/plushcap/analysis/cloudflare/mitigating-a-754-million-pps-ddos-attack-automatically

Mitigating a 754 Million PPS DDoS Attack Automatically

What's this blog post about?

On June 21, 2020, Cloudflare mitigated a highly volumetric DDoS attack that peaked at 754 million packets per second. The attack was part of an organized four-day campaign and targeted a single Cloudflare IP address mostly used for websites on the Free plan. No downtime or service degradation was reported during the attack, and no charges accrued to customers due to Cloudflare's unmetered mitigation guarantee. The attack was detected and handled automatically by Gatebot, their global DDoS detection and mitigation system without any manual intervention. During the four days, the attack utilized a combination of three attack vectors over the TCP protocol: SYN floods, ACK floods, and SYN-ACK floods. Despite the high packet rates, Cloudflare's edge continued serving its customers during the attack without impacting performance at all. The DDoS protection systems Gatebot and dosd were instrumental in detecting and mitigating the attack automatically.

Company
Cloudflare

Date published
July 9, 2020

Author(s)
Omer Yoachimik

Word count
1044

Language
English

Hacker News points
7


By Matt Makai. 2021-2024.