09f15171b0af/pasted-image-0--21-.png" />
            
            </figure><p>Main emerging threats</p>
    <div>
      <h3>mDNS DDoS attacks increased by 456%</h3>
      <a href="#mdns-ddos-attacks-increased-by-456">
        
      </a>
    </div>
    <p>Multicast DNS (mDNS) is a UDP-based protocol that is used in local networks for service/device discovery. Vulnerable mDNS servers respond to unicast queries originating outside the local network, which are ‘spoofed’ (altered) with the victim's source address. This results in amplification attacks. In Q3, we noticed a large increase of mDNS attacks; a 456% increase compared to the previous quarter.</p>
    <div>
      <h3>CoAP DDoS attacks increased by 387%</h3>
      <a href="#coap-ddos-attacks-increased-by-387">
        
      </a>
    </div>
    <p>The Constrained Application Protocol (CoAP) is designed for use in simple electronics and enables communication between devices in a low-power and lightweight manner. However, it can be abused for DDoS attacks via <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a> or amplification, as malicious actors exploit its multicast support or leverage poorly configured CoAP devices to generate large amounts of unwanted network traffic. This can lead to service disruption or overloading of the targeted systems, making them unavailable to legitimate users.</p>
    <div>
      <h3>ESP DDoS attacks increased by 303%</h3>
      <a href="#esp-ddos-attacks-increased-by-303">
        
      </a>
    </div>
    <p>The Encapsulating Security Payload (<a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/#:~:text=Encapsulating%20Security%20Protocol%20(ESP)">ESP</a>) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> and provides confidentiality, authentication, and integrity to network communications. However, it could potentially be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to mitigate the risks of DDoS attacks.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Occasionally, DDoS attacks are carried out to extort ransom payments. We’ve been surveying Cloudflare customers over three years now, and have been tracking the occurrence of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> events.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78OHC3lsv0ffsK9Yul14GD/d7006d3f770e766373d0c334204f668b/Untitled--1--1.png" />
            
            </figure><p>Comparison of Ransomware and Ransom DDoS attacks</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where victims typically fall prey to downloading a malicious file or clicking on a compromised email link which locks, deletes, or leaks their files until a ransom is paid, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much simpler for threat actors to execute. Ransom DDoS attacks bypass the need for deceptive tactics such as luring victims into opening dubious emails or clicking on fraudulent links, and they don't necessitate a breach into the network or access to corporate resources.</p><p>Over the past quarter, reports of Ransom DDoS attacks continue to decrease. Approximately 8% of respondents reported being threatened or subject to Random DDoS attacks, which continues a decline we've been tracking throughout the year. Hopefully it is because threat actors have realized that organizations will not pay them (which is our <a href="https://www.cloudflare.com/ransom-ddos/">recommendation</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19HOqqLzAWDtf28tnsQg5w/03bb32015896bb211edcb3f63e142e09/pasted-image-0--22-.png" />
            
            </figure><p>Ransom DDoS attacks by quarter</p><p>However, keep in mind that this is also very seasonal, and we can expect an increase in ransom DDoS attacks during the months of November and December. If we look at Q4 numbers from the past three years, we can see that Ransom DDoS attacks have been significantly increasing YoY in November. In previous Q4s, it reached a point where one out of every four respondents reported being subject to Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ch5GcIORAOzfXzBwd8XsM/3d881a3b619861bb82bb1d93d11f01f4/pasted-image-0--23-.png" />
            
            </figure>
    <div>
      <h2>Improving your defenses in the era of hyper-volumetric DDoS attacks</h2>
      <a href="#improving-your-defenses-in-the-era-of-hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In the past quarter, we saw an unprecedented surge in DDoS attack traffic. This surge was largely driven by the hyper-volumetric HTTP/2 DDoS attack campaign.</p><p>Cloudflare customers using our HTTP reverse proxy, i.e. our CDN/WAF services, are <a href="https://www.cloudflare.com/h2/">already protected</a> from these and other HTTP DDoS attacks. Cloudflare customers that are using non-HTTP services and organizations that are not using Cloudflare at all are strongly encouraged to use an automated, always-on HTTP DDoS Protection service for their HTTP applications.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://www.cloudflare.com/application-services/solutions/api-security/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>...<b>Report methodologies</b>Learn more about our methodologies and how we generate these insights: <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports">https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[HTTP2]]></category>
            <category><![CDATA[Rapid Reset]]></category>
            <guid isPermaLink="false">M67SmSyk26u5hjiQgLBKv</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cyber attacks in the Israel-Hamas war]]></title>
            <link>https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/</link>
            <pubDate>Mon, 23 Oct 2023 13:32:05 GMT</pubDate>
            <description><![CDATA[ Since the October 7 Hamas attack, DDoS attackers have been targeting Israeli newspaper and media websites as well as software companies and financial institutions.  ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hPpyyUgUESidx85xM0vwS/b9caf55d788a9ea08a485760f94484b9/image11-1.png" />
            
            </figure><p>On October 7, 2023, at 03:30 GMT (06:30 AM local time), Hamas attacked Israeli cities and fired thousands of rockets toward populous locations in southern and central Israel, including Tel Aviv and Jerusalem. Air raid sirens began sounding, instructing civilians to take cover.</p><p>Approximately twelve minutes later, Cloudflare systems automatically detected and mitigated DDoS attacks that targeted websites that provide critical information and alerts to civilians on rocket attacks. The initial attack peaked at 100k requests per second (rps) and lasted ten minutes. Forty-five minutes later, a second much larger attack struck and peaked at 1M rps. It lasted six minutes. Additional smaller DDoS attacks continued hitting the websites in the next hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T9nPeyiDM1nkxIzzsXRtD/c9fbbff0ae332fc16d2fe9bc2592338c/image9.png" />
            
            </figure><p>DDoS attacks against Israeli websites that provide civilians information and alerts on rocket attacks</p>
    <div>
      <h3>Not just DDoS attacks</h3>
      <a href="#not-just-ddos-attacks">
        
      </a>
    </div>
    <p>Multiple Israeli websites and mobile apps have become targets of various pro-Palestinian hacktivist groups. According to <a href="https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/">Cybernews</a>, one of those groups, AnonGhost, exploited a vulnerability in a mobile app that alerts Israeli civilians of incoming rockets, “Red Alert: Israel”. The exploit allowed them to intercept requests, expose servers and APIs, and send fake alerts to some app users, including a message that a “<a href="https://www.bitdefender.co.uk/blog/hotforsecurity/hacktivists-send-fake-nuclear-attack-warning-via-israeli-red-alert-app/">nuclear bomb is coming</a>”. AnonGhost also claimed to have attacked various other rocket alert apps.</p><p>On October 14, we revealed the findings of one of our investigations that was conducted by the <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> Threat Operations team, who identified malicious Android mobile applications impersonating the legitimate RedAlert - Rocket Alerts application. The malicious apps obtained access to sensitive user information such as mobile phone’s contacts list, SMS messages, phone call logs, installed applications, and information about the phone and SIM card themselves. More technical information about our investigation can be found <a href="/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Kg7GPzXQFxZ9SdCs32vLW/974a879ec6252d7103f7a26cdddbd912/image10.png" />
            
            </figure><p>Screenshot of the malicious site linking to malicious mobile apps</p><p>Furthermore, Cloudflare has identified an Israeli website that was partially defaced by AnonGhost. This website was not using Cloudflare, but we have reached out to the organization to offer support.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F8LCkvQVy1UfmnJRYjnfT/0960e99927d0e76f20cb2552d2243707/image1-7.png" />
            
            </figure><p>“Death to all Jews” in a part of a website that was hacked and defaced by AnonGhost</p>
    <div>
      <h3>Continued DDoS bombardment</h3>
      <a href="#continued-ddos-bombardment">
        
      </a>
    </div>
    <p>In the days following the October 7 attack, Israeli websites have been heavily targeted by DDoS attacks. Cloudflare has been helping onboard and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect</a> many of them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lycz9VOEUzaHsy2NaePa5/c33b76468cc3efba8ed141934adb4bac/pasted-image-0--7-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p><p>Since the October 7, 2023, attack, Newspaper and Media websites have been the main target of DDoS attacks — accounting for 56% of all attacks against Israeli websites. We saw the same trends when Russia attacked Ukraine. Ukrainian media and broadcasting websites were highly targeted. The war on the ground is often accompanied by cyber attacks on websites that provide crucial information for civilians.</p><p>The second most targeted industry in Israel was the Computer Software industry. Almost 34% of all DDoS attacks targeted computer software companies. In third place, and more significantly, Banking, Financial Services and Insurance (BFSI) companies were attacked. Government Administration websites came in fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FRvEJoNnw3qEgW32epI50/9e1332d2c1da54e22dbcafab6ec4ede6/pasted-image-0.png" />
            
            </figure><p>Top Israeli industries targeted by HTTP DDoS attacks</p><p>We can also see that Israeli newspaper and media websites were targeted immediately after the October 7 attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c1zBhgtBTLzcvUHZP700N/9a8e47ecc5c725e7ddd75a01c6b8e308/pasted-image-0--1-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare by industry</p><p>Since October 1, 2023, Cloudflare automatically detected and mitigated over 5 billion HTTP requests that were part of DDoS attacks. Before October 7, there were barely any HTTP DDoS attack requests towards Israeli websites using Cloudflare.</p><p>However, on the day of the Hamas attack, the percentage of DDoS attack traffic increased. Nearly 1 out of every 100 requests towards Israeli websites using Cloudflare were part of an HTTP DDoS attack. That figure quadrupled on October 8.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IpDQo3fmSaSxChpOjuueC/4dd8aa2ce801bf9957e68de2557ae746/pasted-image-0--2-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Israeli websites using Cloudflare</p>
    <div>
      <h3>Cyber attacks against Palestinian websites</h3>
      <a href="#cyber-attacks-against-palestinian-websites">
        
      </a>
    </div>
    <p>During the same time frame, from October 1, Cloudflare automatically detected and mitigated over 454 million HTTP DDoS attack requests that targeted Palestinian websites using Cloudflare. While that figure is barely a tenth of the amount of attack requests we saw against Israeli websites using Cloudflare, it represented a proportionately larger portion of the overall traffic towards Palestinian websites using Cloudflare.</p><p>On the days before the Hamas attack, we didn't see any DDoS attacks against Palestinian websites using Cloudflare. That changed on October 7; over 46% of all traffic to Palestinian websites using Cloudflare were part of HTTP DDoS attacks.</p><p>On October 9, that figure increased to almost 60%. Nearly 6 out of every 10 HTTP requests towards Palestinian websites using Cloudflare were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FkzbFNIWGQUCcBTgqFwcs/57093f7c528e7f5ce1b51d5362324fba/pasted-image-0--3-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Palestinian websites using Cloudflare</p><p>We can also see these attacks represented in the spikes in the graph below after the Hamas attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29mYQeyKRvU9rIfMUQV4bl/c30752bae7e014c370582e81acb093c2/pasted-image-0--4-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare</p><p>There were three Palestinian industries that were attacked in the past weeks. The absolute majority of HTTP DDoS attacks were against Banking websites — nearly 76% of all attacks. The second most attacked industry was the Internet industry with a share of 24% of all DDoS attacks. Another small share targeted Media Production websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XrX9Uu8Gl5RyDkbA7JTTS/8041903f4aaef7e89f81b2bc6b8869d0/pasted-image-0--5-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare by industry</p>
    <div>
      <h3>Securing your applications and preventing DDoS attacks</h3>
      <a href="#securing-your-applications-and-preventing-ddos-attacks">
        
      </a>
    </div>
    <p>As we’ve seen in recent years, real-world conflicts and wars are always accompanied by cyberattacks. We’ve put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to optimize your defenses against DDoS attacks. You can also follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>Readers are also invited to dive in deeper in the Radar dashboard to view traffic and attack insights and trends in <a href="https://radar.cloudflare.com/il?dateRange=28d">Israel</a> and <a href="https://radar.cloudflare.com/ps?dateRange=28d">Palestine</a>. You can also read more about the <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/">Internet traffic and attack trend in Israel and Palestine</a> following the October 7 attack.</p><p><b><i>Under attack or need additional protection?</i></b> <a href="https://www.cloudflare.com/under-attack-hotline/"><b><i>Click here to get help</i></b></a><b><i>.</i></b></p><p><a href="https://1.1.1.1/family/"><b><i>Click here</i></b></a> <b><i>to protect against malicious mobile apps</i></b></p>
    <div>
      <h3>A note about our methodologies</h3>
      <a href="#a-note-about-our-methodologies">
        
      </a>
    </div>
    <p>The insights that we provide is based on traffic and attacks that we see against websites that are using Cloudflare, unless otherwise stated or referenced to a third party source. More information about our methodologies can be found <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#quarterly-ddos-threat-reports">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">6noA0WeFtBLBNoUMidTP92</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q2/</link>
            <pubDate>Tue, 18 Jul 2023 13:00:48 GMT</pubDate>
            <description><![CDATA[ Q2 2023 saw an unprecedented escalation in DDoS attack sophistication. Pro-Russian hacktivists REvil, Killnet and Anonymous Sudan joined forces to attack Western sites. Mitel vulnerability exploits surged by a whopping 532%, and attacks on crypto rocketed up by 600%. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1HtQ4ytFAGsXMwZQiVY67E/85094d21474f92fa10d86a3f2dbf45b5/image16-1.png" />
            
            </figure><p>Welcome to the second DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.</p><p>We see a lot of DDoS attacks of all types and sizes and our <a href="https://www.cloudflare.com/network/">network</a> is one of the largest in the world spanning more than 300 cities in over 100 countries. Through this network we serve over 63 million HTTP requests per second at peak and over 2 trillion DNS queries every day. This colossal amount of data gives us a unique vantage point to provide the community access to insightful DDoS trends.</p><p>For our regular readers, you might notice a change in the layout of this report. We used to follow a set pattern to share our insights and trends about DDoS attacks. But with the landscape of DDoS threats changing as DDoS attacks have become more powerful and sophisticated, we felt it's time for a change in how we present our findings. So, we'll kick things off with a quick global overview, and then dig into the major shifts we're seeing in the world of DDoS attacks.</p><p><i>Reminder: an interactive version of this report is also available on </i><a href="https://radar.cloudflare.com/reports/ddos-2023-q2"><i>Cloudflare Radar</i></a><i>. Furthermore, we’ve also added a new </i><a href="https://radar.cloudflare.com/security-and-attacks"><i>interactive component</i></a><i> that will allow you to dive deeper into attack activity in each country or region.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xYYEEcCUAFlwSPNwEM8wq/0e845397981e98e555ba3af79df98745/pasted-image-0.png" />
            
            </figure><p>New interactive Radar graph to shed light on local DDoS activity</p>
    <div>
      <h2>The DDoS landscape: a look at global patterns</h2>
      <a href="#the-ddos-landscape-a-look-at-global-patterns">
        
      </a>
    </div>
    <p>The second quarter of 2023 was characterized by thought-out, tailored and persistent waves of DDoS attack campaigns on various fronts, including:</p><ol><li><p>Multiple DDoS offensives orchestrated by pro-Russian hacktivist groups REvil, Killnet and <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Sudan</a> against Western interest websites.</p></li><li><p>An increase in deliberately engineered and targeted DNS attacks alongside a 532% surge in DDoS attacks exploiting the Mitel vulnerability (<a href="/cve-2022-26143-amplification-attack/">CVE-2022-26143</a>). Cloudflare contributed to disclosing this zero-day vulnerability last year.</p></li><li><p>Attacks targeting Cryptocurrency companies increased by 600%, as a broader 15% increase in HTTP DDoS attacks was observed. Of these, we’ve noticed an alarming escalation in attack sophistication which we will cover more in depth.</p></li></ol><p>Additionally, one of the largest attacks we’ve seen this quarter was an <a href="https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/">ACK flood</a> DDoS attack which originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a> comprising approximately 11K IP addresses. The attack targeted an American Internet Service Provider. It peaked at 1.4 terabit per seconds (Tbps) and was automatically detected and mitigated by Cloudflare’s systems.</p><p>Despite general figures indicating an increase in overall attack durations, most of the attacks are short-lived and so was this one. This attack lasted only two minutes. However, more broadly, we’ve seen that <b>attacks exceeding 3 hours have increased by 103% QoQ.</b></p><p>Now having set the stage, let’s dive deeper into these shifts we’re seeing in the DDoS landscape.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rQBJ0xu8GBZ0wIczlXXZM/6dde6624e6b6f1c390ffe9f4d4346983/pasted-image-0--1-.png" />
            
            </figure><p>Mirai botnet attacks an American Service Provider, peaks at 1.4 Tbps</p>
    <div>
      <h2>Hacktivist alliance dubbed “Darknet Parliament” aims at Western banks and SWIFT network</h2>
      <a href="#hacktivist-alliance-dubbed-darknet-parliament-aims-at-western-banks-and-swift-network">
        
      </a>
    </div>
    <p>On June 14, Pro-Russian hacktivist groups Killnet, a resurgence of REvil and Anonymous Sudan <a href="https://www.darkreading.com/risk/killnet-threatens-imminent-swift-world-banking-attacks">announced that they have joined forces to execute “massive” cyber attacks on the Western financial system</a> including European and US banks, and the US Federal Reserve System. The collective, dubbed “Darknet Parliament”, declared its first objective was to paralyze <a href="https://en.wikipedia.org/wiki/SWIFT">SWIFT</a> (Society for Worldwide Interbank Financial Telecommunication). A successful DDoS attack on SWIFT could have dire consequences because it's the main service used by financial institutions to conduct global financial transactions.</p><p>Beyond a handful of publicized events such as the <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-azure-outlook-outages-caused-by-ddos-attacks/">Microsoft outage</a> which was reported by the media, we haven’t observed any novel DDoS attacks or disruptions targeting our customers. Our systems have been automatically detecting and mitigating attacks associated with this campaign. Over the past weeks, as many as 10,000 of these DDoS attacks were launched by the Darknet Parliament against Cloudflare-protected websites (see graph below).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/24AFPX3ceQZ79oTM9Iyy5F/ee099e1d6a69490145a4f5940d50ef58/pasted-image-0-1.png" />
            
            </figure><p>REvil, Killnet and Anonymous Sudan attacks</p><p>Despite the hacktivists’ statements, Banking and Financial Services websites were only the ninth most attacked industry — based on attacks we’ve seen against our customers as part of this campaign.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BjN8VAxmKmeHZYZfejF5m/878292c937a3c6349cc6479dbcd29cc1/pasted-image-0--2-.png" />
            
            </figure><p>Top industries attacked by the REvil, Killnet and Anonymous Sudan attack campaign</p><p>The most attacked industries were Computer Software, Gambling &amp; Casinos and Gaming. Telecommunications and Media outlets came in fourth and fifth, respectively. Overall, the largest attack we witnessed in this campaign peaked at 1.7 million requests per second (rps) and the average was 65,000 rps.</p><p>For perspective, earlier this year we mitigated the <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">largest attack in recorded history peaking at 71 million rps</a>. So these attacks were very small compared to <i>Cloudflare scale</i>, but not necessarily for an average website. Therefore, we shouldn’t underestimate the damage potential on unprotected or suboptimally configured websites.</p>
    <div>
      <h3>Sophisticated HTTP DDoS attacks</h3>
      <a href="#sophisticated-http-ddos-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attack</a> is a DDoS attack over the <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">Hypertext Transfer Protocol (HTTP)</a>. It targets HTTP Internet properties such as websites and API gateways. Over the past quarter, HTTP DDoS attacks increased by 15% quarter-over-quarter (QoQ) despite a 35% decrease year-over-year (YoY).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dW23GdkaXpftyb5Qvs1N5/6c60aee62af67bfc6e4e33879e7250e3/DDoS-HTTP-Application.png" />
            
            </figure><p>Illustration of an HTTP DDoS attack</p><p>Additionally, we've observed an alarming uptick in highly-randomized and sophisticated HTTP DDoS attacks over the past few months. It appears as though the threat actors behind these attacks have deliberately engineered the attacks to try and overcome mitigation systems by adeptly imitating browser behavior very accurately, in some cases, by introducing a high degree of randomization on various properties such as <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent">user agents</a> and <a href="https://developers.cloudflare.com/bots/concepts/ja3-fingerprint/">JA3 fingerprints</a> to name a few. An example of such an attack is provided below. Each different color represents a different randomization feature.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64x6SSnpgH0Ep2pKPQMsoy/d1e751cc5887159ca6a48a272bf389a6/pasted-image-0--3-.png" />
            
            </figure><p>Example of a highly randomized HTTP DDoS attack</p><p>Furthermore, in many of these attacks, it seems that the threat actors try to keep their attack rates-per-second relatively low to try and avoid detection and hide amongst the legitimate traffic.</p><p>This level of sophistication has previously been associated with state-level and state-sponsored threat actors, and it seems these capabilities are now at the disposal of cyber criminals. Their operations have already targeted prominent businesses such as a large <a href="https://www.cloudflare.com/learning/video/what-is-voip/">VoIP</a> provider, a leading semiconductor company, and a major payment &amp; credit card provider to name a few.</p><p>Protecting websites against sophisticated HTTP DDoS attacks requires intelligent protection that is automated and fast, that leverages threat intelligence, traffic profiling and Machine Learning/statistical analysis to differentiate between attack traffic and user traffic. Moreover, even increasing <a href="https://developers.cloudflare.com/cache/">caching</a> where applicable can help reduce the risk of attack traffic impacting your origin. Read more about <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> best practices <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">here</a>.</p>
    <div>
      <h3>DNS Laundering DDoS attacks</h3>
      <a href="#dns-laundering-ddos-attacks">
        
      </a>
    </div>
    <p>The Domain Name System, or <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, serves as the phone book of the Internet. DNS helps translate the human-friendly website address (e.g. <a href="http://www.cloudflare.com">www.cloudflare.com</a>) to a machine-friendly IP address (e.g. 104.16.124.96). By disrupting DNS servers, attackers impact the machines’ ability to connect to a website, and by doing so making websites unavailable to users.</p><p>Over the past quarter, the most common attack vector was <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS-based DDoS attacks</a> — 32% of all DDoS attacks were over the DNS protocol. Amongst these, one of the more concerning attack types we’ve seen increasing is the <i>DNS Laundering attack</i> which can pose severe challenges to organizations that operate their own <a href="https://www.cloudflare.com/learning/dns/dns-server-types/#:~:text=What%20is%20an%20authoritative%20nameserver%3F">authoritative DNS servers</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4suDM0V6shZ1D6QXG8HgJx/c7813fe912384694ebb8239e2b5348d3/pasted-image-0--4-.png" />
            
            </figure><p>Top DDoS attack vectors in 2023 Q2</p><p>The term “Laundering” in the DNS Laundering attack name refers to the analogy of money laundering, the devious process of making illegally-gained proceeds, often referred to as "dirty money," appear legal. Similarly, in the DDoS world, a DNS Laundering attack is the process of making bad, malicious traffic appear as good, legitimate traffic by laundering it via reputable <a href="https://www.cloudflare.com/learning/dns/dns-server-types/#:~:text=What%20is%20a%20DNS%20recursive%20resolver%3F">recursive DNS resolvers</a>.</p><p>In a DNS Laundering attack, the threat actor will query subdomains of a domain that is managed by the victim’s DNS server. The prefix that defines the subdomain is randomized and is never used more than once or twice in such an attack. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes all together.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35ih4bBRoWVOjaBul8pM3u/f415b410247eab186b6779be93f8980d/DNS-Laundering-attack.png" />
            
            </figure><p>Illustration of a DNS Laundering DDoS attack</p><p>From the protection point of view, the DNS administrators can’t block the attack source because the source includes reputable recursive DNS servers like Google’s 8.8.8.8 and Cloudflare’s 1.1.1.1. The administrators also cannot block all queries to the attacked domain because it is a valid domain that they want to preserve access to legitimate queries.</p><p>The above factors make it very challenging to distinguish legitimate queries from malicious ones. A large Asian financial institution and a North American DNS provider are amongst recent victims of such attacks. An example of such an attack is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5syXqOfRwxilKlAODokApw/446686a8665bbf18ad2f69786072cede/pasted-image-0--5-.png" />
            
            </figure><p>Example of a DNS Laundering DDoS attack</p><p>Similar to the protection strategies outlined for HTTP applications, protecting DNS servers also requires a precise, fast, and automated approach. Leveraging a <a href="https://developers.cloudflare.com/dns/">managed DNS service</a> or a <a href="https://developers.cloudflare.com/dns/dns-firewall/">DNS reverse proxy</a> such as Cloudflare’s can help absorb and mitigate the attack traffic. For those more sophisticated DNS attacks, a more intelligent solution is required that leverages statistical analysis of historical data to be able to differentiate between legitimate queries and attack queries.</p>
    <div>
      <h2>The rise of the Virtual Machine Botnets</h2>
      <a href="#the-rise-of-the-virtual-machine-botnets">
        
      </a>
    </div>
    <p>As we’ve <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">previously disclosed</a>, we are witnessing an evolution in botnet <i>DNA</i>. The era of VM-based DDoS botnets has arrived and with it <i>hyper-volumetric</i> DDoS attacks. These botnets are comprised of Virtual Machines (VMs, or Virtual Private Servers, VPS) rather than Internet of Things (IoT) devices which makes them so much more powerful, up to 5,000 times stronger.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70XmHWLipSPS279wzBJeVq/9ab463740bf2324e550c86e4dac8bb77/pasted-image-0--6-.png" />
            
            </figure><p>Illustration of an IoT botnet compared with a VM Botnet</p><p>Because of the computational and bandwidth resources that are at the disposal of these VM-based botnets, they’re able to generate hyper-volumetric attacks with a much smaller fleet size compared to IoT-based botnets.</p><p>These botnets have executed one largest recorded DDoS attacks including the <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million request per second DDoS attack</a>. Multiple organizations including an industry-leading gaming platform provider have already been targeted by this new generation of botnets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HBf1qeb9Yhm5OITU2dSl9/70e3ce9e1c6756bc7eb713900f2ba631/image1-67.png" />
            
            </figure><p>Cloudflare has proactively collaborated with prominent cloud computing providers to combat these new botnets. Through the quick and dedicated actions of these providers, significant components of these botnets have been neutralized. Since this intervention, we have not observed any further hyper-volumetric attacks yet, a testament to the efficacy of our collaboration.</p><p>While we already enjoy a fruitful alliance with the cybersecurity community in countering botnets when we identify large-scale attacks, our goal is to streamline and automate this process further. We extend an invitation to cloud computing providers, hosting providers, and other general service providers to join <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">Cloudflare’s free Botnet Threat Feed</a>. This would provide visibility into attacks originating within their networks, contributing to our collective efforts to dismantle botnets.</p>
    <div>
      <h2>“Startblast”: Exploiting Mitel vulnerabilities for DDoS attacks</h2>
      <a href="#startblast-exploiting-mitel-vulnerabilities-for-ddos-attacks">
        
      </a>
    </div>
    <p>In March 2022, we <a href="/cve-2022-26143-amplification-attack/">disclosed a zero-day vulnerability</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26143">CVE-2022-26143</a>), named TP240PhoneHome, which was identified in the <a href="https://www.mitel.com/products/applications/collaboration/micollab">Mitel MiCollab</a> business phone system, exposing the system to UDP amplification DDoS attacks.</p><p>This exploit operates by reflecting traffic off vulnerable servers, amplifying it in the process, with a factor as high as 220 billion percent. The vulnerability stems from an unauthenticated UDP port exposed to the public Internet, which could allow malicious actors to issue a 'startblast' debugging command, simulating a flurry of calls to test the system.</p><p>As a result, for each test call, two UDP packets are sent to the issuer, enabling an attacker to direct this traffic to any IP and port number to amplify a DDoS attack. Despite the vulnerability, only a few thousand of these devices are exposed, limiting the potential scale of attack, and attacks must run serially, meaning each device can only launch one attack at a time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3APXynJxjsADpbHiOw2JtO/2f0142ac405c4d71883e91110578625e/pasted-image-0-2.png" />
            
            </figure><p>Top industries targeted by Startblast DDoS attacks</p><p>Overall, in the past quarter, we’ve seen additional emerging threats such as DDoS attacks abusing the TeamSpeak3 protocol. This attack vector increased by a staggering 403% this quarter.</p><p><a href="https://en.wikipedia.org/wiki/TeamSpeak">TeamSpeak</a>, a proprietary <a href="https://en.wikipedia.org/wiki/Voice_over_IP">voice-over-Internet Protocol (VoIP)</a> that runs over UDP to help gamers talk with other gamers in real time. Talking instead of just chatting can significantly improve a gaming team’s efficiency and help them win. DDoS attacks that target TeamSpeak servers may be launched by rival groups in an attempt to disrupt their communication path during real-time multiplayer games and thus impact their team’s performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yxgaijJ7xzLbPDwDpBOZn/d9107db0c1e9afe1c7ddcbcb1646886b/pasted-image-0--1--1.png" />
            
            </figure>
    <div>
      <h2>DDoS hotspots: The origins of attacks</h2>
      <a href="#ddos-hotspots-the-origins-of-attacks">
        
      </a>
    </div>
    <p>Overall, HTTP DDoS attacks increased by 15% QoQ despite a 35% decrease YoY. Additionally, network-layer DDoS attacks decreased this quarter by approximately 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qTRXwci5uW8mWQH0a3mZt/d2575f4369806161e817e5dfd0e69a32/pasted-image-0--9-.png" />
            
            </figure><p>HTTP DDoS attack requests by quarter</p><p>In terms of total volume of attack traffic, the US was the largest source of HTTP DDoS attacks. Three out of every thousand requests we saw were part of HTTP DDoS attacks originating from the US. China came in second place and Germany in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1B5pZE1C0uxIOnbtlHatrE/9bf193bd94e0db980574d8433975aac8/pasted-image-0--10-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>Some countries naturally receive more traffic due to various factors such as market size, and therefore more attacks. So while it’s interesting to understand the total amount of attack traffic originating from a given country, it is also helpful to remove that bias by normalizing the attack traffic by all traffic to a given country.</p><p>When doing so, we see a different pattern. The US doesn’t even make it into the top ten. Instead, Mozambique, Egypt and Finland take the lead as the source countries of the most HTTP DDoS attack traffic relative to all of their traffic. Almost a fifth of all HTTP traffic originating from Mozambique IP addresses were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5X884kp83RsGMwuJHsADsd/3388c9f3a4e67aaf630d06a70fa55d73/pasted-image-0--11-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>Using the same calculation methodology but for bytes, Vietnam remains the largest source of network-layer DDoS attacks (aka <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4 DDoS attacks</a>) for the second consecutive quarter — and the amount even increased by 58% QoQ. Over 41% of all bytes that were ingested in Cloudflare’s Vietnam data centers were part of L3/4 DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IWRTmxWDDC89sZGPlQS4V/de9425ede98bbfe4cb78df45933f62f0/pasted-image-0--12-.png" />
            
            </figure><p>Top source countries of L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country)</p>
    <div>
      <h2>Industries under attack: examining DDoS attack targets</h2>
      <a href="#industries-under-attack-examining-ddos-attack-targets">
        
      </a>
    </div>
    <p>When examining HTTP DDoS attack activity in Q2, Cryptocurrency websites were targeted with the largest amount of HTTP DDoS attack traffic. Six out of every ten thousand HTTP requests towards Cryptocurrency websites behind Cloudflare were part of these attacks. This represents a 600% increase compared to the previous quarter.</p><p>After Crypto, Gaming and Gambling websites came in second place as their attack share increased by 19% QoQ. Marketing and Advertising websites not far behind in third place with little change in their share of attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oFe1eI3Lu2ZyMTtp7ciAY/3bf330b6c056c9d60f17ff1791946e33/pasted-image-0--13-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all industries)</p><p>However, when we look at the amount of attack traffic relative to all traffic for any given industry, the numbers paint a different picture. Last quarter, Non-profit organizations were attacked the most — 12% of traffic to Non-profits were HTTP DDoS attacks. Cloudflare protects more than 2,271 Non-profit organizations in 111 countries as part of <a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">Project Galileo which celebrated its ninth anniversary this year</a>. Over the past months, an average of 67.7 million cyber attacks targeted Non-profits on a daily basis.</p><p>Overall, the amount of DDoS attacks on Non-profits increased by 46% bringing the percentage of attack traffic to 17.6%. However, despite this growth, the Management Consulting industry jumped to the first place with 18.4% of its traffic being DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74q0HaWh4jPxA2XfZpRCCv/19f8905e289a8cbe3aa6663fca9a5bb1/pasted-image-0--14-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p><p>When descending the layers of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>, the Internet networks that were most targeted belonged to the Information Technology and Services industry. Almost every third byte routed to them were part of L3/4 DDoS attacks.</p><p>Surprisingly enough, companies operating in the Music industry were the second most targeted industry, followed by Broadcast Media and Aviation &amp; Aerospace.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1xLyFLWq30409EwSqML24z/5bc31f8e496fc79172520991fcd268f8/pasted-image-0--15-.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p>
    <div>
      <h2>Top attacked industries: a regional perspective</h2>
      <a href="#top-attacked-industries-a-regional-perspective">
        
      </a>
    </div>
    <p>Cryptocurrency websites experienced the highest number of attacks worldwide, while Management Consulting and Non-profit sectors were the most targeted considering their total traffic. However, when we look at individual regions, the situation is a bit different.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K70NI1kHUqCxExPgmedH5/cc762c50e6af2b82ab2cd77c344289b6/Top-Attacked-Industry-by-Region-Q1-2023.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks by region</p>
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    <p>The Telecommunications industry remains the most attacked industry in Africa for the second consecutive quarter. The Banking, Financial Services and Insurance (BFSI) industry follows as the second most attacked. The majority of the attack traffic originated from Asia (35%) and Europe (25%).</p>
    <div>
      <h3>Asia</h3>
      <a href="#asia">
        
      </a>
    </div>
    <p>For the past two quarters, the Gaming and Gambling industry was the most targeted industry in Asia. In Q2, however, the Gaming and Gambling industry dropped to second place and Cryptocurrency took the lead as the most attacked industry (~50%). Substantial portions of the attack traffic originated from Asia itself (30%) and North America (30%).</p>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>For the third consecutive quarter, the Gaming &amp; Gambling industry remains the most attacked industry in Europe. The Hospitality and Broadcast Media industries follow not too far behind as the second and third most attacked. Most of the attack traffic came from within Europe itself (40%) and from Asia (20%).</p>
    <div>
      <h3>Latin America</h3>
      <a href="#latin-america">
        
      </a>
    </div>
    <p>Surprisingly, half of all attack traffic targeting Latin America was aimed at the Sporting Goods industry. In the previous quarter, the BFSI was the most attacked industry. Approximately 35% of the attack traffic originated from Asia, and another 25% originated from Europe.</p>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    <p>The Media &amp; Newspaper industries were the most attacked in the Middle East. The vast majority of attack traffic originated from Europe (74%).</p>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    <p>For the second consecutive quarter, Marketing &amp; Advertising companies were the most attacked in North America (approximately 35%). Manufacturing and Computer Software companies came in second and third places, respectively. The main sources of the attack traffic were Europe (42%) and the US itself (35%).</p>
    <div>
      <h3>Oceania</h3>
      <a href="#oceania">
        
      </a>
    </div>
    <p>This quarter, the Biotechnology industry was the most attacked. Previously, it was the Health &amp; Wellness industry. Most of the attack traffic originated from Asia (38%) and Europe (25%).</p>
    <div>
      <h2>Countries and regions under attack: examining DDoS attack targets</h2>
      <a href="#countries-and-regions-under-attack-examining-ddos-attack-targets">
        
      </a>
    </div>
    <p>When examining the total volume of attack traffic, last quarter, Israel leaped to the front as the most attacked country. This quarter, attacks targeting Israeli websites decreased by 33% bringing it to the fourth place. The US takes the lead again as the most attacked country, followed by Canada and Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5AJcPqRhLPSwVjz5bni7Xm/dc29ce9e6e58577aa01ecb23dd8496f7/pasted-image-0--16-.png" />
            
            </figure><p>Top countries and regions targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all countries and regions)</p><p>If we normalize the data per country and region and divide the attack traffic by the total traffic, we get a different picture. Palestine jumps to the first place as the most attacked country. Almost 12% of all traffic to Palestinian websites were HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Iy2f7aBzWWkjUaMdjWeZr/b18180389ded0297142aa657d0e5edb0/pasted-image-0--17-.png" />
            
            </figure><p>Top countries and regions targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country and region)</p><p>Last quarter, we observed a striking deviation at the network layer, with Finnish networks under Cloudflare's shield emerging as the primary target. This surge was likely correlated with the diplomatic talks that precipitated <a href="https://en.wikipedia.org/wiki/Finland%E2%80%93NATO_relations">Finland's formal integration into NATO</a>. Roughly 83% of all incoming traffic to Finland comprised cyberattacks, with China a close second at 68% attack traffic.</p><p>This quarter, however, paints a very different picture. Finland has receded from the top ten, and Chinese Internet networks behind Cloudflare have ascended to the first place. Almost two-thirds of the byte streams towards Chinese networks protected by Cloudflare were malicious. Following China, Switzerland saw half of its inbound traffic constituting attacks, and Turkey came third, with a quarter of its incoming traffic identified as hostile.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xPzFgn9oydmh7fDRo7U4J/f18beb7d6edf266b8076a6428831f5b5/pasted-image-0--18-.png" />
            
            </figure><p>Top countries and regions targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country and region)</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Occasionally, DDoS attacks are carried out to extort ransom payments. We’ve been surveying Cloudflare customers over three years now, and have been tracking the occurrence of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> events.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oeVOpIFoox7wAH7rseTwN/5493495fbc4e02f39bf7428bba69f58e/pasted-image-0--19-.png" />
            
            </figure><p>High level comparison of Ransomware and Ransom DDoS attacks</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where victims typically fall prey to downloading a malicious file or clicking on a compromised email link which locks, deletes or leaks their files until a ransom is paid, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much simpler for threat actors to execute. Ransom DDoS attacks bypass the need for deceptive tactics such as luring victims into opening dubious emails or clicking on fraudulent links, and they don't necessitate a breach into the network or access to corporate resources.</p><p>Over the past quarter, reports of Ransom DDoS attacks decreased. One out of ten respondents reported being threatened or subject to Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1oajRNqBmeB4Ggm6FBOTgb/f35d9665f07c9eb0689f9373696cb8ad/pasted-image-0--20-.png" />
            
            </figure>
    <div>
      <h2>Wrapping up: the ever-evolving DDoS threat landscape</h2>
      <a href="#wrapping-up-the-ever-evolving-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In recent months, there's been an alarming escalation in the sophistication of DDoS attacks. And even the largest and most sophisticated attacks that we’ve seen may only last a few minutes or even seconds — which doesn’t give a human sufficient time to respond. Before the PagerDuty alert is even sent, the attack may be over and the damage is done. Recovering from a DDoS attack can last much longer than the attack itself — just as a boxer might need a while to recover from a punch to the face that only lasts a fraction of a second.</p><p>Security is not one single product or a click of a button, but rather a process involving multiple layers of defense to reduce the risk of impact. Cloudflare's automated DDoS defense systems consistently safeguard our clients from DDoS attacks, freeing them up to focus on their core business operations. These systems are complemented by the vast breadth of Cloudflare capabilities such as <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a> and even <a href="https://developers.cloudflare.com/cache/">caching</a> which can all contribute to reducing the risk of impact.</p><p>The DDoS threat landscape is evolving and increasingly complex, demanding more than just quick fixes. Thankfully, with Cloudflare's multi-layered defenses and automatic DDoS protections, our clients are equipped to navigate these challenges confidently. Our mission is to help build a better Internet, and so we continue to stand guard, ensuring a safer and more reliable digital realm for all.</p>
    <div>
      <h2>Methodologies</h2>
      <a href="#methodologies">
        
      </a>
    </div>
    
    <div>
      <h3>How we calculate Ransom DDoS attack insights</h3>
      <a href="#how-we-calculate-ransom-ddos-attack-insights">
        
      </a>
    </div>
    <p>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each attacked customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 164 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h3>How we calculate geographical and industry insights</h3>
      <a href="#how-we-calculate-geographical-and-industry-insights">
        
      </a>
    </div>
    <p><b>Source country</b>At the application-layer, we use the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (i.e., altered). However, at the network layer, source IP addresses can be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 285 locations around the world.</p><p><b>Target country</b>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ billing country. This lets us understand which countries are subject to more attacks.</p><p><b>Target industry</b>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ industry according to our customer relations management system. This lets us understand which industries are subject to more attacks.</p><p><b>Total volume vs. percentage</b>For both source and target insights, we look at the total volume of attack traffic compared to all traffic as one data point. Additionally, we also look at the percentage of attack traffic towards or from a specific country, to a specific country or to a specific industry. This gives us an “attack activity rate” for a given country/industry which is normalized by their total traffic levels. This helps us remove biases of a country or industry that normally receives a lot of traffic and therefore a lot of attack traffic as well.</p><p><b>How we calculate attack characteristics</b>To calculate the attack size, duration, attack vectors and emerging threats, we bucket attacks and then provide the share of each bucket out of the total amount for each dimension. On the new Radar component, these trends are calculated by number of bytes instead.  Since attacks may vary greatly in number of bytes from one another, this could lead to trends differing between the reports and the Radar component.</p>
    <div>
      <h3>General disclaimer and clarification</h3>
      <a href="#general-disclaimer-and-clarification">
        
      </a>
    </div>
    <p>When we describe ‘top countries’ as the source or target of attacks, it does not necessarily mean that that country was attacked as a country, but rather that organizations that use that country as their billing country were targeted by attacks. Similarly, attacks originating from a country does not mean that that country launched the attacks, but rather that the attack was launched from IP addresses that have been mapped to that country. Threat actors operate global botnets with nodes all over the world, and in many cases also use Virtual Private Networks and proxies to obfuscate their true location. So if anything, the source country could indicate the presence of exit nodes or botnet nodes within that country.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Killnet]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[Anonymous]]></category>
            <guid isPermaLink="false">4e8ZBP7BeuED4ngMqsgCLG</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q1/</link>
            <pubDate>Tue, 11 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Threat actors kicked off 2023 with a bang. The start of the year was characterized by a series of hacktivist campaigns against Western targets, and record-breaking hyper volumetric attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uWhbRkCB07IIgsu2oHrmX/9a73fb5170250a2015d20d6a15140272/image1-9.png" />
            
            </figure><p>Welcome to the first DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aim to overwhelm Internet services such as websites with more traffic than they can handle, in order to disrupt them and make them unavailable to legitimate users. In this report, we cover the latest insights and trends about the DDoS attack landscape as we observed across our <a href="https://www.cloudflare.com/network/">global network</a>.</p>
    <div>
      <h2>Kicking off 2023 with a bang</h2>
      <a href="#kicking-off-2023-with-a-bang">
        
      </a>
    </div>
    <p>Threat actors kicked off 2023 with a bang. The start of the year was characterized by a series of hacktivist campaigns against Western targets including banking, airports, <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">healthcare</a> and universities — mainly by the pro-Russian Telegram-organized groups <i>Killnet</i> and more recently by <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">AnonymousSudan</a>.</p><p>While Killnet-led and AnonymousSudan-led cyberattacks stole the spotlight, we haven’t witnessed any novel or exceedingly large attacks by them.</p>
    <div>
      <h2>Hyper-volumetric attacks</h2>
      <a href="#hyper-volumetric-attacks">
        
      </a>
    </div>
    <p>We did see, however, an increase of <i>hyper-volumetric</i> DDoS attacks launched by other threat actors — with the largest one peaking above <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million requests per second</a> (rps) — exceeding Google’s previous world record of 46M rps by 55%.</p><p>Back to Killnet and AnonymousSudan, while no noteworthy attacks were reported, we shouldn't underestimate the potential risks. Unprotected Internet properties can still be, and have been, taken down by Killnet-led or AnonymousSudan-led cyber campaigns. Organizations should take proactive defensive measures to reduce the risks.</p>
    <div>
      <h2>Business as usual for South American Telco targeted by terabit-strong attacks thanks to Cloudflare</h2>
      <a href="#business-as-usual-for-south-american-telco-targeted-by-terabit-strong-attacks-thanks-to-cloudflare">
        
      </a>
    </div>
    <p>Another large attack we saw in Q1 was a 1.3 Tbps (terabits per second) DDoS attack that targeted a South American Telecommunications provider. The attack lasted only a minute. It was a multi-vector attack involving DNS and UDP attack traffic. The attack was part of a broader campaign which included multiple Terabit-strong attacks originating from a 20,000-strong Mirai-variant botnet. Most of the attack traffic originated from the US, Brazil, Japan, Hong Kong, and India. Cloudflare systems automatically detected and mitigated it without any impact to the customer’s networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Y2qOZ1k9bPz9QkRACy2sZ/5eccf827bbcb192a5d1a2ec06b11bcd8/image2-6.png" />
            
            </figure><p>Cloudflare auto-mitigates a 1.3 Tbps Mirai DDoS attack</p>
    <div>
      <h2>High-performance botnets</h2>
      <a href="#high-performance-botnets">
        
      </a>
    </div>
    <p>Hyper-volumetric attacks leverage a new generation of botnets that are comprised of Virtual Private Servers (VPS) instead of <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/">Internet of Things</a> (IoT) devices.</p><p>Historically, large botnets relied on exploitable IoT devices such as smart security cameras to orchestrate their attacks. Despite the limited throughput of each IoT device, together — usually numbering in the hundreds of thousands or millions — they generated enough traffic to disrupt their targets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20cHerRftPJQJ0rG4doFtS/6359369665e4b017e442366df943f5df/image14.png" />
            
            </figure><p>The new generation of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a> uses a fraction of the amount of devices, but each device is substantially stronger. Cloud computing providers offer virtual private servers to allow start ups and businesses to create performant applications. The downside is that it also allows attackers to create high-<i>performance botnets</i> that can be as much as 5,000x stronger. Attackers gain access to virtual private servers by compromising unpatched servers and hacking into management consoles using leaked API credentials.</p><p>Cloudflare has been working with key cloud computing providers to crack down on these VPS-based botnets. Substantial portions of such botnets have been disabled thanks to the cloud computing providers’ rapid response and diligence. Since then, we have yet to see additional hyper-volumetric attacks — a testament to the fruitful collaboration.</p><p>We have excellent collaboration with the cyber-security community to take down botnets once we detect such large-scale attacks, but we want to make this process even simpler and more automated.</p><p>We invite Cloud computing providers, hosting providers and general service providers to sign up for <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">Cloudflare’s free Botnet Threat Feed</a> to gain visibility on attacks launching from within their networks — and help us dismantle botnets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2feopGKgNAdzjRsmyoZvQK/f3a52b064ccab375bd5cc9c51acac208/image10.png" />
            
            </figure>
    <div>
      <h2>Key highlights from this quarter</h2>
      <a href="#key-highlights-from-this-quarter">
        
      </a>
    </div>
    <ol><li><p>In Q1, 16% of surveyed customers reported a Ransom DDoS attack — remains steady compared to the previous quarter but represents a 60% increase YoY.</p></li><li><p>Non-profit organizations and Broadcast Media were two of the most targeted industries. Finland was the largest source of HTTP DDoS attacks in terms of percentage of attack traffic, and the main target of network-layer DDoS attacks. Israel was the top most attacked country worldwide by HTTP DDoS attacks.</p></li><li><p>Large scale volumetric DDoS attacks — attacks above 100 Gbps — increased by 6% QoQ. DNS-based attacks became the most popular vector. Similarly, we observed surges in SPSS-bas in ed DDoS attacks, DNS amplification attacks, and GRE-based DDoS attacks.</p></li></ol><p>View the <a href="https://radar.cloudflare.com/reports/ddos-2023-q1">interactive report on Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Often, DDoS attacks are carried out to extort ransom payments. We continue to survey Cloudflare customers and track the ratio of DDoS events where the target received a ransom note. This number has been steadily rising through 2022 and currently stands at 16% - the same as in Q4 2022.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MYdqgtGaD5J0QdYUmAEv4/2ef5575658610dd3d11f2a24ad7bb33f/pasted-image-0.png" />
            
            </figure><p>Percent of users reporting a Ransom DDoS attack or threat, per quarter</p><p>As opposed to <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where usually the victim is tricked into downloading a file or clicking on an email link that encrypts and locks their computer files until they pay a ransom fee, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much easier for attackers to execute. Ransom DDoS attacks don't require tricking the victim into opening an email or clicking a link, nor do they require a network intrusion or a foothold into the corporate assets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pHr2pA0XLvqjiRdMZD2E2/8d759cf2c252e7ae26cfeaf227f44463/image23.png" />
            
            </figure><p>In a Ransom DDoS attack, the attacker doesn’t need access to the victim’s computer but rather just needs to bombard them with a sufficiently large amount of traffic to take down their websites, DNS servers, and any other type of Internet-connected property to make it unavailable or with poor performance to users. The attacker will demand a ransom payment, usually in the form of Bitcoin, to stop and/or avoid further attacks.</p><p>The months of January 2023 and March 2023 were the second highest in terms of Ransom DDoS activity as reported by our users. The highest month thus far remains November 2022 — the month of Black Friday, Thanksgiving, and Singles Day in China — a lucrative month for threat actors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4c3KVL175cApfuTB64WXEp/e7f3f0ad54a6b40a75d3a2598776e940/pasted-image-0--1-.png" />
            
            </figure><p>Percent of users reporting a Ransom DDoS attack or threat, per month</p>
    <div>
      <h2>Who and what are being attacked?</h2>
      <a href="#who-and-what-are-being-attacked">
        
      </a>
    </div>
    
    <div>
      <h3>Top targeted countries</h3>
      <a href="#top-targeted-countries">
        
      </a>
    </div>
    <p>Perhaps related to the <a href="https://www.jpost.com/breaking-news/article-736104">judicial reform and opposing protests</a>, or the ongoing tensions in the Westbank, in Q1, Israel jumps to the first place as the country targeted by the most HTTP DDoS attack traffic — even above the United States of America. This is an astonishing figure. Just short of a single percent of all HTTP traffic that Cloudflare processed in the first quarter of the year, was part of HTTP DDoS attacks that targeted Israeli websites. Following closely behind Israel are the US, Canada, and Turkey.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3foVRDFCptH7z4LR18ktlT/92eec8db9f045ce920f6bac2c5f88edd/pasted-image-0--2-.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>In terms of the percentage of attack traffic compared to all traffic to a given country, Slovenia and Georgia came at the top. Approximately 20% of all traffic to Slovenian and Georgian websites were HTTP DDoS attacks. Next in line were the small Caribbean dual-island nation, Saint Kitts and Nevis, and Turkey. While Israel was the top in the previous graph, here it has found its placement as the ninth most attacked country — above Russia. Still high compared to previous quarters.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bDLpaVgtVW7DOszQ0hV4g/8b5171e6cf0e5481bf09e3818f786430/pasted-image-0--3-.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>Looking at the total amount of network-layer DDoS attack traffic, China came in first place. Almost 18% of all network-layer DDoS attack traffic came from China. Closely in second, Singapore came in second place with a 17% share. The US came in third, followed by Finland.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2kV7x9aPs5l4ep6nos9bFM/3e86bce86e969ff21ace7251898b0a5b/pasted-image-0--4-.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks (percentage of attack traffic out of the all DDoS traffic worldwide)</p><p>When we normalize attacks to a country by all traffic to that country, Finland jumps to the first place, perhaps due to its <a href="https://www.bbc.com/news/world-europe-65173043">newly approved NATO membership</a>. Nearly 83% of all traffic to Finland was network-layer attack traffic. China followed closely with 68% and Singapore again with 49%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nfqeHVuj0SoDZNBEsLpDE/1f67313c6c711789e3101f02fd3971da/pasted-image-0--5-.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks (percentage of attack traffic out of the all traffic per country)</p>
    <div>
      <h3>Top targeted industries</h3>
      <a href="#top-targeted-industries">
        
      </a>
    </div>
    <p>In terms of overall bandwidth, globally, Internet companies saw the largest amount of HTTP DDoS attack traffic. Afterwards, it was the Marketing and Advertising industry, Computer Software industry, Gaming / Gambling and Telecommunications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/203AL6ywi6HVc5OuZhrLgT/81f2d58ecc741221260473a8624bf73e/pasted-image-0--6-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all industries)</p><p>By percentage of attack traffic out of total traffic to an industry, Non-profits were the most targeted in the first quarter of the year, followed by Accounting firms. Despite the <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">uptick of attacks on healthcare</a>, it didn’t make it into the top ten. Also up there in the top were Chemicals, Government, and Energy Utilities &amp; Waste industries. Looking at the US, almost 2% of all traffic to US Federal websites were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6bVnziiM6JNcYlEstXR0Oy/03c365f0afab8499c0c852023f3a58b4/pasted-image-0--7-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p><p>On a regional scale, the Gaming &amp; Gambling industry was the most targeted in Asia, Europe, and the Middle East. In South and Central America, the Banking, Financial Services and Insurance (BFSI) industry was the most targeted. In North America it was the Marketing &amp; Advertising industry followed by Telecommunications — which was also the most attacked industry in Africa. Last by not least, in Oceania, the Health, Wellness and Fitness industry was the most targeted by HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SS3dZ0HSHQlJ6LZMl0Ypm/f08aa670cd392351f9814c0413e00a33/image11.png" />
            
            </figure><p>Diving lower in the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI stack</a>, based on the total volume of L3/4 attack traffic, the most targeted industries were Information Technology and Services, Gaming / Gambling, and Telecommunications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dzKf7eX1bV0IHc8ZlhUcg/a52113e6b10866e5a0c68ce680385b96/pasted-image-0--8-.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total DDoS traffic for all industries)</p><p>When comparing the attack traffic to the total traffic per industry, we see a different picture. Almost every second byte transmitted to Broadcast Media companies was L3/4 DDoS attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DWxvGYuzMgkwT5i5sSwqH/106137e0e566730735527ce42cea6d78/pasted-image-0--9--1.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p>
    <div>
      <h2>Where attacks are coming from</h2>
      <a href="#where-attacks-are-coming-from">
        
      </a>
    </div>
    
    <div>
      <h3>Top source countries</h3>
      <a href="#top-source-countries">
        
      </a>
    </div>
    <p>In the first quarter of 2023, Finland was the largest source of HTTP DDoS attacks in terms of the percentage of attack traffic out of all traffic per country. Closely after Finland, the British Virgin Islands came in second place, followed by Libya and Barbados.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R3DKszQHsB3B05keSb5Fi/20eeefb3667b89415f52ac5559819d03/pasted-image-0--10-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>In terms of absolute volumes, the most HTTP DDoS attack traffic came from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, and Finland.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ocq11lLYbiFA67Hr2jERd/6c1fb00db575d6b186c7388c2b8317f0/pasted-image-0--11-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>On the L3/4 side of things, Vietnam was the largest source of L3/4 DDoS attack traffic. Almost a third of all L3/4 traffic we ingested in our Vietnam data centers was attack traffic. Following Vietnam were Paraguay, Moldova, and Jamaica.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2s979PCVFVMxwNx5VQ7ZQr/3519aa747848f3d1c15055d9585144d3/image13-2.png" />
            
            </figure><p>Top source countries of L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country)</p>
    <div>
      <h2>What attack types and sizes we see</h2>
      <a href="#what-attack-types-and-sizes-we-see">
        
      </a>
    </div>
    
    <div>
      <h3>Attack size and duration</h3>
      <a href="#attack-size-and-duration">
        
      </a>
    </div>
    <p>When looking at the types of attacks that are launched against our customers and our own network and applications, we can see that the majority of attacks are short and small; 86% of network-layer DDoS attacks end within 10 minutes, and 91% of attacks never exceed 500 Mbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1chDQJ0KmBMer4vXgpqPXi/14f55f9cf49469b7aaf167f15c13b6fb/pasted-image-0--12-.png" />
            
            </figure><p>Network-layer DDoS attacks by duration</p><p>Only one out of every fifty attacks ever exceeds 10 Gbps, and only one out of every thousand attacks exceeds 100 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZlSdjeI2ytqRM21IonBRo/a0482be01305b2ad3a2938b0e5200398/pasted-image-0--13-.png" />
            
            </figure><p>Network-layer DDoS attacks by bitrate</p><p>Having said that, larger attacks are slowly increasing in quantity and frequency. Last quarter, attacks exceeding 100 Gbps saw a 67% increase QoQ in their quantity. This quarter, the growth has slowed down a bit to 6%, but it's still growing. In fact, there was an increase in all volumetric attacks excluding the ‘small’ bucket where the majority fall into — as visualized in the graph below. The largest growth was in the 10-100 Gbps range; an 89% increase QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2q2OX4ltFPgGpGlSJisbLI/f1d2c6646f1ea168ff636610c9edff8d/pasted-image-0--14--1.png" />
            
            </figure><p>Network-layer DDoS attacks by size: quarter-over-quarter change</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>This quarter we saw a tectonic shift. With a 22% share, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> scooched to the second place, making DNS-based DDoS attacks the most popular attack vector (30%). Almost a third of all L3/4 DDoS attacks were DNS-based; either <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> or <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification/reflection</a> attacks. Not far behind, <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP-based attacks</a> came in third with a 21% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1vDd1cfTVgZYLdWLruafce/c64918106b7fef484ddb90f7ede49f2a/pasted-image-0--15-.png" />
            
            </figure><p>Top DDoS attack vectors</p>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Every quarter we see the reemergence of old and sometimes even ancient attack vectors. What this tells us is that even decade-old vulnerabilities are still being exploited to launch attacks. Threat actors are recycling and reusing old methods — perhaps hoping that organizations have dropped those protections against older methods.</p><p>In the first quarter of 2023, there was a massive surge in SPSS-based DDoS attacks, DNS amplification attacks and GRE-based DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cjg68wkVhs0W2IMmXiROB/e854a04f32d4c3dfaa6644035c556b11/pasted-image-0--16-.png" />
            
            </figure><p>Top DDoS emerging threats</p>
    <div>
      <h3>SPSS-based DDoS attacks increased by 1,565% QoQ</h3>
      <a href="#spss-based-ddos-attacks-increased-by-1-565-qoq">
        
      </a>
    </div>
    <p>The <i>Statistical Product and Service Solutions</i> (SPSS) is an IBM-developed software suite for use cases such as data management, business intelligence, and criminal investigation. The Sentinel RMS License Manager server is used to manage licensing for software products such as the IBM SPSS system. Back in 2021, two vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22713">CVE-2021-22713</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38153">CVE-2021-38153</a>) were identified in the Sentinel RMS License Manager server which can be used to launch reflection DDoS attacks. Attackers can send large amounts of specially crafted license requests to the server, causing it to generate a response that is much larger than the original request. This response is sent back to the victim's IP address, effectively amplifying the size of the attack and overwhelming the victim's network with traffic. This type of attack is known as a reflection DDoS attack, and it can cause significant disruption to the availability of software products that rely on the Sentinel RMS License Manager, such as IBM SPSS Statistics. Applying the available patches to the license manager is essential to prevent these vulnerabilities from being exploited and to protect against reflection DDoS attacks.</p>
    <div>
      <h3>DNS amplification DDoS attacks increased by 958% QoQ</h3>
      <a href="#dns-amplification-ddos-attacks-increased-by-958-qoq">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification attacks</a> are a type of DDoS attack that involves exploiting vulnerabilities in the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a> infrastructure to generate large amounts of traffic directed at a victim's network. Attackers send DNS requests to open DNS resolvers that have been misconfigured to allow recursive queries from any source, and use these requests to generate responses that are much larger than the original query. The attackers then spoof the victim's IP address, causing the large responses to be directed at the victim's network, overwhelming it with traffic and causing a denial of service. The challenge of mitigating DNS amplification attacks is that the attack traffic can be difficult to distinguish from legitimate traffic, making it difficult to block at the network level. To mitigate DNS amplification attacks, organizations can take steps such as properly configuring DNS resolvers, implementing rate-limiting techniques, and using traffic filtering tools to block traffic from known attack sources.</p>
    <div>
      <h3>GRE-based DDoS attacks increased by 835% QoQ</h3>
      <a href="#gre-based-ddos-attacks-increased-by-835-qoq">
        
      </a>
    </div>
    <p>GRE-based DDoS attacks involve using the <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">Generic Routing Encapsulation (GRE) protocol</a> to flood a victim's network with large amounts of traffic. Attackers create multiple GRE tunnels between compromised hosts to send traffic to the victim's network. These attacks are difficult to detect and filter, as the traffic appears as legitimate traffic on the victim's network. Attackers can also use source IP address spoofing to make it appear that the traffic is coming from legitimate sources, making it difficult to block at the network level. GRE-based DDoS attacks pose several risks to targeted organizations, including downtime, disruption of business operations, and potential data theft or network infiltration. Mitigating these attacks requires the use of advanced traffic filtering tools that can detect and block attack traffic based on its characteristics, as well as techniques such as rate limiting and source IP address filtering to block traffic from known attack sources.</p>
    <div>
      <h2>The DDoS threat landscape</h2>
      <a href="#the-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In recent months, there has been an increase in longer and larger DDoS attacks across various industries, with volumetric attacks being particularly prominent. Non-profit and Broadcast Media companies were some of the top targeted industries. DNS DDoS attacks also became increasingly prevalent.</p><p>As DDoS attacks are typically carried out by bots, automated detection and mitigation are crucial for effective defense. Cloudflare's automated systems provide constant <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">protection against DDoS attacks</a> for our customers, allowing them to focus on other aspects of their business. We believe that DDoS protection should be easily accessible to organizations of all sizes, and have been offering free and unlimited protection since 2017.</p><p>At Cloudflare, our mission is to help build a better Internet — one that is more secure and faster Internet for all.</p><p>We invite you to join our DDoS Trends Webinar to learn more about emerging threats and effective defense strategies.</p>
    <div>
      <h3><i>A note about methodologies</i></h3>
      <a href="#a-note-about-methodologies">
        
      </a>
    </div>
    <p><b><i>How we calculate Ransom DDoS attack insights</i></b><i>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each attacked customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 164 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</i></p><p><b><i>How we calculate geographical and industry insightsSource country</i></b><i>At the application-layer, we use the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be</i> <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><i>spoofed</i></a> <i>(i.e., altered). However, at the network layer, source IP addresses can be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 285 locations around the world.</i></p><p><b><i>Target country</i></b><i>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ billing country. This lets us understand which countries are subject to more attacks.</i></p><p><b><i>Target industry</i></b><i>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ industry according to our customer relations management system. This lets us understand which industries are subject to more attacks.</i></p><p><b><i>Total volume vs. percentage</i></b><i>For both source and target insights, we look at the total volume of attack traffic compared to all traffic as one data point. Additionally, we also look at the percentage of attack traffic towards or from a specific country, to a specific country or to a specific industry. This gives us an “attack activity rate” for a given country/industry which is normalized by their total traffic levels. This helps us remove biases of a country or industry that normally receives a lot of traffic and therefore a lot of attack traffic as well.</i></p><p><b><i>How we calculate attack characteristics</i></b><i>To calculate the attack size, duration, attack vectors and emerging threats, we bucket attacks and then provide the share of each bucket out of the total amount for each dimension.</i></p><p><b><i>General disclaimer and clarification</i></b><i>When we describe ‘top countries’ as the source or target of attacks, it does not necessarily mean that that country was attacked as a country, but rather that organizations that use that country as their billing country were targeted by attacks. Similarly, attacks originating from a country does not mean that that country launched the attacks, but rather that the attack was launched from IP addresses that have been mapped to that country. Threat actors operate global botnets with nodes all over the world, and in many cases also use Virtual Private Networks and proxies to obfuscate their true location. So if anything, the source country could indicate the presence of exit nodes or botnet nodes within that country.</i></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Killnet]]></category>
            <category><![CDATA[Anonymous]]></category>
            <guid isPermaLink="false">3QxUPPLUcVx3JLNqdgfaPe</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare DDoS threat report for 2022 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2022-q4/</link>
            <pubDate>Tue, 10 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q4, Cloudflare mitigated millions of DDoS attacks. Attack durations increase, volumetric attacks surged, and ransom DDoS attacks persist. Travel & events industries were hit hardest and over 90% of traffic to Chinese Internet properties were L3/4 DDoS attacks. Read more on our recent report. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68k9YUlEDEpOJmxYCKbSur/6280347aea66faee11fb6a617aeb7600/image19-1.png" />
            
            </figure><p>Welcome to our DDoS Threat Report for the fourth and final quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across <a href="https://www.cloudflare.com/network/">Cloudflare’s global network</a>.</p><p>In the last quarter of the year, as billions around the world celebrated holidays and events such as Thanksgiving, Christmas, Hanukkah, Black Friday, Singles’ Day, and New Year, DDoS attacks persisted and even increased in size, frequency, and sophistication whilst attempting to disrupt our way of life.</p><p>Cloudflare’s automated DDoS defenses stood firm and mitigated millions of attacks in the last quarter alone. We’ve taken all of those attacks, aggregated, analyzed, and prepared the bottom lines to help you better understand the threat landscape.</p>
    <div>
      <h2>Global DDoS insights</h2>
      <a href="#global-ddos-insights">
        
      </a>
    </div>
    <p>In the last quarter of the year, despite a year-long decline, the amount of HTTP DDoS attack traffic still increased by 79% YoY. While most of these attacks were small, Cloudflare constantly saw terabit-strong attacks, DDoS attacks in the hundreds of millions of packets per second, and HTTP DDoS attacks peaking in the tens of millions of requests per second launched by sophisticated botnets.</p><ul><li><p>Volumetric attacks surged; the number of attacks exceeding rates of 100 gigabits per second (Gbps) grew by 67% quarter-over-quarter (QoQ), and the number of attacks lasting more than three hours increased by 87% QoQ.</p></li><li><p>Ransom DDoS attacks steadily increased this year. In Q4, over 16% of respondents reported receiving a threat or ransom demand as part of the DDoS attack that targeted their Internet properties.</p></li></ul>
    <div>
      <h2>Industries most targeted by DDoS attacks</h2>
      <a href="#industries-most-targeted-by-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>HTTP DDoS attacks constituted 35% of all traffic to Aviation and Aerospace Internet properties.</p></li><li><p>Similarly, over a third of all traffic to the Gaming/Gambling and Finance industries was network-layer DDoS attack traffic.</p></li><li><p>A whopping 92% of traffic to Education Management companies was part of network-layer DDoS attacks. Likewise, 73% of traffic to the Information Technology and Services and the Public Relations &amp; Communications industries were also network-layer DDoS attacks.</p></li></ul>
    <div>
      <h2>Source and targets of DDoS attacks</h2>
      <a href="#source-and-targets-of-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In Q4, 93% of network-layer traffic to Chinese Internet properties behind Cloudflare were part of network-layer DDoS attacks. Similarly, over 86% of traffic to Cloudflare customers in Lithuania and 80% of traffic to Cloudflare customers in Finland was attack traffic.</p></li><li><p>On the application-layer, over 42% of all traffic to Georgian Internet properties behind Cloudflare was part of HTTP DDoS attacks, followed by Belize with 28%, and San Marino in third place with just below 20%. Almost 20% of all traffic from Libya that Cloudflare saw was application-layer DDoS attack traffic.</p></li><li><p>Over 52% of all traffic recorded in Cloudflare’s data centers in Botswana was network-layer DDoS attack traffic. Similarly, in Cloudflare’s data centers in Azerbaijan, Paraguay, and Palestine, network-layer DDoS attack traffic constituted approximately 40% of all traffic.</p></li></ul><p>Quick note: this quarter, we’ve made a change to our algorithms to improve the accuracy of our data which means that some of these data points are incomparable to previous quarters. Read more about these changes in the next section <i>Changes to the report methodologies.</i></p><p>To skip to the report, <a href="#ransomddosattacks">click here</a>.</p><p>Sign up to the <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4075983/global-ddos-attack-trends-you-need-to-know">DDoS Trends Webinar</a> to learn more about the emerging threats and how to defend against them.</p>
    <div>
      <h2>Changes to the report methodologies</h2>
      <a href="#changes-to-the-report-methodologies">
        
      </a>
    </div>
    <p>Since our <a href="/network-layer-ddos-attack-trends-for-q1-2020/">first report</a> in 2020, we’ve always used percentages to represent attack traffic, i.e., the percentage of attack traffic out of all traffic including legitimate/user traffic. We did this to normalize the data, avoid data biases, and be more flexible when it comes to incorporating new mitigation system data into the report.</p><p>In this report, we’ve introduced changes to the methods used to calculate some of those percentages when we bucket attacks by certain <i>dimensions</i> such as <i>target country</i>, <i>source country</i>, or <i>target industry</i>. In the <i>application-layer</i> sections, we previously divided the amount of attack HTTP/S requests to a given dimension by all the HTTP/S requests to all dimensions. In the <i>network-layer</i> section, specifically in <i>Target industries</i> and <i>Target countries,</i> we used to divide the amount of attack IP packets to a given dimension by the total attack packets to all dimensions.</p><p>From this report onwards, we now divide the attack requests (or packets) to a given dimension only by the total requests (or packets) to that given dimension. We made these changes in order to align our calculation methods throughout the report and improve the data accuracy so it better represents the attack landscape.</p><p>For example, the top industry attacked by application-layer DDoS attacks using the previous method was the Gaming and Gambling industry. The attack requests towards that industry accounted for 0.084% of all traffic (attack and non-attack) to all industries. Using that same old method, the Aviation and Aerospace industry came in 12th place. Attack traffic towards the Aviation and Aerospace industry accounted for 0.0065% of all traffic (attack and non-attack) to all industries. However, using the new method, the Aviation and Aerospace industry came in as the number one most attacked industry — attack traffic formed 35% of all traffic (attack and non-attack) towards that industry alone. Again using the new method, the Gaming and Gambling industry came in 14th place — 2.4% of its traffic was attack traffic.</p><p>The old calculation method used in previous reports to calculate the percentage of attack traffic for each dimension was the following:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KD6tiu5CGosB0PMkCOGC5/69a2bce09409962d82050de996e14447/Screenshot-2023-01-09-at-17.39.06.png" />
            
            </figure><p>The new calculation method used from this report onwards is the following:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lIzK054oLzfg7a3QFKv37/c4f49acb347afb732a11e970aed2109d/Screenshot-2023-01-09-at-17.39.57.png" />
            
            </figure><p>The changes apply to the following metrics:</p><ol><li><p>Target industries of application-layer DDoS attacks</p></li><li><p>Target countries of application-layer DDoS attacks</p></li><li><p>Source of application-layer DDoS attacks</p></li><li><p>Target industries of network-layer DDoS attacks</p></li><li><p>Target countries of network-layer DDoS attacks</p></li></ol><p>No other changes were made in the report. The <i>Source of network-layer DDoS attacks</i> metrics already use this method since the first report. Also, no changes were made to the <i>Ransom DDoS attacks</i>, <i>DDoS attack rate</i>, <i>DDoS attack duration, DDoS attack vectors,</i> and <i>Top emerging threats</i> sections. These metrics do not take legitimate traffic into consideration and no methodology alignment was needed.</p>With that in mind, let’s dive in deeper and explore these insights and trends. You can also view an interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2022-q4">Cloudflare Radar.</a><a></a>
<p></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>As opposed to <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where the victim is tricked into downloading a file or clicking on an email link that encrypts and locks their computer files until they pay a ransom fee, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much easier for attackers to launch. Ransom DDoS attacks don't require tricking the victim into opening an email or clicking a link, nor do they require a network intrusion or a foothold to be carried out.</p><p>In a Ransom DDoS attack, the attacker doesn’t need access to the victim’s computer but rather just floods them with enough traffic to negatively impact their Internet services. The attacker will demand a ransom payment, usually in the form of Bitcoin, to stop and/or avoid further attacks.</p><p>In the last quarter of 2022, 16% of Cloudflare customers that responded to our survey reported being targeted by HTTP DDoS attacks accompanied by a threat or a ransom note. This represents a 14% increase QoQ but a 16% decrease YoY in reported Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4p7WfoRhZnvih6wSvfcEF5/eaa09189c775759ac0cfdeb3790616a6/1-3.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks over 2021 and 2022 by quarter (each column represents the percentage of users reporting a ransom attack)</p><p><b>How we calculate Ransom DDoS attack trends</b>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS'd customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 187 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h2>Application-layer DDoS attack landscape</h2>
      <a href="#application-layer-ddos-attack-landscape">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP/S DDoS attacks, are cyber attacks that usually aim to disrupt web servers by making them unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and - in some cases - crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KRJTH9LSNLp5Y7xMPFaxf/da35891b6873ea264a241867ac82455d/2-2.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attack trends</h3>
      <a href="#application-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>When we look at the graph below, we can see a clear downward trend in attacks each quarter this year. However, despite the downward trend, HTTP DDoS attacks still increased by 79% when compared to the same quarter of previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6M5VDqlpoPOHsWTT7hzhLk/0ef5481310d14d6d6a7ce2cf78a912aa/3-2.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks over the last year by quarter</p>
    <div>
      <h3>Target industries of application-layer DDoS attacks</h3>
      <a href="#target-industries-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In the quarter where many people travel for the holidays, the Aviation and Aerospace was the most attacked industry. Approximately 35% of traffic to the industry was part of HTTP DDoS attacks. In second place, the Events Services industry saw over 16% of its traffic as HTTP DDoS attacks.</p><p>In the following places were the Media and Publishing, Wireless, Government Relations, and Non-profit industries. To learn more about how Cloudflare protects non-profit and human rights organizations, read our recent <a href="https://www.cloudflare.com/impact/">Impact Report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19dMUR1vriRC008FrKuLMd/381590c01afcc239f55143921ef13e6c/4-2.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q4</p><p>When we break it down regionally, and after excluding generic industry buckets like <i>Internet</i> and <i>Software,</i> we can see that in North America and Oceania the Telecommunications industry was the most targeted. In South America and Africa, the Hospitality industry was the most targeted. In Europe and Asia, Gaming &amp; Gambling industries were the most targeted. And in the Middle East, the Education industry saw the most attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zRfrafFijjMGPPKegkaNn/0f530de3af8293aaeb569520511493b3/5-1.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q4, by region</p>
    <div>
      <h3>Target countries of application-layer DDoS attacks</h3>
      <a href="#target-countries-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Bucketing attacks by our customers’ billing address helps us understand which countries are more frequently attacked. In Q4, over 42% of all traffic to Georgian HTTP applications behind Cloudflare was DDoS attack traffic.</p><p>In second place, Belize-based companies saw almost a third of their traffic as DDoS attacks, followed by San Marino in third with just below 20% of its traffic being DDoS attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Ukz2lfYblvcxRONS4LpmM/f28e5547374f1525108bd197d27b033f/6-2.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Source of application-layer DDoS attacks</h3>
      <a href="#source-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Quick note before we dive in. If a country is found to be a major source of DDoS attacks, it doesn’t necessarily mean that it is that country that launches the attacks. Most often with DDoS attacks, attackers are launching attacks remotely in an attempt to hide their true location. Top source countries are more often indicators that there are botnet nodes operating from within that country, perhaps hijacked servers or IoT devices.</p><p>In Q4, almost 20% of all HTTP traffic originating from Libya was part of HTTP DDoS attacks. Similarly, 18% of traffic originating from Timor-Leste, an island country in Southeast Asia just north of Australia, was attack traffic. DDoS attack traffic also accounted for 17% of all traffic originating from the British Virgin Islands and 14% of all traffic originating from Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ahDM08TMOU8CezzOdlTfM/7b3a9f23d9aed5b03b9039eb07844c6e/7-1.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks in 2022 Q4</p>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer DDoS attacks</a> aim to overwhelm network infrastructure, such as in-line routers and servers, and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fBkKAjlBl9eLYXKfGBbm1/6288da168c95b08b3274477a82ac66fc/8-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attack trends</h3>
      <a href="#network-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>After a year of steady increases in network-layer DDoS attacks, in the fourth and final quarter of the year, the amount of attacks actually decreased by 14% QoQ and 13% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/a89jN1YxW4fM1DXXszd5W/6433c49adacb2e8b863a929d3a10478a/9-1.png" />
            
            </figure><p>Distribution of Network-layer DDoS attacks over the last year by quarter</p><p>Now let’s dive a little deeper to understand the various attack properties such as the attack volumetric rates, durations, attack vectors, and emerging threats.</p><p><b>DDoS attack rate</b>While the vast majority of attacks are relatively short and small, we did see a spike in longer and larger attacks this quarter. The amount of volumetric network-layer DDoS attacks with a rate exceeding 100 Gbps increased by 67% QoQ. Similarly, attacks in the range of 1-100 Gbps increased by ~20% QoQ, and attacks in the range of 500 Mbps to 1 Gbps increased by 108% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6bdDrTUMOVRUaJGZn0N0QQ/26f6ed4d96ff102931878ffc150bee93/10-2.png" />
            
            </figure><p>QoQ change in DDoS attack rates in 2022 Q4</p><p>Below is an example of one of those attacks exceeding 100 Gbps that took place the week after Thanksgiving. This was a 1 Tbps DDoS attack targeted at a Korean-based hosting provider. This particular attack was an <a href="https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/">ACK flood</a>, and it lasted roughly one minute. Since the  hosting provider was using <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, Cloudflare’s L3 DDoS protection service, the attack was automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1oXCRx5qpl1bwhEtPUbjP9/ad75152fe994b4092964feac7d0470f7/11.png" />
            
            </figure><p>Graph of a 1 Tbps DDoS attack</p><p>While bit-intensive attacks usually aim to clog up the Internet connection to cause a denial of service event, packet-intensive attacks attempt to crash in-line devices. If an attack sends more packets than you can handle, the servers and other in-line appliances might not be able to process legitimate user traffic, or even crash altogether.</p><p><b>DDoS attack duration</b>In Q4, the amount of shorter attacks lasting less than 10 minutes decreased by 76% QoQ, and the amount of longer attacks increased. Most notably, attacks lasting 1-3 hours increased by 349% QoQ and the amount of attacks lasting more than three hours increased by 87% QoQ. Most of the attacks, over 67% of them, lasted 10-20 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1iUmv6PEANaBFa2iiHwKhg/5f70e27033327aac5a0e85890ba69180/12.png" />
            
            </figure><p>QoQ change in the duration of DDoS attacks in 2022 Q4</p><p><b>DDoS attack vectors</b>The attack vector is a term used to describe the attack method. In Q4, SYN floods remained the attacker’s method of choice — in fact, almost half of all network-layer DDoS attacks were SYN floods.</p><p>As a recap, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> are a flood of SYN packets (TCP packets with the <i>Synchronize</i> flag turned on, i.e., the bit set to 1). SYN floods take advantage of the statefulness of the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Three-way TCP handshake</a> — which is the way to establish a connection between a server and a client.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3s4qiqWPfzm7qjCvENsDyj/65b2cc8f635cc0188d53497d1a7b4496/13.png" />
            
            </figure><p>The Three-way TCP Handshake</p><p>The client starts off by sending a SYN packet, the server responds with a Synchronize-acknowledgement (SYN/ACK) packet and waits for the client’s Acknowledgement (ACK) packet. For every connection, a certain amount of memory is allocated. In the SYN flood, the source IP addresses may be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (altered) by the attacker, causing the server to respond with the SYN/ACK packets to the spoofed IP addresses — which most likely ignore the packet. The server then naively waits for the never arriving ACK packets to complete the handshake. After a while, the server times out and releases those resources. However, given a sufficient amount of SYN packets in a short amount of time, they may be enough to drain the server’s resources and render it unable to handle legitimate user connections or even crash altogether.</p><p>After SYN floods, with a massive drop in share, DNS floods and amplification attacks came in second place, accounting for ~15% of all network-layer DDoS attacks. And in third UDP-based DDoS attacks and floods with a 9% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uXMuSmIxJCkqYlWskjLUH/25c60395b8284d359c7ebb411c62b7c1/14.png" />
            
            </figure><p>Top attack vectors in 2022 Q4</p><p><b>Emerging DDoS threats</b>In Q4, Memcached-based DDoS attacks saw the highest growth — a 1,338% increase QoQ. <a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/">Memcached</a> is a database caching system for speeding up websites and networks. Memcached servers that support UDP can be abused to launch amplification/reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses which can be amplified by a factor of up to 51,200x.</p><p>In second place, SNMP-based DDoS attacks increased by 709% QoQ. <a href="https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol">Simple Network Management Protocol (SNMP)</a> is a UDP-based protocol that is often used to discover and manage network devices such as printers, switches, routers, and firewalls of a home or <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise network</a> on UDP well-known port 161. In an SNMP reflection attack, the attacker sends out numerous SNMP queries while spoofing the source IP address in the packet as the targets to devices on the network that, in turn, reply to that target’s address. Numerous responses from the devices on the network results in the target network being DDoSed.</p><p>In third place, VxWorks-based DDoS attacks increased by 566% QoQ. <a href="https://en.wikipedia.org/wiki/VxWorks">VxWorks</a> is a real-time operating system (RTOS) often used in embedded systems such as <a href="/rethinking-internet-of-things-security/">Internet of Things (IoT)</a> devices. It also is used in networking and security devices, such as switches, routers, and firewalls. By default, it has a debug service enabled which not only allows anyone to do pretty much anything to those systems, but it can also be used for DDoS amplification attacks. This <a href="https://www.kb.cert.org/vuls/id/362332">exploit</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-2965">CVE-2010-2965</a>) was exposed as early as 2010 and as we can see it is still being used in the wild to generate DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MnZEAp20CoFmqcspA6HZe/ee21e20455900ab5f7d0eb9442a5321b/15.png" />
            
            </figure><p>Top emerging threats in 2022 Q4</p>
    <div>
      <h3>Target industries of network-layer DDoS attacks</h3>
      <a href="#target-industries-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In Q4, the Education Management industry saw the highest percentage of network-layer DDoS attack traffic — 92% of all traffic routed to the industry was network-layer DDoS attack traffic.</p><p>Not too far behind, in the second and third places, the Information Technology and Services alongside the Public Relations and Communications industries also saw a significant amount of network-layer DDoS attack traffic (~73%). With a high margin, the Finance, Gaming / Gambling, and Medical Practice industries came in next with approximately a third of their traffic flagged as attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dfKGZrBYYgeKUCwlhlfr4/c68cf2d430b1984767d632b19808a0f8/16.png" />
            
            </figure><p>Top industries targeted by network-layer DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Target countries of network-layer DDoS attacks</h3>
      <a href="#target-countries-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Grouping attacks by our customers’ billing country lets us understand which countries are subject to more attacks. In Q4, a staggering 93% of traffic to Chinese Internet properties behind Cloudflare was network-layer DDoS attack traffic.</p><p>In second place, Lithuanian Internet properties behind Cloudflare saw 87% of their traffic belonging to network-layer DDoS attack traffic. Following were Finland, Singapore, and Taiwan with the highest percentage of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bEfvLDWfkkRWqPThTtgV4/98c1efc79946123a57864211c16175b2/17.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Source of network-layer DDoS attacks</h3>
      <a href="#source-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In the application-layer, we used the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (i.e., altered). However, in the network layer, source IP addresses <i>can</i> be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 275+ locations around the world.</p><p>In Q4, over 52% of the traffic we ingested in our Botswana-based data center was attack traffic. Not too far behind, over 43% of traffic in Azerbaijan was attack traffic, followed by Paraguay, Palestine, Laos, and Nepal.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3urasUfgMtZcJmVJ6QsEFa/cec4c34f796e096bcef4f8172c8fa816/18.png" />
            
            </figure><p>Top Cloudflare data center locations with the highest percentage of DDoS attack traffic in 2022 Q4</p><p>Please note: Internet Service Providers may sometimes route traffic differently which may skew results. For example, traffic from China may be hauled through California due to various operational considerations.</p>
    <div>
      <h3>Understanding the DDoS threat landscape</h3>
      <a href="#understanding-the-ddos-threat-landscape">
        
      </a>
    </div>
    <p>This quarter, longer and larger attacks became more frequent. Attack durations increased across the board, volumetric attacks surged, and Ransom DDoS attacks continued to rise. During the 2022 holiday season, the top targeted industries for DDoS attacks at the application-layer were Aviation/Aerospace and Events Services. Network-layer DDoS attacks targeted Gaming/Gambling, Finance, and Education Management companies. We also saw a shift in the top emerging threats, with Memcached-based DDoS attacks continuing to increase in prevalence.</p><p>Defending against DDoS attacks is critical for organizations of all sizes. While attacks may be initiated by humans, they are executed by bots — and to play to win, you must fight bots with bots. Detection and mitigation must be automated as much as possible, because relying solely on humans puts defenders at a disadvantage. Cloudflare’s automated systems constantly detect and mitigate DDoS attacks for our customers, so they don’t have to.</p><p>Over the years, it has become easier, cheaper, and more accessible for attackers and attackers-for-hire to launch DDoS attacks. But as easy as it has become for the attackers, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types. We've been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers since 2017 — when we pioneered the concept. Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p><p>Sign up to the <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4075983/global-ddos-attack-trends-you-need-to-know">DDoS Trends Webinar</a> to learn more about the emerging threats and how to defend against them.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">3WvqLxYgZkX537TOAW4a1l</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare DDoS threat report 2022 Q3]]></title>
            <link>https://blog.cloudflare.com/cloudflare-ddos-threat-report-2022-q3/</link>
            <pubDate>Wed, 12 Oct 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3, DDoS attacks increased by 111% YoY, Cloudflare auto-mitigated a 2.5 Tbps attack targeting a Minecraft server as multi-terabit scale DDoS attacks become increasingly frequent. Read more in our 2022 Q3 DDoS Report ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to our DDoS Threat Report for the third quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across Cloudflare’s <a href="https://www.cloudflare.com/network/">global network</a>.</p><p>Multi-terabit strong DDoS attacks have become increasingly frequent. In Q3, Cloudflare automatically detected and mitigated multiple attacks that exceeded 1 Tbps. The largest attack was a 2.5 Tbps DDoS attack launched by a Mirai botnet variant, aimed at the Minecraft server, Wynncraft, that uses <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Cloudflare Spectrum</a>, a reverse-proxy for TCP/UDP applications. This is the largest attack we’ve ever seen from the bitrate perspective.</p><p>It was a multi-vector attack consisting of UDP and TCP floods. However, Wynncraft, a <a href="https://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_game">massively multiplayer online role-playing game</a> Minecraft server where hundreds and thousands of users can play on the same server, didn’t even notice the attack, since Cloudflare filtered it out for them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3TCFRo50VkVGAcKUdzVzYA/8c155dac69947d43ce326222089d3444/1.png" />
            
            </figure><p>The 2.5 Tbps DDoS attack that targeted Wynncraft — launched by Mirai</p>
    <div>
      <h2>General DDoS attack trends</h2>
      <a href="#general-ddos-attack-trends">
        
      </a>
    </div>
    <p>Overall this quarter, we've seen:</p><ul><li><p>An increase in DDoS attacks compared to last year.</p></li><li><p>Longer-lasting volumetric attacks, a spike in attacks generated by the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a> and its variants.</p></li><li><p>Surges in attacks targeting Taiwan and Japan.</p></li></ul>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>HTTP DDoS attacks increased by 111% YoY, but decreased by 10% QoQ.</p></li><li><p>HTTP DDoS attacks targeting Taiwan increased by 200% QoQ; attacks targeting Japan increased by 105% QoQ.</p></li><li><p>Reports of Ransom DDoS attacks increased by 67% YoY and 15% QoQ.</p></li></ul>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>L3/4 DDoS attacks increased by 97% YoY and 24% QoQ.</p></li><li><p>L3/4 DDoS attacks by Mirai botnets increased by 405% QoQ.</p></li><li><p>The Gaming / Gambling industry was the most targeted by L3/4 DDoS attacks including a massive 2.5 Tbps DDoS attack.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare's DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>View the interactive DDoS report on </b><a href="https://radar.cloudflare.com/reports/ddos-2022-q3"><b>Cloudflare Radar</b></a><b>.</b></p>
    <div>
      <h2>Ransom attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> are attacks where the attacker demands a ransom payment, usually in the form of Bitcoin, to stop/avoid the attack. In Q3, 15% of Cloudflare customers that responded to our survey reported being targeted by HTTP DDoS attacks accompanied by a threat or a ransom note. This represents a 15% increase QoQ and 67% increase YoY of reported ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xk4LgKdjcjOLv2LcKLqGv/46ef6d33079e56506741a75ff2d0aefc/2.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks by quarter</p><p>Diving into Q3, we can see that since June 2022, there was a steady decline in reports of ransom attacks. However, in September, the reports of ransom attacks spiked again. In the month of September, almost one out of every four respondents reported receiving a ransom DDoS attack or threat — the highest month in 2022 so far.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66X1MK8ygv5emJk860Wt88/f6d748b7635916687e0663f733cc7a7e/3.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks by month</p><p><b>How we calculate Ransom DDoS attack trends</b>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS'd customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack. Over the past year, on average, we collected 174 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and - in some cases - crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/289gStN2Ls0HO4cKxweF6R/418939b007250f3dcf9359daa35ecc84/4.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attack trends</h3>
      <a href="#application-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>When we look at the graph below, we can see a clear trend of approximately 8% decrease in attacks each quarter since 2022 Q1. However, despite the downward trend, when comparing Q3 of 2022 to Q3 of 2021, we can see that HTTP DDoS attacks still increased by 111% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HC9JR8Ws6DUM4H5CYcSl8/c44460594297a1095019278fd2be64c8/5.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by quarter</p><p>When we dive into the months of the quarter, attacks in September and August were fairly evenly distributed; 36% and 34% respectively. In July, the amount of attacks was the lowest for the quarter (29%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78JheIUhQ79FCTJ57Z6tau/11de4516c489d548db50480033a21608/001.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by month in 2022 Q3</p>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>By bucketing the attacks by our customers’ industry of operation, we can see that HTTP applications operated by Internet companies were the most targeted in Q3. Attacks on the Internet industry increased by 131% QoQ and 300% YoY.</p><p>The second most attacked industry was the Telecommunications industry with an increase of 93% QoQ and 2,317% (!) YoY. In third place was the Gaming / Gambling industry with a more conservative increase of 17% QoQ and 36% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DOYRQeNnUFeATTqFjO9kW/a494995336ceba9c9208d9453c87f553/7.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>Bucketing attacks by our customers’ billing address gives us an understanding of which countries are more attacked. HTTP applications operated by US companies were the most targeted in Q3. US-based websites saw an increase of 60% QoQ and 105% YoY in attacks targeting them. After the US, was China with a 332% increase QoQ and an 800% increase YoY.</p><p>Looking at Ukraine, we can see that attacks targeting Ukrainian websites increased by 67% QoQ but decreased by 50% YoY. Furthermore, attacks targeting Russian websites increased by 31% QoQ and 2,400% (!) YoY.</p><p>In East Asia, we can see that attacks targeting Taiwanese companies increased by 200% QoQ and 60% YoY, and attacks targeting Japanese companies increased by 105% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17Gqyu5nV7UXvxstWirOFS/2bbc95221e3a23c6796a503c47cfeabd/8.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks in 2022 Q3</p><p>When we zoom in on specific countries, we can identify the below trends that may reveal interesting insights regarding the war in Ukraine and geopolitical events in East Asia:</p><p><b>In Ukraine,</b> we see a surprising change in the attacked industries. Over the past two quarters, Broadcasting, Online Media and Publishing companies were targeted the most in what appeared to be an attempt to silence information and make it unavailable to civilians. However, this quarter, those industries dropped out of the top 10 list. Instead, the Marketing &amp; Advertising industry took the lead (40%), followed by Education companies (20%), and Government Administration (8%).</p><p><b>In Russia</b>, attacks on the Banking, Financial Services and Insurance (BFSI) industry continue to persist (25%). Be that as it may, attacks on the BFSI sector still decreased by 44% QoQ. In second place is the Events Services industry (20%), followed by Cryptocurrency (16%), Broadcast Media (13%), and Retail (11%). A significant portion of the attack traffic came from Germany-based IP addresses, and the rest were globally distributed.</p><p><b>In Taiwan,</b> the two most attacked industries were Online Media (50%) and Internet (23%). Attacks to those industries were globally distributed indicating the usage of botnets.</p><p><b>In Japan,</b> the most attacked industry was Internet/Media &amp; Internet (52%), Business Services (12%), and Government - National (11%).</p>
    <div>
      <h3>Application-layer DDoS attack traffic by source country</h3>
      <a href="#application-layer-ddos-attack-traffic-by-source-country">
        
      </a>
    </div>
    <p>Before digging into specific source country metrics, it is important to note that while country of origin is interesting, it is not necessarily indicative of where the attacker is located. Oftentimes with DDoS attacks, they are launched remotely, and attackers will go to great lengths to hide their actual location in an attempt to avoid being caught. If anything, it is indicative of where botnet nodes are located. With that being said, by mapping the attacking IP address to their location, we can understand where attack traffic is coming from.</p><p>After two consecutive quarters, China replaced the US as the main source of HTTP DDoS attack traffic. In Q3, China was the largest source of HTTP DDoS attack traffic. Attack traffic from China-registered IP addresses increased by 29% YoY and 19% QoQ. Following China was India as the second-largest source of HTTP DDoS attack traffic — an increase of 61% YoY. After India, the main sources were the US and Brazil.</p><p>Looking at Ukraine, we can see that this quarter there was a drop in attack traffic originating from Ukrainian and Russian IP addresses — a decrease of 29% and 11% QoQ, respectively. However, YoY, attack traffic from within those countries still increased by 47% and 18%, respectively.</p><p>Another interesting data point is that attack traffic originating from Japanese IP addresses increased by 130% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ihLfGt1e1B1cQMawFy1Yc/42dc81e462d9536625a0aac48ae15ad1/9.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks in 2022 Q3</p>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oVTzylydZrIo6F7vuPbTu/2f42818e1d25e7ac8eb59f1ddff01a13/10.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attack trends</h3>
      <a href="#network-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>In Q3, we saw a large surge in L3/4 DDoS attacks — an increase of 97% YoY and a 24% QoQ. Furthermore, when we look at the graph we can see a clear trend, over the past three quarters, of an increase in attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/U7MKUIp5xU4S9T5Jusncu/8fe90bb8a41694866616077171e4df04/11.png" />
            
            </figure><p>Distribution of L3/4 DDoS attacks by quarter</p><p>Drilling down into the quarter, it's apparent that the attacks were, for the most part, evenly distributed throughout the quarter — with a slightly larger share for July.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5s4xO4fduFcmXeTPISzRFl/07bc58a104d110ce261e0c2410c255e6/12.png" />
            
            </figure><p>Distribution of L3/4 DDoS attacks by month in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by Industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>The Gaming / Gambling industry was hit by the most L3/4 DDoS attacks in Q3. Almost one out of every five bytes Cloudflare ingested towards Gaming / Gambling networks was part of a DDoS attack. This represents a whopping 381% increase QoQ.</p><p>The second most targeted industry was Telecommunications — almost 6% of bytes towards Telecommunications networks were part of DDoS attacks. This represents a 58% drop from the previous quarter where Telecommunications was the top most attacked industry by L3/4 DDoS attacks.</p><p>Following were the Information Technology and Services industry along with the Software industry. Both saw significant growth in attacks — 89% and 150% QoQ, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wFEUduV2X1nGIX5qpNYVK/ec9fce0c933c127647ea6e089134d847/13.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In Q3, Singapore-based companies saw the most L3/4 DDoS attacks — over 15% of all bytes to their networks were associated with a DDoS attack. This represents a dramatic 1,175% increase QoQ.</p><p>The US comes in second after a 45% decrease QoQ in attack traffic targeting US networks. In third, China, with a 62% QoQ increase. Attacks on Taiwan companies also increased by 200% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oh8VJHZb8o7Ip5zwzlZ4o/490b20366e5086f2ce43dc6c258d589a/14.png" />
            
            </figure><p>Top countries targeted by L3/4 DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p>In Q3, Cloudflare’s data centers in Azerbaijan saw the largest percentage of attack traffic. More than a third of all packets ingested there were part of a L3/4 DDoS attack. This represents a 44% increase QoQ and a huge 59-fold increase YoY.</p><p>Similarly, our data centers in Tunisia saw a dramatic increase in attack packets - 173x the amount in the previous year. Zimbabwe and Germany also saw significant increases in attacks.</p><p>Zooming into East Asia, we can see that our data centers in Taiwan saw an increase of attacks — 207% QoQ and 1,989% YoY. We saw similar numbers in Japan where attacks increased by 278% QoQ and 1,921% YoY.</p><p>Looking at Ukraine, we actually see a dip in the amount of attack packets we observed in our Ukraine-based and Russia-based data centers — 49% and 16% QoQ, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68AKBbKAANPEtoRCrTnHzk/8cb99bbcbb2d12e2cc884a9fa4c5f46f/0011.png" />
            
            </figure><p>Top Cloudflare data center locations with the highest percentage of DDoS attack traffic in 2022 Q3</p>
    <div>
      <h3>Attack vectors &amp; Emerging threats</h3>
      <a href="#attack-vectors-emerging-threats">
        
      </a>
    </div>
    <p>An attack vector is the method used to launch the attack or the method of attempting to achieve denial-of-service. With a combined share of 71%, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS attacks</a> remain the most popular DDoS attack vectors in Q3.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5pDeQmJb7HLCYDaUZlRvwa/27ebff95921413137b9fccb992c55899/16.png" />
            
            </figure><p>Top attack vectors in 2022 Q3</p><p>Last quarter, <a href="https://classic.radar.cloudflare.com/notebooks/ddos-2022-q2#emerging-threats">we saw a resurgence</a> of attacks abusing the CHARGEN protocol, the Ubiquity Discovery Protocol, and Memcached reflection attacks. While the growth in Memcached DDoS attacks also slightly grew (48%), this quarter, there was a more dramatic increase in attacks abusing the BitTorrent protocol (1,221%), as well as attacks launched by the Mirai botnet and its variants.</p><p><b>BitTorrent DDoS attacks increased by 1,221% QoQ</b>The <a href="https://en.wikipedia.org/wiki/BitTorrent">BitTorrent protocol</a> is a communication protocol that’s used for peer to peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may use <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker">BitTorrent Trackers</a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table">Distributed Hash Tables (DHT)</a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding">seeding</a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IPs. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p><p><b>Mirai DDoS attacks increased by 405% QoQ</b><a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a> is <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> that infects smart devices that run on <a href="https://en.wikipedia.org/wiki/ARC_(processor)">ARC processors</a>, turning them into a network of bots that can be used to launch DDoS attacks. This processor runs a stripped-down version of the Linux operating system. If the default username-and-password combo is not changed, Mirai is able to log in to the device, infect it, and take over. The botnet operator can instruct the botnet to launch a flood of UDP packets at the victim’s IP address to bombard them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qWtJr9lH7oxal8kUrGfoG/e26e089e6fdc5be9fc3ed038587fe3bc/22.png" />
            
            </figure><p>Top emerging threats in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by Attack Rates &amp; Duration</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rates-duration">
        
      </a>
    </div>
    <p>While Terabit-strong attacks are becoming more frequent, they are still the outliers. The majority of attacks are tiny (in terms of Cloudflare scale). Over 95% of attacks peaked below 50,000 packets per second (pps) and over 97% below 500 Megabits per second (Mbps). We call this “cyber vandalism”.</p><p>What is cyber vandalism? As opposed to “classic” vandalism where the purpose is to cause deliberate destruction of or damage to public or private <i>physical</i> property — such as graffiti on the side of a building — in the cyberworld, cyber vandalism is the act of causing deliberate damage to Internet properties. Today the source codes for various botnets are available online and there are a number of free tools that can be used to launch a flood of packets. By directing those tools to Internet properties, any <a href="https://en.wikipedia.org/wiki/Script_kiddie"><i>script-kid</i></a> can use those tools to launch attacks against their school during exam season or any other website they desire to take down or disrupt. This is as opposed to organized crime, <a href="https://de.wikipedia.org/wiki/Advanced_Persistent_Threat">Advanced Persistent Threat</a> actors, and state-level actors that can launch much larger and sophisticated attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vPLRHd9pyptNQ01znsL3i/2de83530e156717fc9c908fd9a7b39e5/18.png" />
            
            </figure><p>Distribution of DDoS attacks by bitrate in 2022 Q3</p><p>Similarly, most of the attacks are very short and end within 20 minutes (94%). This quarter we did see an increase of 9% in attacks of 1-3 hours, and a 3% increase in attacks over 3 hours — but those are still the outliers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34vW4g7X5wSjR5P9bJEsw0/6d45a0f6cc9bd44315057b8789fa2e0d/19.png" />
            
            </figure><p>QoQ change in the duration of DDoS attacks in 2022 Q3</p><p>Even with the largest attacks, such as the 2.5 Tbps attack we mitigated earlier this quarter, and the <a href="/26m-rps-ddos/">26M request per second attack</a> we mitigated back in the summer, the peak of the attacks were short-lived. The entire 2.5 Tbps attack lasted about 2 minutes, and the peak of the 26M rps attack only 15 seconds. This emphasizes the need for automated, always-on solutions. Security teams can’t respond quick enough. By the time the security engineer looks at the PagerDuty notification on their phone, the attack has subsided.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Attacks may be initiated by humans, but they are executed by bots — and to play to win, you must fight bots with bots. Detection and mitigation must be automated as much as possible, because relying solely on humans puts defenders at a disadvantage. Cloudflare’s automated systems constantly detect and mitigate DDoS attacks for our customers, so they don’t have to.</p><p>Over the years, it has become easier, cheaper, and more accessible for attackers and attackers-for-hire to launch DDoS attacks. But as easy as it has become for the attackers, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types. We've been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers since 2017 — when we pioneered the concept.</p><p>Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p><p>To get the complete PDF version of this report, download it <a href="https://www.cloudflare.com/lp/ddos-trends-report/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">29zFVSZYCZGoz6xYdUWnQj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[The home page for Internet insights: Cloudflare Radar 2.0]]></title>
            <link>https://blog.cloudflare.com/radar2/</link>
            <pubDate>Fri, 30 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar makes Internet trends, patterns and insights available to everyone, and we’re now making them even easier to find, understand and share. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare Radar was <a href="/introducing-cloudflare-radar/">launched</a> two years ago to give everyone access to the Internet trends, patterns and insights Cloudflare uses to help improve our service and protect our customers.</p><p>Until then, these types of insights were only available internally at Cloudflare. However, true to our mission of helping build a better Internet, we felt everyone should be able to look behind the curtain and see the inner workings of the Internet. It’s hard to improve or understand something when you don’t have clear visibility over how it’s working.</p><p>On Cloudflare Radar you can find timely graphs and visualizations on Internet traffic, security and attacks, protocol adoption and usage, and outages that might be affecting the Internet. All of these can be narrowed down by timeframe, country, and Autonomous System (AS). You can also find interactive deep dive reports on important subjects such as <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">DDoS</a> and the <a href="https://radar.cloudflare.com/notebooks/meris-botnet">Meris Botnet</a>. It’s also possible to search for any domain name to see details such as SSL usage and which countries their visitors are coming from.</p><p>Since launch, Cloudflare Radar has been used by NGOs to confirm the Internet disruptions their observers see in the field, by journalists looking for Internet trends related to an event in a country of interest or at volume of cyberattacks as retaliation to political sanctions, by analysts looking at the prevalence of new protocols and technologies, and even by brand PR departments using Cloudflare Radar data to analyze the online impact of a major sports event.</p><p>Cloudflare Radar has clearly become an important tool for many and, most importantly, we find it has helped shed light on parts of the Internet that deserve more attention and investment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UsXBgobiHaEt0VFbYejO7/2db75ff3526426c5e3505bcb4295936e/image2-68.png" />
            
            </figure>
    <div>
      <h3>Introducing Cloudflare Radar 2.0</h3>
      <a href="#introducing-cloudflare-radar-2-0">
        
      </a>
    </div>
    <p>What has made Cloudflare Radar so valuable is that the data and insights it contains are unique and trustworthy. Cloudflare Radar shows aggregate data from across the massive spectrum of Internet traffic we see every day, presenting you with datasets you won’t find elsewhere.</p><p>However, there were still gaps. Today, on the second anniversary of Cloudflare Radar, we are launching Cloudflare Radar 2.0 in beta. It will address three common pieces of feedback from users:</p><ul><li><p><b>Ease of finding insights and data.</b> The way information was structured on Cloudflare Radar made finding information daunting for some people. We are redesigning Cloudflare Radar so that it becomes a breeze.</p></li><li><p><b>Number of insights.</b> We know many users have wanted to see insights about other important parts of the Internet, such as email. We have also completely redesigned the Cloudflare Radar backend so that we can quickly add new insights over the coming months (including insights into email).</p></li><li><p><b><b><b>Sharing insights.</b></b></b> The options for sharing Cloudflare Radar insights were limited. We will now provide you the options you want, including downloadable and embeddable graphs, sharing to social media platforms, and an API.</p></li></ul>
    <div>
      <h3>Finding insights and data</h3>
      <a href="#finding-insights-and-data">
        
      </a>
    </div>
    <p>On a first visit to the <b>redesigned Cloudflare Radar homepage</b> one will notice:</p><ul><li><p>Prominent and intuitive filtering capabilities on the top bar. A global search bar is also coming soon.</p></li><li><p>Content navigation on the sidebar.</p></li><li><p>Content cards showing glanceable and timely information.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XD2Yn5kOz589Q5FmkLpcg/9b225b71cacfe40e05adf9f1a41e7e75/image4-30.png" />
            
            </figure><p>The content you find on the homepage are what we call “quick bytes”. Those link you to more in-depth content for that specific topic, which can also be found through the sidebar navigation.</p><p>At the top of the page you can search for a country, autonomous system number (ASN), domain, or report to navigate to a home page for that specific content. For example, the domain page for google.com:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10cuWEc5xyO1vCVtas5qD0/4f487564d31f5c59ec3391564148fcc0/image3-52.png" />
            
            </figure><p>The <b>navigation sidebar</b> allows you to find more detailed insights and data related to Traffic, Security &amp; Attacks, Adoption &amp; Usage, and Domains. (We will be adding additional topic areas in the future.) It also gives you quick access to the <b>Cloudflare Radar Outage Center</b>, a tool for tracking Internet disruptions around the world and to which we are dedicating a <a href="/announcing-cloudflare-radar-outage-center/">separate blog post</a>, and to <b>Radar Reports</b>, which are interactive deep dive reports on important subjects such as <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">DDoS</a> and the <a href="https://radar.cloudflare.com/notebooks/meris-botnet">Meris Botnet</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1PR3jScOjDRSlVbmHWoBLZ/b1529e2a2c7b32d10d5134f1f9976a88/image1-86.png" />
            
            </figure><p>Within these topic pages (such as the one for Adoption &amp; Usage shown above), you will find the <i>quick bytes</i> for the corresponding topic at the top, and <i>quick bytes</i> for related topics on the right. The <i>quick bytes</i> on the right allow you to quickly glance at and navigate to related sections.</p><p>In the middle of the page are the more detailed charts for the topic you’re exploring.</p>
    <div>
      <h3>Sharing insights</h3>
      <a href="#sharing-insights">
        
      </a>
    </div>
    <p>Cloudflare Radar’s reason to exist is to make Internet insights available to everyone, but historically we haven’t been as flexible as our users would want. People could download a snapshot of the graph, but not much more.</p><p>With Cloudflare Radar 2.0 we will be introducing three major new ways of using Radar insights and data:</p><ul><li><p><b>Social share</b>. Cloudflare Radar 2.0 charts have a more modern and clean look and feel, and soon you’ll be able to share them directly on the social media platform of your choice. No more dealing with low quality screenshots.</p></li><li><p><b>Embeddable charts</b>. The beautiful charts will also be able to be embedded directly into your webpage or blog - it will work just like a widget, always showing up-to-date information.</p></li><li><p><b><b><b>API.</b></b></b> If you like the data on Cloudflare Radar but want to manipulate it further for analysis, visualization, or for posting your own charts, you’ll have the Cloudflare Radar API available to you starting today.</p></li></ul><p>For example, the last seven days of HTTP traffic data for Portugal can be obtained from <a href="https://api.cloudflare.com/client/v4/radar/http/timeseries/device_type?dateRange=7d&amp;location=PT">https://api.cloudflare.com/client/v4/radar/http/timeseries/device_type?dateRange=7d&amp;location=PT</a></p><p><i>Note: The API is available today. To use the Cloudflare API you need an API token or key (more details</i> <a href="https://developers.cloudflare.com/api/get-started/"><i>here</i></a><i>). Embedding charts and sharing directly to social are new features to be released later this year.</i></p>
    <div>
      <h3>Technology changes</h3>
      <a href="#technology-changes">
        
      </a>
    </div>
    <p>Cloudflare Radar 2.0 was built on a new technology stack; we will write a blog post about why and how we did it soon. A lot changed: we now have proper <a href="https://graphql.org/">GraphQL</a> data endpoints and a public API, the website runs on top of <a href="https://pages.cloudflare.com/">Cloudflare Pages</a> and <a href="https://workers.cloudflare.com/">Workers</a>, and we're finally doing server-side rendering using <a href="https://remix.run/">Remix</a>. We adopted SVG whenever possible, built our reusable data visualization components system, and are using <a href="https://reactcosmos.org/">Cosmos</a> for visual TDD. These foundational changes will provide a better UX/UI to our users and give us speed when iterating and improving Cloudflare Radar in the future.</p><p>We hope you find this update valuable, and recommend you keep an eye on <a href="https://radar.cloudflare.com/">radar.cloudflare.com</a> to see the new insights and topics we’ll be adding regularly. If you have any feedback, please send it to us through the <a href="https://community.cloudflare.com/new-topic?category=General/Analytics&amp;tags=CloudflareRadar">Cloudflare Community</a>.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Data]]></category>
            <category><![CDATA[API]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5UOo2pRBGamwFL6jbL6PlN</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Ricardo Baeta</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing Insights]]></title>
            <link>https://blog.cloudflare.com/email-routing-insights/</link>
            <pubDate>Mon, 25 Apr 2022 13:00:05 GMT</pubDate>
            <description><![CDATA[ Insights and Logs are now available to everyone using Cloudflare Email Routing ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Have you ever wanted to try a new email service but worried it might lead to you missing any emails? If you have, you’re definitely not alone. Some of us email ourselves to make sure it reaches the correct destination, others don’t rely on a new address for anything serious until they’ve seen it work for a few days. In any case, emails often contain important information, and we need to trust that our emails won’t get lost for any reason.</p><p>To help reduce these worries about whether emails are being received and forwarded - and for troubleshooting if needed - we are rolling out a new Overview page to Email Routing. On the Overview tab people now have full visibility into our service and can see exactly how we are <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">routing emails</a> on their behalf.</p>
    <div>
      <h3>Routing Status and Metrics</h3>
      <a href="#routing-status-and-metrics">
        
      </a>
    </div>
    <p>The first thing you will see in the new tab is an at a glance view of the service. This includes the routing status (to know if the service is configured and running), whether the necessary DNS records are configured correctly, and the number of custom and destination addresses on the zone.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pNymBZ2FTzmPLJ5WBTiq2/a7f5c67c4945f3286dc535dc728fdb83/image4-7.png" />
            
            </figure><p>Below the configuration summary, you will see more advanced statistics about the number of messages received on your custom addresses, and what happened to those messages. You will see information about the number of emails forwarded or dropped by Email Routing (based on the rules you created), and the number that fall under other scenarios such as being rejected by Email Routing (due to errors, not passing security checks or being considered spam) or rejected by your destination mailbox. You now have the exact counts and a chart, so that you can track these metrics over time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jo7olZgIdmRiAXoCieF01/a941297d7bd7fde5ba6876e962af373b/image2-13.png" />
            
            </figure>
    <div>
      <h3>Activity Log</h3>
      <a href="#activity-log">
        
      </a>
    </div>
    <p>On the Cloudflare Email Routing tab you'll also see the Activity Log, where you can drill deeper into specific behaviors. These logs show you details about the email messages that reached one of the custom addresses you have configured on your Cloudflare zone.</p><p>For each message the logs will show you the Message ID, Sender, Custom Address, when Cloudflare Email Routing received it, and the action that was taken. You can also expand the row to see the SPF, DMARC, and DKIM status of that message along with any relevant error messaging.</p><p>And we know looking at every message can be overwhelming, especially when you might be resorting to the logs for troubleshooting purposes, so you have a few options for filtering:</p><ul><li><p>Search for specific people (email addresses) that have messaged you.</p></li><li><p>Filter to show only one of your custom addresses.</p></li><li><p>Filter to show only messages where a specific action was taken.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3iMzDZKZfwXt5IjOoevIs2/75be43c74a2c7d30d23790a75b7035b7/image1-16.png" />
            
            </figure>
    <div>
      <h3>Routes and Settings</h3>
      <a href="#routes-and-settings">
        
      </a>
    </div>
    <p>Next to the Overview tab, you will find the Routes tab with the configuration UI that is likely already familiar to you. That’s where you create custom addresses, add and verify destination addresses, and create rules with the relationships between the custom and destination addresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uXTTb5EPjihecDDyimvoz/466bb0938861e7a6cf9f8c419ee07263/image3-12.png" />
            
            </figure><p>Lastly the Settings tab includes less common actions such as the DNS configuration and the options for off boarding from Email Routing.</p><p>We expect Email Routing Insights to be available to everyone by Monday May 2nd. We hope you enjoy this update. And if you have any questions or feedback about this product, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p> ]]></content:encoded>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">7Mxsgn2QyYIr6JVH57bScL</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Steven Raden</dc:creator>
        </item>
        <item>
            <title><![CDATA[Health Check Analytics and how you can use it]]></title>
            <link>https://blog.cloudflare.com/health-check-analytics-and-how-you-can-use-it/</link>
            <pubDate>Fri, 12 Jun 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ Health Check Analytics is now live and available to all Pro, Business and Enterprise customers!  We are very excited to help decrease your time to resolution and ensure your application reliability is maximised. ]]></description>
            <content:encoded><![CDATA[ <p>At the end of last year, we introduced <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">Standalone Health Checks</a> - a service that lets you monitor the health of your origin servers and avoid the need to purchase additional third party services. The more that can be controlled from Cloudflare decreases maintenance cost, vendor management, and infrastructure complexity. This is important as it ensures you are able to scale your infrastructure seamlessly as your company grows. Today, we are introducing Standalone Health Check Analytics to help decrease your time to resolution for any potential issues. You can find Health Check Analytics in the sub-menu under the Traffic tab in your Cloudflare Dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7f25fu7kADPkUPmpNrPqbV/efa9b95ac2310e7abd23ea9ee79be535/image6-2.png" />
            
            </figure><p>As a refresher, Standalone Health Checks is a service that monitors an IP address or hostname for your origin servers or application and notifies you in near real-time if there happens to be a problem. These Health Checks support fine-tuned configurations based on expected codes, interval, protocols, timeout and <a href="/new-tools-to-monitor-your-server-and-avoid-downtime/">more</a>. These configurations enable you to properly target your checks based on the unique setup of your infrastructure. An example of a Health Check can be seen below which is monitoring an origin server in a staging environment with a notification set via email.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1rPMDAiXMEg7DUPWHSI33a/74089596eb49bfde3619b08fa3b72941/image7.png" />
            
            </figure><p>Once you set up a notification, you will be alerted when there is a change in the health of your origin server. In the example above, if your staging environment starts responding with anything other than a 200 OK response code, we will send you an email within seconds so you can take the necessary action before customers are impacted.</p>
    <div>
      <h3>Introducing Standalone Health Check Analytics</h3>
      <a href="#introducing-standalone-health-check-analytics">
        
      </a>
    </div>
    <p>Once you get the notification email, we provide tools that help to quickly debug the possible cause of the issue with detailed logs as well as data visualizations enabling you to better understand the context around the issue. Let’s walk through a real-world scenario and see how Health Check Analytics helps decrease our time to resolution.</p><p>A notification email has been sent to you letting you know that Staging is unhealthy. You log into your dashboard and go into Health Check Analytics for this particular Health Check. In the screenshot below, you can see that Staging is up 76% of the time vs 100% of the time for Production. Now that we see the graph validating the email notification that there is indeed a problem, we need to dig in further.  Below the graph you can see a breakdown of the type of errors that have taken place in both the Staging and Production addresses over the specified time period. We see there is only one error taking place, but very frequently, in the staging environment - a TCP Connection Failed error, leading to the lower availability.</p><p>This starts to narrow the funnel for what the issue could be. We know that there is something wrong with either the Staging server's ability to receive connections, maybe an issue during the SYN-ACK handshake, or possibly an issue with the router being used and not an issue with the origin server at all but instead receiving a down-stream consequence. With this information, you can quickly make the necessary checks to validate your hypothesis and minimize your time to resolution. Instead of having to dig through endless logs, or try to make educated guesses at where the issue could stem from, Health Check Analytics allows you to quickly hone in on detailed areas that could be the root cause. This in turn maximizes your application reliability but more importantly, keeps trust and brand expectation with your customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5u9fZspxov0t9Zv6MpDz07/f0e81032ac1c5cc5c7dbba46cb104195/image1-5.png" />
            
            </figure><p>Being able to quickly understand an overview of your infrastructure is important, but sometimes being able to dig deeper into each healthcheck can be more valuable to understand what is happening at a granular level. In addition to general information like address, response-code, <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">round trip time (RTT)</a> and failure reason,  we are adding more features to help you understand the Health Check result(s). We have also added extra information into the event table so you can quickly understand a given problem. In the case of a Response Code Mismatch Error, we now provide the expected response code for a given Health Check along with the received code. This removes the need to go back and check the configuration that may have been setup long ago and keep focus on the problem at hand.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nItEajnHqqIPpyOC2rxBk/3485f38a0c9b7ac77fa827ea4a8fef49/image4.png" />
            
            </figure><p>The availability of different portions of your infrastructure is very important, but this does not provide the complete view. Performance is continuing to skyrocket in importance and value to customers. If an application is not performant, they will quickly go to a competitor without a second thought. Sometimes RTT is not enough to understand why requests have higher latency and where the root of the issue may reside. To better understand where time is spent for a given request, we are introducing the waterfall view of a request within the Event Log. With this view, you can understand the time taken for the TCP connection, time taken for the TLS handshake, and the time to first byte (TTFB) for the request. The waterfall will give you a chronological idea about time spent in different stages of the request.</p><ol><li><p>Time taken for establishing the initial TCP connection.(in dark blue, approx 41ms)</p></li><li><p>Once the TCP connection is established, time is spent doing the TLS handshake. This is another component that takes up time for HTTPS websites. (in light blue, approx 80ms)</p></li><li><p>Once the SYN-ACK handshake and connection is complete, then the time taken for the first byte to be received is also exposed. (in dark orange, approx 222ms)</p></li><li><p>The total round trip time (RTT) is the time taken to load the complete page once the TLS handshake is complete. The difference between the RTT and the TTFB gives you the time spent downloading content from a page. If your page has a large amount of content, the difference between TTFB and RTT will be high. (in light orange, approx 302ms). The page load time is approximately 80 ms for the address.</p></li></ol><p>Using the information above lends to a number of steps that can be taken for the website owner. The delay in initial TCP connection time could be decreased by making the website available in different geo locations around the world. This could also reduce the time for TLS handshake as each round trip will be faster. Another thing that is visible is the page load time of 80ms. This might be because of the contents of the page, maybe compression can be applied on the server side to make the load time better or unnecessary content can be removed. The information in the waterfall view can also tell if an additional external library increases the time to load the website after a release.</p><p>Cloudflare has over 200 edge locations around the world making it one of the largest Anycast networks on the planet. When a health check is configured, it can be run across the different regions on the Cloudflare infrastructure, enabling you to see the variation in latency around the world for specific Health Checks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mvXsdyNuJ4mV3QPhcbjag/a0043711628a194fddb8ce60c6aab2a2/image2-4.png" />
            
            </figure><p>Waterfall from India</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ehZAiYItuf69fyMo7Gful/d723821ec1d4f7f2ac662a94e7d29965/image5-2.png" />
            
            </figure><p>Waterfall from Western North America‌‌</p><p>Based on the new information provided from Health Check Analytics, users can definitively validate that the address performs better from Western North America compared to India due to the page load time and overall RTT.</p>
    <div>
      <h3>How do health checks run?</h3>
      <a href="#how-do-health-checks-run">
        
      </a>
    </div>
    <p>To understand and decipher the logs that are found in the analytics dashboard, it is important to understand how Cloudflare runs the Health Checks. Cloudflare has data centers in more than 200 cities across 90+ countries throughout the world [<a href="/cloudflare-expanded-to-200-cities-in-2019/">more</a>]. We don’t run health checks from every single of these data centers (that would be a lot of requests to your servers!). Instead, we let you pick between one and thirteen regions from which to run health checks [<a href="https://api.cloudflare.com/#health-checks-create-health-check">Regions</a>].</p><p>The Internet is not the same everywhere around the world. So your users may not have the same experience on your application according to where they are. Running Health Checks from different regions lets you know the health of your application from the point of view of the Cloudflare network in each of these regions.</p><p>Imagine you configure a Health Check from two regions, Western North America and South East Asia, at an interval of 10 seconds. You may have been expecting to get two requests to your origin server every 10 seconds, but if you look at your server’s logs you will see that you are actually getting six. That is because we send Health Checks not just from one location in each region but three.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6thlddjekU628u1WI3wPrY/204fd64bba493ca2d3b3969ca9a8ddff/image3-1.png" />
            
            </figure><p>For a health check configured from All Regions (thirteen regions) there will be 39 requests to your server per configured interval.</p><p>You may wonder: ‘Why do you probe from multiple locations within a region?’ We do this to make sure the health we report represents the overall performance of your service as seen from that region. Before we report a change, we check that at least two locations agree on the status. We added a third one to make sure that the system keeps running even if there is an issue at one of our locations.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Health Check Analytics is now live and available to all Pro, Business and Enterprise customers!  We are very excited to help decrease your time to resolution and ensure your application reliability is maximised.</p> ]]></content:encoded>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">6xUAxLdz1IsT1SOEn5ErYy</guid>
            <dc:creator>Fabienne Semeria</dc:creator>
            <dc:creator>Brian Batraski</dc:creator>
            <dc:creator>George Thomas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Test your home network performance]]></title>
            <link>https://blog.cloudflare.com/test-your-home-network-performance/</link>
            <pubDate>Tue, 26 May 2020 17:00:59 GMT</pubDate>
            <description><![CDATA[ Cloudflare launches speed.cloudflare.com, a tool that allows you to gain in-depth insights into the quality of your network uplink, including throughput, latency and jitter. ]]></description>
            <content:encoded><![CDATA[ <p>With many people being forced to work from home, there’s <a href="/recent-trends-in-internet-traffic/">increased load on consumer ISPs</a>. You may be asking yourself: how well is my ISP performing with even more traffic? Today we’re announcing the general availability of speed.cloudflare.com, a way to gain meaningful insights into exactly how well your network is performing.</p><p>We’ve seen a massive shift from users accessing the Internet from <a href="/covid-19-impacts-on-internet-traffic-seattle-italy-and-south-korea/">busy office districts to spread out urban areas</a>.</p><p>Although there are a slew of speed testing tools out there, none of them give you precise insights into how they came to those measurements and how they map to real-world performance. With <a href="https://speed.cloudflare.com">speed.cloudflare.com</a>, we give you insights into what we’re measuring and how exactly we calculate the scores for your network connection. Best of all, you can easily download the measurements from right inside the tool if you’d like to perform your own analysis.</p><p>We also know you care about privacy. We believe that you should know what happens with the results generated by this tool. Many other tools sell the data to third parties. Cloudflare does not sell your data. Performance data is collected and anonymized and is governed by the terms of our <a href="https://www.cloudflare.com/privacypolicy/">Privacy Policy</a>. The data is used anonymously to determine how we can improve our network, both in terms of capacity as well as to help us determine which Internet Service Providers to peer with.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2XmV7Z2R39XCeitSokM2tH/c14af6877c0e7dc4d87e96be78a43aef/image1-10.png" />
            
            </figure><p>The test has three main components: download, upload and a latency test. Each measures  different aspects of your network connection.</p>
    <div>
      <h3>Down</h3>
      <a href="#down">
        
      </a>
    </div>
    <p>For starters we run you through a basic download test. We start off downloading small files and progressively move up to larger and larger files until the test has saturated your Internet downlink. Small files (we start off with 10KB, then 100KB and so on) are a good representation of how websites will load, as these typically encompass many small files such as images, CSS stylesheets and JSON blobs.</p><p>For each file size, we show you the measurements inside a table, allowing you to drill down. Each dot in the bar graph represents one of the measurements, with the thin line delineating the range of speeds we've measured. The slightly thicker block represents the set of measurements between the 25th and 75th percentile.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AHcHPWM661ZMzgT6vvSPK/a8ee84fa21f13641439a7bb0342ecb2b/image2-10.png" />
            
            </figure><p>Getting up to the larger file sizes we can see true maximum throughput: how much bandwidth do you really have? You may be wondering why we have to use progressively larger files. The reason is that download speeds start off slow (this is aptly called <a href="https://en.wikipedia.org/wiki/TCP_congestion_control#Slow_start">slow start</a>) and then progressively gets faster. If we were to use only small files we would never get to the maximum throughput that your network provider supports, which should be close to the Internet speed your ISP quoted you when you signed up for service.</p><p>The maximum throughput on larger files will be indicative of how fast you can download large files such as games (<a href="https://store.steampowered.com/app/271590/Grand_Theft_Auto_V/">GTA V</a> is almost 100 GB to download!) or the maximum quality that you can stream video on (lower download speed means you have to use a lower resolution to get continuous playback). We only increase download file sizes up to the absolute minimum required to get accurate measurements: no wasted bandwidth.</p>
    <div>
      <h3>Up</h3>
      <a href="#up">
        
      </a>
    </div>
    <p>Upload is the opposite of download: we send data <i>from</i> your browser <i>to</i> the Internet. This metric is more important nowadays with many people working from home: it directly affects <a href="https://www.cloudflare.com/developer-platform/solutions/live-streaming/">live video conferencing</a>. A faster upload speed means your microphone and video feed can be of higher quality, meaning people can see and hear you more clearly on videoconferences.</p><p>Measurements for upload operate in the same manner: we progressively try to upload larger and larger files up until the point we notice your connection is saturated.</p><p>Speed measurements are never 100% consistent, which is why we repeat them. An easy way for us to report your speed would be to simply report the fastest speed we see. The problem is that this will not be representative of your real-world experience: latency and packet loss constantly fluctuates, meaning you can't expect to see your maximum measured performance all the time.</p><p>To compensate for this, we take the 90th percentile of measurements, or p90 and report that instead of the absolute maximum speed that we measured. Taking the 90th percentile is a more accurate representation in that it discounts peak outliers, which is a much closer approximation of what you can expect in terms of speeds in the real world.</p>
    <div>
      <h3>Latency and Jitter</h3>
      <a href="#latency-and-jitter">
        
      </a>
    </div>
    <p>Download and upload are important metrics but don't paint the entire picture of the quality of your Internet connection. Many of us find ourselves interacting with work and friends over videoconferencing software more than ever. Although speeds matter, video is also very sensitive to the <i>latency</i> of your Internet connection. Latency represents the time an IP <i>packet</i> needs to travel from your device to the service you're using on the Internet and back. High latency means that when you're talking on a video conference, it will take longer for the other party to hear your voice.</p><p>But, latency only paints half the picture. Imagine yourself in a conversation where you have some delay before you hear what the other person says. That may be annoying but after a while you get used to it. What would be even worse is if the delay <i>differed</i> constantly: sometimes the audio is almost in sync and sometimes it has a delay of a few seconds. You can imagine how often this would result into two people starting to talk at the same time. This is directly related to how <i>stable</i> your latency is and is represented by the jitter metric. Jitter is the average variation found in consecutive latency measurements. A lower number means that the latencies measured are more consistent, meaning your media streams will have the same delay throughout the session.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4J8jZSYw2a59lXQZLn3Dtf/9704dd82d47bedfab3a8669b8c3f8a61/image4-5.png" />
            
            </figure><p>We've designed speed.cloudflare.com to be as transparent as possible: you can click into any of the measurements to see the average, median, minimum, maximum measurements, and more. If you're interested in playing around with the numbers, there's a download button that will give you the raw results we measured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2AvTQZVVkOnGyXWDijbUkr/a138ef20812bfc813b8e3e7ee0333f91/image3-9.png" />
            
            </figure><p>The entire speed.cloudflare.com backend runs on Workers, meaning all logic runs entirely on the Cloudflare edge and your browser, no server necessary! If you're interested in seeing how the benchmarks take place, we've open-sourced the code, feel free to take a peek on our <a href="https://github.com/cloudflare/worker-speedtest-template">Github</a> repository.</p><p>We hope you'll enjoy adding this tool to your set of network debugging tools. We love being transparent and our tools reflect this: your network performance is more than just one number. Give it a <a href="https://speed.cloudflare.com">whirl</a> and let us know what you think.</p> ]]></content:encoded>
            <category><![CDATA[Performance]]></category>
            <category><![CDATA[Speed]]></category>
            <category><![CDATA[Latency]]></category>
            <category><![CDATA[COVID-19]]></category>
            <category><![CDATA[Insights]]></category>
            <guid isPermaLink="false">HF2StgkKQVmu9H1vJZ3dp</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
        <item>
            <title><![CDATA[New tools to monitor your server and avoid downtime]]></title>
            <link>https://blog.cloudflare.com/new-tools-to-monitor-your-server-and-avoid-downtime/</link>
            <pubDate>Wed, 11 Dec 2019 10:13:00 GMT</pubDate>
            <description><![CDATA[ When your server goes down, it’s a big problem. Today, Cloudflare is introducing two new tools to help you understand and respond faster to origin downtime — plus, a new service to automatically avoid downtime. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>When your server goes down, it’s a big problem. Today, Cloudflare is introducing two new tools to help you understand and respond faster to origin downtime — plus, a new service to automatically <i>avoid</i> downtime.</p><p>The new features are:</p><ul><li><p><b>Standalone Health Checks</b>, which notify you as soon as we detect problems at your origin server, without needing a Cloudflare Load Balancer.</p></li><li><p><b>Passive Origin Monitoring</b>, which lets you know when your origin cannot be reached, with no configuration required.</p></li><li><p><b>Zero-Downtime Failover</b>, which can automatically avert failures by retrying requests to origin.</p></li></ul>
    <div>
      <h3>Standalone Health Checks</h3>
      <a href="#standalone-health-checks">
        
      </a>
    </div>
    <p>Our first new tool is Standalone Health Checks, which will notify you as soon as we detect problems at your origin server -- without needing a Cloudflare Load Balancer.</p><p>A <i>Health Check</i> is a service that runs on our edge network to monitor whether your origin server is online. Health Checks are a key part of our load balancing service because they allow us to quickly and actively route traffic to origin servers that are live and ready to serve requests. Standalone Health Checks allow you to monitor the health of your origin even if you only have one origin or do not yet need to balance traffic across your infrastructure.</p><p>We’ve provided many dimensions for you to hone in on exactly what you’d like to check, including response code, protocol type, and interval. You can specify a particular path if your origin serves multiple applications, or you can check a larger subset of response codes for your staging environment. All of these options allow you to properly target your Health Check, giving you a precise picture of what is wrong with your origin.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vtTuksJ9p1aCImlW8G92Q/77f4673597912f4e067c567c9caa7414/image4-3.png" />
            
            </figure><p>If one of your origin servers becomes unavailable, you will receive a notification letting you know of the health change, along with detailed information about the failure so you can take action to restore your origin’s health.  </p><p>Lastly, once you’ve set up your Health Checks across the different origin servers, you may want to see trends or the top unhealthy origins. With Health Check Analytics, you’ll be able to view all the change events for a given health check, isolate origins that may be top offenders or not performing at par, and move forward with a fix. On top of this, in the near future, we are working to provide you with access to all Health Check raw events to ensure you have the detailed lens to compare Cloudflare Health Check Event logs against internal server logs.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VYa5CvnnQFYZPtYy6HJ0D/c0b8f509411e19726998b1d6fd3f2b49/image5-3.png" />
            
            </figure><p><b>Users on the Pro, Business, or Enterprise plan will have access to Standalone Health Checks and Health Check Analytics</b> to promote top-tier application reliability and help maximize brand trust with their customers. You can access Standalone Health Checks and Health Check Analytics through the Traffic app in the dashboard.</p>
    <div>
      <h3>Passive Origin Monitoring</h3>
      <a href="#passive-origin-monitoring">
        
      </a>
    </div>
    <p>Standalone Health Checks are a super flexible way to understand what’s happening at your origin server. However, they require some forethought to configure before an outage happens. That’s why we’re excited to introduce <i>Passive</i> Origin Monitoring, which will automatically notify you when a problem occurs -- no configuration required.</p><p>Cloudflare knows when your origin is down, because we’re the ones trying to reach it to serve traffic! When we detect downtime lasting longer than a few minutes, we’ll send you an email.</p><p>Starting today, you can configure origin monitoring alerts to go to multiple email addresses. Origin Monitoring alerts are available in the new Notification Center (more on that below!) in the Cloudflare dashboard:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KZoJ9kNRg0X8i3LJkBtZN/fd6b4d2b57d0781d495b17effd855495/image1-6.png" />
            
            </figure><p><b>Passive Origin Monitoring is available to customers on </b><a href="https://www.cloudflare.com/plans/"><b>all Cloudflare plans</b></a><b>.</b></p>
    <div>
      <h3>Zero-Downtime Failover</h3>
      <a href="#zero-downtime-failover">
        
      </a>
    </div>
    <p>What’s better than getting notified about downtime? Never having downtime in the first place! With Zero-Downtime Failover, we can automatically retry requests to origin, even before Load Balancing kicks in.</p><p>How does it work? If a request to your origin fails, and Cloudflare has another record for your origin server, we’ll just try another origin <i>within the same HTTP request</i>. The alternate record could be either an A/AAAA record configured via Cloudflare DNS, or another origin server in the same Load Balancing pool.</p><p>Consider an website, example.com, that has web servers at two different IP addresses: <code>203.0.113.1</code> and <code>203.0.113.2</code>. Before Zero-Downtime Failover, if <code>203.0.113.1</code> becomes unavailable, Cloudflare would attempt to connect, fail, and ultimately serve an error page to the user. With Zero-Downtime Failover, if <code>203.0.113.1</code> cannot be reached, then Cloudflare’s proxy will seamlessly attempt to connect to <code>203.0.113.2</code>. If the second server can respond, then Cloudflare can avert serving an error to example.com’s user.</p><p>Since we rolled Zero-Downtime Failover a few weeks ago, we’ve prevented <b>tens of millions of requests per day</b> from failing!</p><p>Zero-Downtime <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">Failover</a> works in conjunction with <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">Load Balancing</a>, Standalone Health Checks, and Passive Origin Monitoring to keep your website running without a hitch. Health Checks and Load Balancing can avert failure, but take time to kick in. Zero-Downtime failover works instantly, but adds latency on each connection attempt. In practice, Zero-Downtime Failover is helpful at the <i>start</i> of an event, when it can instantly recover from errors; once a Health Check has detected a problem, a Load Balancer can then kick in and properly re-route traffic. And if no origin is available, we’ll send an alert via Passive Origin Monitoring.</p><p>To see an example of this in practice, consider an incident from a recent customer. They saw a spike in errors at their origin that would ordinarily cause availability to plummet (red line), but thanks to Zero-Downtime failover, their actual availability stayed flat (blue line).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cvaHca9BEnJbZXotcJ20N/e2e930d0986728978a569df15e719f51/zdf-availability.png" />
            
            </figure><p>During a 30 minute time period, Zero-Downtime Failover improved overall availability from 99.53% to 99.98%, and prevented 140,000 HTTP requests from resulting in an error.</p><p>It’s important to note that we only attempt to retry requests that have failed during the TCP or TLS connection phase, which ensures that HTTP headers and payload have not been transmitted yet. Thanks to this safety mechanism, <b>we're able to make Zero-Downtime Failover Cloudflare's default behavior for Pro, Business, and Enterprise plans</b>. In other words, Zero-Downtime Failover makes connections to your origins more reliable with no configuration or action required.</p>
    <div>
      <h3>Coming soon: more notifications, more flexibility</h3>
      <a href="#coming-soon-more-notifications-more-flexibility">
        
      </a>
    </div>
    <p>Our customers are always asking us for more insights into the health of their critical edge infrastructure. Health Checks and Passive Origin monitoring are a significant step towards Cloudflare taking a <b>proactive</b> instead of reactive approach to insights.</p><p>To support this work, today we’re announcing the <b>Notification Center</b> as the central place to manage notifications. This is available in the dashboard today, accessible from your Account Home.</p><p>From here, you can create new notifications, as well as view any existing notifications you’ve already set up. Today’s release allows you to configure  Passive Origin Monitoring notifications, and set multiple email recipients.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZDuV1fp4eY29qoySlyBr2/a67bfa65849c3194b1ab990b889f66c2/image2-7.png" />
            
            </figure><p>We’re excited about today’s launches to helping our customers avoid downtime. Based on your feedback, we have lots of improvements planned that can help you get the timely insights you need:</p><ul><li><p>New notification delivery mechanisms</p></li><li><p>More events that can trigger notifications</p></li><li><p>Advanced configuration options for Health Checks, including added protocols, threshold based notifications, and threshold based status changes.</p></li><li><p>More ways to configure Passive Health Checks, like the ability to add thresholds, and filter to specific status codes</p></li></ul> ]]></content:encoded>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">Uj0yC4ktYS40SSrcbwbbH</guid>
            <dc:creator>Brian Batraski</dc:creator>
            <dc:creator>Jon Levine</dc:creator>
            <dc:creator>Steven Pack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Load Balancing Analytics]]></title>
            <link>https://blog.cloudflare.com/introducing-load-balancing-analytics/</link>
            <pubDate>Tue, 10 Dec 2019 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare aspires to make Internet properties everywhere faster, more secure, and more reliable. Load Balancing helps with speed and reliability and has been evolving over the past three years. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare aspires to make Internet properties everywhere faster, more secure, and more reliable. <a href="https://www.cloudflare.com/load-balancing/">Load Balancing</a> helps with speed and reliability and has been evolving over the past <a href="/cloudflare-traffic/">three years</a>.</p><p>Let’s go through a scenario that highlights a bit more of <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">what a Load Balancer is</a> and the value it can provide.  A standard load balancer comprises a set of pools, each of which have origin servers that are hostnames and/or IP addresses. A routing policy is assigned to each load balancer, which determines the origin pool selection process.</p><p>Let’s say you build an API that is using cloud provider ACME Web Services. Unfortunately, ACME had a rough week, and their service had a regional outage in their Eastern US region. Consequently, your website was unable to serve traffic during this period, which resulted in reduced brand trust from users and missed revenue. To prevent this from happening again, you decide to take two steps: use a secondary cloud provider (in order to avoid having ACME as a single point of failure) and use Cloudflare’s Load Balancing to take advantage of the multi-cloud architecture. Cloudflare’s Load Balancing can help you maximize your API’s availability for your new architecture. For example, you can assign health checks to each of your origin pools. These health checks can monitor your origin servers’ health by checking HTTP status codes, response bodies, and more. If an origin pool’s response doesn’t match what is expected, then traffic will stop being steered there. This will reduce downtime for your API when ACME has a regional outage because traffic in that region will seamlessly be rerouted to your fallback origin pool(s). In this scenario, you can set the fallback pool to be origin servers in your secondary cloud provider. In addition to health checks, you can use the ‘random’ routing policy in order to distribute your customers’ API requests evenly across your backend. If you want to optimize your response time instead, you can use ‘dynamic steering’, which will send traffic to the origin determined to be closest to your customer.</p><p>Our customers love Cloudflare Load Balancing, and we’re always looking to improve and make our customers’ lives easier. Since Cloudflare’s Load Balancing was first released, the most popular customer request was for an analytics service that would provide insights on traffic steering decisions.</p><p>Today, we are rolling out <a href="https://dash.cloudflare.com/traffic/load-balancing-analytics">Load Balancing Analytics</a> in the Traffic tab of the Cloudflare  dashboard. The three major components in the analytics service are:</p><ul><li><p>An overview of traffic flow that can be filtered by load balancer, pool, origin, and region.</p></li><li><p>A latency map that indicates origin health status and latency metrics from <a href="https://www.cloudflare.com/network/">Cloudflare’s global network spanning 194 cities</a> and growing!</p></li><li><p>Event logs denoting changes in origin health. This feature was released in 2018 and tracks pool and origin transitions between healthy and unhealthy states. We’ve moved these logs under the new Load Balancing Analytics subtab. See the <a href="https://support.cloudflare.com/hc/en-us/articles/360000062871-Load-Balancing-Event-Logs">documentation</a> to learn more.</p></li></ul><p>In this blog post, we’ll discuss the traffic flow distribution and the latency map.</p>
    <div>
      <h2>Traffic Flow Overview</h2>
      <a href="#traffic-flow-overview">
        
      </a>
    </div>
    <p>Our users want a detailed view into where their traffic is going, why it is going there, and insights into what changes may optimize their infrastructure. With Load Balancing Analytics, users can graphically view traffic demands on load balancers, pools, and origins over variable time ranges.</p><p>Understanding how traffic flow is distributed informs the process of creating new origin pools, adapting to peak traffic demands, and observing failover response during origin pool failures.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TWw8kMjxWkVZ2m8MeYz8D/863596a6142772d6391a1e4dd3b1f3f4/image5-1.png" />
            
            </figure><p>Figure 1</p><p>In Figure 1, we can see an overview of traffic for a given domain. On Tuesday, the 24th, the red pool was created and added to the load balancer. In the following 36 hours, as the red pool handled more traffic, the blue and green pool both saw a reduced workload. In this scenario, the traffic distribution graph did provide the customer with new insights. First, it demonstrated that traffic was being steered to the new red pool. It also allowed the customer to understand the new level of traffic distribution across their network. Finally, it allowed the customer to confirm whether traffic decreased in the expected pools. Over time, these graphs can be used to better manage capacity and plan for upcoming infrastructure needs.</p>
    <div>
      <h2>Latency Map</h2>
      <a href="#latency-map">
        
      </a>
    </div>
    <p>The traffic distribution overview is only one part of the puzzle. Another essential component is understanding request performance around the world. This is useful because customers can ensure user requests are handled as fast as possible, regardless of where in the world the request originates.</p><p>The standard Load Balancing configuration contains monitors that probe the health of customer origins. These monitors can be configured to run from a particular region(s) or, for Enterprise customers, from <a href="https://www.cloudflare.com/network/">all Cloudflare locations</a>. They collect useful information, such as round-trip time, that can be aggregated to create the latency map.</p><p>The map provides a summary of how responsive origins are from around the world, so customers can see regions where requests are underperforming and may need further investigation. A common metric used to identify performance is request latency. We found that the p90 latency for all Load Balancing origins being monitored is 300 milliseconds, which means that 90% of all monitors’ health checks had a round trip time faster than 300 milliseconds. We used this value to identify locations where latency was slower than the p90 latency seen by other Load Balancing customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h0Yh8XJ5eicGBGDwqzKgO/5261df5479aaccfe537ebb6cab47a61f/image6-2.png" />
            
            </figure><p>Figure 2</p><p>In Figure 2, we can see the responsiveness of the Northeast Asia pool. The Northeast Asia pool is slow specifically for monitors in South America, the Middle East, and Southern Africa, but fast for monitors that are probing closer to the origin pool. Unfortunately, this means users for the pool in countries like Paraguay are seeing high request latency. High page load times have many unfortunate consequences: higher visitor bounce rate, decreased visitor satisfaction rate, and a lower search engine ranking. In order to avoid these repercussions, a site administrator could consider adding a new origin pool in a region closer to underserved regions. In Figure 3, we can see the result of adding a new origin pool in Eastern North America. We see the number of locations where the domain was found to be unhealthy drops to zero and the number of slow locations cut by more than 50%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZgBHTryIIddChrdpq3nPl/5ae7f131f2894e2caac5d28800681a48/image3-2.png" />
            
            </figure><p>Figure 3</p><p>Tied with the traffic flow metrics from the Overview page, the latency map arms users with insights to optimize their internal systems, reduce their costs, and increase their <a href="https://www.cloudflare.com/learning/performance/glossary/application-availability/">application availability</a>.</p>
    <div>
      <h2>GraphQL Analytics API</h2>
      <a href="#graphql-analytics-api">
        
      </a>
    </div>
    <p>Behind the scenes, Load Balancing Analytics is powered by the GraphQL Analytics API. As you’ll learn later this week, GraphQL provides many benefits to us at Cloudflare. Customers now only need to learn a single API format that will allow them to extract only the data they require. For internal development, GraphQL eliminates the need for customized analytics APIs for each service, reduces query cost by increasing cache hits, and reduces developer fatigue by using a straightforward query language with standardized input and output formats. Very soon, all Load Balancing customers on paid plans will be given the opportunity to extract insights from the GraphQL API.  Let’s walk through some examples of how you can utilize the GraphQL API to understand your Load Balancing logs.</p><p>Suppose you want to understand the number of requests the pools for a load balancer are seeing from the different locations in Cloudflare’s global network. The query in Figure 4 counts the number of unique (location, pool ID) combinations every fifteen minutes over the course of a week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/iG1rrtCkk9R95r1l8b2Yf/2b4b4fc042c9141e93bc627d29ee0182/image7.png" />
            
            </figure><p>Figure 4</p><p>For context, our example load balancer, lb.example.com, utilizes dynamic steering. <a href="/i-wanna-go-fast-load-balancing-dynamic-steering/">Dynamic steering</a> directs requests to the most responsive, available, origin pool, which is often the closest. It does so using a weighted round-trip time measurement. Let’s try to understand why all traffic from Singapore (SIN) is being steered to our pool in Northeast Asia (asia-ne). We can run the query in Figure 5. This query shows us that the asia-ne pool has an avgRttMs value of 67ms, whereas the other two pools have avgRttMs values that exceed 150ms. The lower avgRttMs value explains why traffic in Singapore is being routed to the asia-ne pool.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5y7YRu5ZthmJV6JMZ6Sxlv/8199396319354447783e07a62cf685ad/image4-1.png" />
            
            </figure><p>Figure 5</p><p>Notice how the query in Figure 4 uses the loadBalancingRequestsGroups schema, whereas the query in Figure 5 uses the loadBalancingRequests schema. loadBalancingRequestsGroups queries aggregate data over the requested query interval, whereas loadBalancingRequests provides granular information on individual requests. For those ready to get started, Cloudflare has written a helpful <a href="https://developers.cloudflare.com/analytics/graphql-api/getting-started/">guide</a>. The <a href="https://graphql.org/learn/">GraphQL website</a> is also a great resource. We recommend you use an IDE like <a href="https://electronjs.org/apps/graphiql">GraphiQL</a> to make your queries. GraphiQL embeds the schema documentation into the IDE, autocompletes, saves your queries, and manages your custom headers, all of which help make the developer experience smoother.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Now that the Load Balancing Analytics solution is live and available to all Pro, Business, Enterprise customers, we’re excited for you to start using it! We’ve attached a survey to the Traffic overview page, and we’d love to hear your feedback.</p> ]]></content:encoded>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">50oghLDuz1nzE8oznPQP3Y</guid>
            <dc:creator>Brian Batraski</dc:creator>
            <dc:creator>Rohin Lohe</dc:creator>
        </item>
    </channel>
</rss>