SlideShare a Scribd company logo
DDoS 101: Attack types and mitigations
• Launched: 2010
• Offices: 8 (San Francisco, Austin, London, Champaign, IL, Boston,
Singapore, Washington, D.C., New York)
• Employees: Approximately 500
• Data centres: 120 in 58 countries
• Domains: 7 million+; 15,000+ new domains sign up for Cloudflare daily
• Percent of Internet (HTTP/S) requests flowing through our network
each month: 10 percent
• DNS queries: We consistently do around 1.2 million DNS queries per second.
That's around 103.68 billion queries per day, and 3.11 trillion queries a month.
About us
Contacts David Fenton
Regional Sales Manager Australia / New Zealand
Mobile: +61 (0) 413 438 412
Email: dfenton@cloudflare.com
Manu Sharma
Account Manager Australia / New Zealand
Mobile: + 61 (0) 422 953 979
Email: manu@cloudflare.com
Naveen Singh
Solutions Engineer Australia / New Zealand
Mobile: +61 (0) 416 428 925
Email: naveen@cloudflare.com
Live Data Center
In Progress/Planned
95%
of internet users will live in a country
with a Cloudflare data center
15 Tbps Capacity and 120 Data Centre Global Footprint
ANZ Local PoPs:
• Sydney
• Brisbane
• Melbourne
• Perth
• Auckland
DDoS Attacks are evolving in size and complexity
OSI model
DDoS attacks per day against Cloudflare customers
Graph courtesy of John Graham-Cumming
Cloudflare’s benefits
PERFORMANCE
CDN
Load
Balancing
Web
Optimization
SECURITY
DDoS
WAF
SSL
Rate
Limiting
RELIABILITY
DNS China
INSIGHT
Threat
Analytics
Enterprise
logs
Volumetric DNS Flood
Bots
DNS Server
DNS Server Server
Amplification (Layer 3 & 4)
HTTP Flood (Layer 7)
1
2
Bots
3
Bots
Degrades availability and performance of applications, websites, and APIs
HTTP
Application
Application/Login
Types of DDoS Attack Traffic
How to perform a DDoS attack
Get a cool costume
How to stop a DDoS attack
Get an even
cooler costume
Mitigations
• Volumetric DNS Flood
DNS Flood – bad DNS requests are dropped by our large and highly distributed DNS.
Cloudflare's anycast DNS will absorb any DNS DDoS attack and keep your DNS up and
running all time.
• Amplification (Layer 3 & 4)
Layer 3,4 and 7 are mitigated through the PoPs Layer 3 is mitigated by IP Reputation
database and IP Firewall, for Layer 4 traffic is dropped automatically at the edge node.
• HTTP Flood (Layer 7)
Layer 7 additional mitigation is provided by the WAF and Rate Limiting. Cloudflare
Caching of static assets help offload attack traffic off your origin as well.
Network Architectures (HTTP Traffic)
Unicast
• Geo-routing done using DNS
• Allows for traffic control but can be bypassed
• Handover/failover needs DNS cache to expire
From seconds to hours
Anycast
• Geo-routing done using shortest path to a same IP
(generally to the geographically closest PoP / the network operators
decide)
• Immediate failover
• Automatic DDOS attack repartition over all our network
Attack Mitigation
• Data processing services analyse attack patterns
• Finding correlations intelligently
• Bad bot detection
• HTTP headers/IP Data
• Services create rules
• Rules deployed to the Cloudflare Edge network
• Changes measured
Gatebot!
● It’s cheaper than ever to run a DDoS Attack
○ Using Botnets with fast household internet
○ Using breached IoT devices (i.e. security cameras)
● Application (Layer 7) attacks are efficient
○ It costs more resources for a web app to load a
page than to make a request
● Presentation (Layer 6) attacks can complement
○ Using slow crypto operations to increase damage
The Long Tail of DDoS Attacks
David Fenton
Regional Sales Manager Australia / New Zealand
Mobile: +61 (0) 413 438 412
Email: dfenton@cloudflare.com
Manu Sharma
Account Manager Australia / New Zealand
Mobile: + 61 (0) 422 953 979
Email: manu@cloudflare.com
Naveen Singh
Solutions Engineer Australia / New Zealand
Mobile: +61 (0) 416 428 925
Email: naveen@cloudflare.com

More Related Content

PPTX
VAPT PRESENTATION full.pptx
PPTX
SOC and SIEM.pptx
PPT
Application Security
PDF
Introduction to Cybersecurity
PDF
Sample network vulnerability analysis proposal
PPT
DDoS Attacks
PPTX
Zero Trust Network Access
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
VAPT PRESENTATION full.pptx
SOC and SIEM.pptx
Application Security
Introduction to Cybersecurity
Sample network vulnerability analysis proposal
DDoS Attacks
Zero Trust Network Access
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...

What's hot (20)

PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Secure Session Management
PPTX
Security Operation Center Fundamental
PPTX
Denial of Service Attacks (DoS/DDoS)
PDF
Web Application Penetration Testing
PPTX
Penetration Testing
PDF
Microsoft Zero Trust
PPTX
Azure WAF
PDF
SC-900+2022.pdf
PPTX
Penetration testing reporting and methodology
PPT
SOC presentation- Building a Security Operations Center
PPTX
Web application security
PDF
Information Security Strategic Management
PPTX
Cloud Security
PPTX
Introduction to penetration testing
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Enterprise single sign on
PDF
Application Security - Your Success Depends on it
PPTX
SOAR and SIEM.pptx
PPTX
DDoS - Distributed Denial of Service
DTS Solution - Building a SOC (Security Operations Center)
Secure Session Management
Security Operation Center Fundamental
Denial of Service Attacks (DoS/DDoS)
Web Application Penetration Testing
Penetration Testing
Microsoft Zero Trust
Azure WAF
SC-900+2022.pdf
Penetration testing reporting and methodology
SOC presentation- Building a Security Operations Center
Web application security
Information Security Strategic Management
Cloud Security
Introduction to penetration testing
An introduction to SOC (Security Operation Center)
Enterprise single sign on
Application Security - Your Success Depends on it
SOAR and SIEM.pptx
DDoS - Distributed Denial of Service
Ad

Similar to DDoS 101: Attack Types and Mitigation (20)

PPTX
Cyber Security 101
PDF
What You Should Know Before The Next DDoS Attack
PPTX
Cyber security fundamentals (Cantonese)
PPTX
Stopping DDoS Attacks In South Africa
PPTX
Cyber security fundamentals
PPTX
Filling the Gaps in Your DDoS Mitigation Strategy
PDF
Stopping DDoS Attacks in North America
PDF
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
PDF
A10 issa d do s 5-2014
PDF
DDoS mitigation in the real world
PPTX
What’s New at Cloudflare: New Product Launches
PPTX
Scaling service provider business with DDoS-mitigation-as-a-service
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PPTX
BADCamp 2017 - Anatomy of DDoS
PPTX
Recent DDoS attack trends, and how you should respond
PPT
nanog
PDF
Virus Bulletin 2012
PDF
KHNOG 3: DDoS Attack Prevention
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PDF
DDos, Peering, Automation and more
Cyber Security 101
What You Should Know Before The Next DDoS Attack
Cyber security fundamentals (Cantonese)
Stopping DDoS Attacks In South Africa
Cyber security fundamentals
Filling the Gaps in Your DDoS Mitigation Strategy
Stopping DDoS Attacks in North America
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
A10 issa d do s 5-2014
DDoS mitigation in the real world
What’s New at Cloudflare: New Product Launches
Scaling service provider business with DDoS-mitigation-as-a-service
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
BADCamp 2017 - Anatomy of DDoS
Recent DDoS attack trends, and how you should respond
nanog
Virus Bulletin 2012
KHNOG 3: DDoS Attack Prevention
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
DDos, Peering, Automation and more
Ad

More from Cloudflare (20)

PDF
Succeeding with Secure Access Service Edge (SASE)
PPTX
Close your security gaps and get 100% of your traffic protected with Cloudflare
PPTX
Why you should replace your d do s hardware appliance
PPTX
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
PPTX
Why Zero Trust Architecture Will Become the New Normal in 2021
PPTX
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
PPTX
Zero trust for everybody: 3 ways to get there fast
PPTX
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
PPTX
Network Transformation: What it is, and how it’s helping companies stay secur...
PPTX
Application layer attack trends through the lens of Cloudflare data
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PPTX
Strengthening security posture for modern-age SaaS providers
PPTX
It’s 9AM... Do you know what’s happening on your network?
PPTX
Cyber security fundamentals (simplified chinese)
PPTX
Bring speed and security to the intranet with cloudflare for teams
PPTX
Accelerate your digital transformation
PPTX
Cloudflareのソリューションを使用して悪意のあるBot対策
PPTX
Webinar - Cyber Security basics in Japanese
PDF
How to Plan for Performance and Scale for Multiplayer Games
PPTX
Fight bad bot on the internet
Succeeding with Secure Access Service Edge (SASE)
Close your security gaps and get 100% of your traffic protected with Cloudflare
Why you should replace your d do s hardware appliance
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Why Zero Trust Architecture Will Become the New Normal in 2021
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Zero trust for everybody: 3 ways to get there fast
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Network Transformation: What it is, and how it’s helping companies stay secur...
Application layer attack trends through the lens of Cloudflare data
Cybersecurity 2020 threat landscape and its implications (AMER)
Strengthening security posture for modern-age SaaS providers
It’s 9AM... Do you know what’s happening on your network?
Cyber security fundamentals (simplified chinese)
Bring speed and security to the intranet with cloudflare for teams
Accelerate your digital transformation
Cloudflareのソリューションを使用して悪意のあるBot対策
Webinar - Cyber Security basics in Japanese
How to Plan for Performance and Scale for Multiplayer Games
Fight bad bot on the internet

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
SOPHOS-XG Firewall Administrator PPT.pptx
cloud_computing_Infrastucture_as_cloud_p
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Per capita expenditure prediction using model stacking based on satellite ima...
Tartificialntelligence_presentation.pptx
OMC Textile Division Presentation 2021.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25-Week II
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

DDoS 101: Attack Types and Mitigation

  • 1. DDoS 101: Attack types and mitigations
  • 2. • Launched: 2010 • Offices: 8 (San Francisco, Austin, London, Champaign, IL, Boston, Singapore, Washington, D.C., New York) • Employees: Approximately 500 • Data centres: 120 in 58 countries • Domains: 7 million+; 15,000+ new domains sign up for Cloudflare daily • Percent of Internet (HTTP/S) requests flowing through our network each month: 10 percent • DNS queries: We consistently do around 1.2 million DNS queries per second. That's around 103.68 billion queries per day, and 3.11 trillion queries a month. About us
  • 3. Contacts David Fenton Regional Sales Manager Australia / New Zealand Mobile: +61 (0) 413 438 412 Email: dfenton@cloudflare.com Manu Sharma Account Manager Australia / New Zealand Mobile: + 61 (0) 422 953 979 Email: manu@cloudflare.com Naveen Singh Solutions Engineer Australia / New Zealand Mobile: +61 (0) 416 428 925 Email: naveen@cloudflare.com
  • 4. Live Data Center In Progress/Planned 95% of internet users will live in a country with a Cloudflare data center 15 Tbps Capacity and 120 Data Centre Global Footprint ANZ Local PoPs: • Sydney • Brisbane • Melbourne • Perth • Auckland
  • 5. DDoS Attacks are evolving in size and complexity
  • 7. DDoS attacks per day against Cloudflare customers Graph courtesy of John Graham-Cumming
  • 9. Volumetric DNS Flood Bots DNS Server DNS Server Server Amplification (Layer 3 & 4) HTTP Flood (Layer 7) 1 2 Bots 3 Bots Degrades availability and performance of applications, websites, and APIs HTTP Application Application/Login Types of DDoS Attack Traffic
  • 10. How to perform a DDoS attack Get a cool costume
  • 11. How to stop a DDoS attack Get an even cooler costume
  • 12. Mitigations • Volumetric DNS Flood DNS Flood – bad DNS requests are dropped by our large and highly distributed DNS. Cloudflare's anycast DNS will absorb any DNS DDoS attack and keep your DNS up and running all time. • Amplification (Layer 3 & 4) Layer 3,4 and 7 are mitigated through the PoPs Layer 3 is mitigated by IP Reputation database and IP Firewall, for Layer 4 traffic is dropped automatically at the edge node. • HTTP Flood (Layer 7) Layer 7 additional mitigation is provided by the WAF and Rate Limiting. Cloudflare Caching of static assets help offload attack traffic off your origin as well.
  • 13. Network Architectures (HTTP Traffic) Unicast • Geo-routing done using DNS • Allows for traffic control but can be bypassed • Handover/failover needs DNS cache to expire From seconds to hours Anycast • Geo-routing done using shortest path to a same IP (generally to the geographically closest PoP / the network operators decide) • Immediate failover • Automatic DDOS attack repartition over all our network
  • 14. Attack Mitigation • Data processing services analyse attack patterns • Finding correlations intelligently • Bad bot detection • HTTP headers/IP Data • Services create rules • Rules deployed to the Cloudflare Edge network • Changes measured
  • 16. ● It’s cheaper than ever to run a DDoS Attack ○ Using Botnets with fast household internet ○ Using breached IoT devices (i.e. security cameras) ● Application (Layer 7) attacks are efficient ○ It costs more resources for a web app to load a page than to make a request ● Presentation (Layer 6) attacks can complement ○ Using slow crypto operations to increase damage The Long Tail of DDoS Attacks
  • 17. David Fenton Regional Sales Manager Australia / New Zealand Mobile: +61 (0) 413 438 412 Email: dfenton@cloudflare.com Manu Sharma Account Manager Australia / New Zealand Mobile: + 61 (0) 422 953 979 Email: manu@cloudflare.com Naveen Singh Solutions Engineer Australia / New Zealand Mobile: +61 (0) 416 428 925 Email: naveen@cloudflare.com

Editor's Notes

  • #5: Data request from Karl: “60% of visitors on the Cloudflare Network are 10-20ms away from our datacenter”
  • #6: DDoS attacks are evolving in size and complexity. 2016 saw 3 attacks over 1 Tbps, one of these was launched at Cloudflare and we successfully protected our clients. 10 days later a similarly sized attack, launched through the mirai botnet brought down a good part of the internet in North America
  • #9: We focus on 4 main areas: reliability, performance, security and actionable insights: Built on our global Anycast network, We are the largest and fastest provider of DNS in the world End to End fastest provider of security and performance - from highly performant DNS to SSL to WAF. We give insights into the traffic to your sites and applications, and with that data help you fine tune performance and security To back it up we provide a 100% uptime SLA
  • #10: Talk Track: This slide gives examples of the types of DDoS attack. We could dive deeper with the rest of your team and our security team, as well. The important take-away is that these attacks are layered. In other words, a DDoS can attack different parts of your infrastructure. Volumetric DNS Flood: volumetric DNS queries against your DNS servers to make the DNS server unavailable Amplification: using a DNS to amplify requests and overload yours server over UDP HTTP Flood: volumetric HTTP attack to bring down the application All of those attacks impacts availability and performance of of websites, applications and API’s. Questions: This is often a good, in-depth slide to share with broader audience, for example if you have a security or infrastructure team. Would you be interested in that? Which have you experienced in the past, if any? How did you respond to them if you did?