SlideShare a Scribd company logo
Unexpected Impacts of DDoS Attacks and
How to Stop Them
How one customer protects the world against hackers and saves money
using Cloudflare’s Rate Limiting
Housekeeping
● Stay to the end to get presentation slides and recording
● Ask questions in the “Questions” chat box in ReadyTalk
● We’ll triage all questions during at the end of the
presentation
● All attendees are muted
Today’s Agenda
● Stories from Customers: Unexpected Impacts of
Denial of Service (5 min)
● Expert on breached passwords on how he uses
Cloudflare (20 min)
● Q&A session (10 Min)
Presenters
Troy Hunt
Founder at
HaveIBeenPwned.com
troyhunt@hotmail.com
Tim Fong
Product Manager
at Cloudflare
Fongster@Cloudflare.com
The Impact of DDoS Attacks
Attacks hit closer to home
Had over 6,000 companies interested in
Early Access to Rate Limiting
Personally spoke to 50+ customers of all
sizes and all types of industries
Biggest take away: an attack doesn’t need
to make headlines to hurt
REGULATORY
FINES
LOWER GOOGLE
PAGERANK
DEGRADED
BRAND
PERCEPTION
CUSTOMER
ACCIDENTAL
DENIAL OF
SERVICE
FEWER PIZZAS
Introduction to Troy Hunt
Microsoft Regional Director and MVP
Founder of HaveIBeenPwnd.com
Troy Hunt
Founder at
HaveIBeenPwned.com
troyhunt@hotmail.com
Unexpected Impacts of DDoS Attacks
and How to Stop Them
Troy Hunt
@troyhunt
Unexpected Impacts of DDoS Attacks and How to Stop Them
GET https://haveibeenpwned.com/api/v2/breachedaccount/{account}
{
"Name":"Adobe",
"Title":"Adobe",
"Domain":"adobe.com",
"BreachDate":"2013-10-04",
"AddedDate":"2013-12-04T00:00Z",
"PwnCount":152445165,
"Description":"In October 2013, 153 million Adobe
accounts...",
"DataClasses":["Email addresses","Password
hints","Passwords..."],
"IsVerified":True,
"IsSensitive":False,
"IsRetired":False,
"IsSpamList":False
}
Unexpected Impacts of DDoS Attacks and How to Stop Them
HTTP 429 – Too Many Requests
Unexpected Impacts of DDoS Attacks and How to Stop Them
Unexpected Impacts of DDoS Attacks and How to Stop Them
Unexpected Impacts of DDoS Attacks and How to Stop Them
Unexpected Impacts of DDoS Attacks and How to Stop Them
Controlling Malicious Traffic
Layer defenses to create
greater resiliency to
malicious traffic
Cache
Caching of static assets is
the easiest possible
solution – serve as much
as possible direct from
Cloudflare
Unexpected Impacts of DDoS Attacks and How to Stop Them
Controlling Malicious Traffic
Layer defenses to create
greater resiliency to
malicious traffic
Cache Firewall
Caching of static assets is
the easiest possible
solution – serve as much
as possible direct from
Cloudflare
Add firewall rules to block
or challenge specific
clients that exhibit
malicious behavior
If
traffic is
malicious
Call Cloudflare API
Add JavaScript
challenge for IP
to firewall
Unexpected Impacts of DDoS Attacks and How to Stop Them
Read 142,370 lines with 1,314 unique IP addresses
First request: 09:30:00
Last request: 09:59:59
IP 35.165.142.216 found 89,031 times over 1,794 seconds (49/s)
GET /api/v2/breaches/ : 88,966 requests
Controlling Malicious Traffic
Layer defenses to create
greater resiliency to
malicious traffic
Cache Firewall
Rate
Limit
Caching of static assets is
the easiest possible
solution – serve as much
as possible direct from
Cloudflare
Add firewall rules to block
or challenge specific
clients that exhibit
malicious behavior
Be more proactive with
rate limiting and stop
abusive traffic before it has
an adverse impact
Unexpected Impacts of DDoS Attacks and How to Stop Them
Unexpected Impacts of DDoS Attacks and How to Stop Them
Unexpected Impacts of DDoS Attacks and How to Stop Them
In Summary
1. Get traffic off the origin
1. Cache it (and get the perf gain too!)
2. Block it with firewall rules
2. Rate limiting takes this further
1. Allows the edge to make decisions on traffic
2. Protects discrete resources at higher risk…
3. …plus provides a safety blanket for the whole site
Less traffic flowing to the
origin means less
overhead on the service
Less overhead on the
service means more ability
to scale…
…and less bottom line
impact as fewer resources
are required
Cloudflare rate limiting
allows decisions about
traffic to be made
upstream of the website
Thank you!
Troy Hunt
@troyhunt
Rate Limiting Overview
Rate Limiting functionalities can enabled in the “Firewall” application of
your Cloudflare dashboard.
Additional Rate Limiting Resources
Cloudflare knowledge base articles on Rate Limiting:
http://cfl.re/rate-limiting-kb
Rate Limiting hands-on demos:
https://www.cloudflare.com/rate-limiting/
Activate Rate Limiting:
https://www.cloudflare.com/a/firewall/
Live Q&A Session
Cloudflare Rate Limiting

More Related Content

PDF
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
PDF
Hardening Microservices Security: Building a Layered Defense Strategy
PDF
Overview of SSL: choose the option that's right for you
PPTX
Managing Traffic Spikes This Holiday Season
PDF
CloudFlare - The Heartbleed Bug - Webinar
PDF
SSL for SaaS Providers
PPTX
Latest Trends in Web Application Security
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
Hardening Microservices Security: Building a Layered Defense Strategy
Overview of SSL: choose the option that's right for you
Managing Traffic Spikes This Holiday Season
CloudFlare - The Heartbleed Bug - Webinar
SSL for SaaS Providers
Latest Trends in Web Application Security
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

What's hot (20)

PPTX
Botconf ppt
PPTX
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
PDF
Why Many Websites are still Insecure (and How to Fix Them)
PDF
What You Should Know Before The Next DDoS Attack
PPTX
Application layer attack trends through the lens of Cloudflare data
PDF
Securing Internal Applications with Cloudflare Access
PPTX
What’s New at Cloudflare: New Product Launches
PPTX
DDoS 101: Attack Types and Mitigation
PPTX
Recent DDoS attack trends, and how you should respond
PPT
Turning client-side-to-server-side-ruxcon-2011-laurent
PDF
New Products Overview: Use Cases and Demos
PDF
F5 TLS & SSL Practices
PPTX
MRA AMA Part 6: Service Mesh Models
PDF
MRA AMA: Ingenious: The Journey to Service Mesh using a Microservices Demo App
PPTX
Secure Your Apps with NGINX Plus and the ModSecurity WAF
PDF
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
PDF
AWS - Como llevar un banco a la nube?
PDF
Network Security in 2016
PPTX
NGINX, Istio, and the Move to Microservices and Service Mesh
Botconf ppt
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Why Many Websites are still Insecure (and How to Fix Them)
What You Should Know Before The Next DDoS Attack
Application layer attack trends through the lens of Cloudflare data
Securing Internal Applications with Cloudflare Access
What’s New at Cloudflare: New Product Launches
DDoS 101: Attack Types and Mitigation
Recent DDoS attack trends, and how you should respond
Turning client-side-to-server-side-ruxcon-2011-laurent
New Products Overview: Use Cases and Demos
F5 TLS & SSL Practices
MRA AMA Part 6: Service Mesh Models
MRA AMA: Ingenious: The Journey to Service Mesh using a Microservices Demo App
Secure Your Apps with NGINX Plus and the ModSecurity WAF
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
AWS - Como llevar un banco a la nube?
Network Security in 2016
NGINX, Istio, and the Move to Microservices and Service Mesh
Ad

Similar to Unexpected Impacts of DDoS Attacks and How to Stop Them (20)

PPTX
Cyber security fundamentals (Cantonese)
PPTX
Cyber Security 101
PPTX
Cyber security fundamentals
PDF
How to Build a Practical and Cost-Effective Security Strategy
PDF
Introduction of Cloudflare Solution for Mobile Payment
PPTX
Multi-Layer DDoS Mitigation Strategies
PDF
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
PPTX
Close your security gaps and get 100% of your traffic protected with Cloudflare
PPT
nanog
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PPTX
Filling the Gaps in Your DDoS Mitigation Strategy
PDF
DDoS mitigation in the real world
PDF
Make DDoS expensive for the threat actors
PDF
Multi-Layer DDoS Mitigation Strategies
PDF
New Products Overview: Use Cases and Demos
PDF
A10 issa d do s 5-2014
PDF
KHNOG 3: DDoS Attack Prevention
PDF
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
PDF
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
PDF
9 Steps For Fighting Against a DDos Attack in real-time
Cyber security fundamentals (Cantonese)
Cyber Security 101
Cyber security fundamentals
How to Build a Practical and Cost-Effective Security Strategy
Introduction of Cloudflare Solution for Mobile Payment
Multi-Layer DDoS Mitigation Strategies
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Close your security gaps and get 100% of your traffic protected with Cloudflare
nanog
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Filling the Gaps in Your DDoS Mitigation Strategy
DDoS mitigation in the real world
Make DDoS expensive for the threat actors
Multi-Layer DDoS Mitigation Strategies
New Products Overview: Use Cases and Demos
A10 issa d do s 5-2014
KHNOG 3: DDoS Attack Prevention
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
9 Steps For Fighting Against a DDos Attack in real-time
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Unexpected Impacts of DDoS Attacks and How to Stop Them