
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 19:35:00 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Hyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/</link>
            <pubDate>Tue, 15 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the second quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. One notable target was an independent Eastern European news outlet protected by Cloudflare, which reported being attacked following its coverage of a local Pride parade during LGBTQ Pride Month.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks continue to break records. During 2025 Q2, Cloudflare automatically blocked the largest ever reported DDoS attacks, peaking at <a href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/"><u>7.3 terabits per second (Tbps)</u></a> and 4.8 billion packets per second (Bpps).</p></li><li><p>Overall, in 2025 Q2, hyper-volumetric DDoS attacks skyrocketed. Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, an average of 71 per day. </p></li><li><p>Although the overall number of DDoS attacks dropped compared to the previous quarter — which saw an unprecedented surge driven by a large-scale campaign targeting Cloudflare’s network and critical Internet infrastructure protected by Cloudflare — the number of attacks in 2025 Q2 were still 44% higher than in 2024 Q2. <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">Critical infrastructure</a> continues to face sustained pressure, with the Telecommunications, Service Providers, and Carriers sector jumping again to the top as the most targeted industry.</p></li></ul><p>All the attacks in this report were automatically detected and blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4D7sY9wWyZAarqgEOuudjL/4a1a424dd002a85cd65ebd2678deeb9b/image11.png" />
          </figure><p>To learn more about DDoS attacks and other types of cyber threats, refer to our <a href="https://www.cloudflare.com/learning/"><u>Learning Center</u></a>. Visit <a href="https://radar.cloudflare.com/reports?q=DDoS"><u>Cloudflare Radar</u></a> to view an interactive version of this report where you can drill down further. Radar also offers a <a href="https://developers.cloudflare.com/radar/"><u>free API</u></a> for those interested in investigating Internet trends. You can also learn more about the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><u>methodologies</u></a> used in preparing these reports.</p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare mitigated 7.3 million DDoS attacks — down sharply from 20.5 million in Q1, when an 18-day campaign against Cloudflare’s own and other critical infrastructure protected by Cloudflare, drove 13.5 million of those attacks. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66gdansdUZd0UgyFW8bQQu/8e1cde9766c737d0f33354cab8425a9f/image13.png" />
          </figure><p><sup>DDoS attacks by quarter</sup></p><p>We’ve just crossed halfway through 2025, and so far Cloudflare has already blocked 27.8 million DDoS attacks, equivalent to 130% of all the DDoS attacks we blocked in the full calendar year 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zwR5A7JjeS1yH37j0VRlM/2bbc86d197f6bb53de5f86c2fa975b0a/image7.png" />
          </figure><p><sup>DDoS attacks by year</sup></p><p>Breaking it down further, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3/Layer 4 (L3/4) DDoS attacks</u></a> plunged 81% quarter-over-quarter to 3.2 million, while HTTP DDoS attacks rose 9% to 4.1 million. Year-over-year changes remain elevated. Overall attacks were 44% higher than 2024 Q2, with HTTP DDoS attacks seeing the largest increase of 129% YoY.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dxz1L4L4Y8ihvTxdKZRZf/7294397a7957d4f186ac80b43eabb5a0/image8.png" />
          </figure><p><sup>DDoS attacks by month</sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, averaging 71 hyper-volumetric attacks per day. Hyper-volumetric attacks include L3/4 DDoS attacks exceeding 1 Bpps or 1 Tbps, and HTTP DDoS attacks exceeding 1 million requests per second (Mrps).</p><p>The number of hyper-volumetric DDoS attacks exceeding 100 million packets per second (pps) surged by 592% compared to the previous quarter, and the number exceeding 1 billion pps and 1 terabits per second (Tbps) doubled compared to the previous quarter. The number of HTTP DDoS attacks exceeding 1 million rps (rps) remained the same at around 20 million in total, an average of almost 220,000 attacks every day.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2yDy1OKIjVSssQrxTuHoLx/452dcdd5d2aacc936cb4a6b4ec7f9317/image4.png" />
          </figure><p><sup>Hyper-volumetric DDoS attacks in 2025 Q2</sup></p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When asked who was behind the DDoS attacks they experienced in 2025 Q2, the majority (71%) of respondents said they didn’t know who attacked them. Of the remaining 29% of respondents that claimed to have identified the threat actor, 63% pointed to competitors, a pattern especially common in the Gaming, Gambling and Crypto industries. Another 21% attributed the attack to state-level or state-sponsored actors, while 5% each said they’d inadvertently attacked themselves (self-DDoS), were targeted by extortionists, or suffered an assault from disgruntled customers/users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1rGHPX3t7S9KpTde5udYKi/ba0e11669b7d38520c221f190f500e14/image5.png" />
          </figure><p><sup>Top threat actors reported in 2025 Q2</sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>The percentage of attacked Cloudflare customers that reported being targeted by a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attack</u></a> or that were threatened increased by 68% compared to the previous quarter, and by 6% compared to the same quarter in 2024. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78PZiUidGYsY2qS9KY7eFl/0e132812ede418be620a48c882ba37b2/image6.png" />
          </figure><p><sup>Ransom DDoS attacks by quarter 2025 Q2</sup></p><p>Diving deeper, Ransom DDoS attacks soared in June 2025. Around a third of respondents reported being threatened or subjected to Ransom DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Urv9538LpsEoZFNNfha7o/871c9d30431df06b2c0962729191b482/image9.png" />
          </figure><p><sup>Ransom DDoS attacks by month 2025 Q2</sup></p>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked locations in 2025 Q2 shifted significantly. China climbed two spots to reclaim first place, Brazil jumped four spots to second place, Germany slipped two spaces to third place, India edged up one to fourth, and South Korea rose four to fifth. Turkey fell four places to sixth, Hong Kong dropped three to seventh, and Vietnam vaulted an astonishing fifteen spots into eighth. Meanwhile, Russia rocketed forty places to ninth, and Azerbaijan surged thirty-one to round out the top ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HNdD7VgymVfuJBZtV5bII/ed6eed8f676ba0a0d7cec9a595521903/image19.png" />
          </figure><p><sup>The locations most targeted by DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these attacked locations are determined by the billing country of the Cloudflare customer whose services were targeted — not that those nations themselves are under attack. In other words, a high rank simply means more of our registered customers in that billing jurisdiction were targeted by DDoS traffic, rather than implying direct geopolitical targeting.</p>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked industries in 2025 Q2 also saw notable movement. Telecommunications, Service Providers and Carriers climbed one spot to claim first place, while the Internet sector jumped two spots to second place. Information Technology &amp; Services held its placement as third most attacked, and Gaming rose one spot to fourth place. Gambling &amp; Casinos slipped four spots to fifth place, and the Banking &amp; Financial Services industry remained in sixth place. Retail inched up one spot to seventh place, and Agriculture made a dramatic 38-place leap into eighth. Computer Software climbed two spots to ninth place, and Government hopped two places to round out the top ten most attacked industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YTWU2MwLdGg5SumDgAogC/ec6e812c894cbe14490f74b90fa4da94/image20.png" />
          </figure><p><sup>The top attacked industries of DDoS attacks for 2025 Q2</sup></p>
    <div>
      <h2>Top sources of DDoS attacks</h2>
      <a href="#top-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>The ranking of the top 10 largest sources of DDoS attacks in 2025 Q2 also saw several shifts compared to the previous quarter. Indonesia climbed one spot to claim the first place, Singapore jumped two places to second place, Hong Kong dropped two places to third, Argentina slipped one space as fourth and Ukraine held on as the fifth-largest source of DDoS attacks. Russia surged six spots as the sixth-largest source, followed by Ecuador who jumped seven places. Vietnam inched up one place as the eighth-largest source. The Netherlands moved up four places as the ninth-largest source, and Thailand fell three places as the tenth-largest source of DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6X8C3xPqQ08FYLCe7BE0Sm/997ae266e8ddfa19c8d320a2448cb793/image10.png" />
          </figure><p><sup>The top sources of DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these “source” rankings reflect where botnet nodes, proxy or VPN endpoints reside — not the actual location of threat actors. For L3/4 DDoS attacks, where <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>IP spoofing</u></a> is rampant, we geolocate each packet to the Cloudflare data center that first ingested and blocked it, drawing on our presence in over 330 cities for truly granular accuracy.</p>
    <div>
      <h2>Top source networks of DDoS attacks</h2>
      <a href="#top-source-networks-of-ddos-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>For the first time in about a year, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> network dropped from the first place as the largest source of HTTP DDoS attack to the third place. In its place, German-based <a href="https://radar.cloudflare.com/as200373"><u>Drei-K-Tech-GmbH (AS200373)</u></a>, also known as 3xK Tech, jumped 6 places as the number one largest source of HTTP DDoS attacks. The US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> hopped one spot to the second place. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hfTFpswSIsQwpZVoKlvUs/0897717483b4dcefa02fbce1fa8b6b48/image22.png" />
          </figure><p><sup>The top 10 ASN sources of HTTP DDoS attacks</sup></p><p>As can be seen in the chart above, 9 out of 10 ASNs listed offer <a href="https://www.cloudflare.com/learning/cloud/what-is-a-virtual-machine/"><u>virtual machines (VMs)</u></a>, hosting, or cloud services which indicate the common use of VM-based botnets. These botnets are <a href="https://blog.cloudflare.com/ddos-threat-report-2023-q2/#the-rise-of-the-virtual-machine-botnets"><u>estimated to be 5,000x stronger</u></a> than IoT-based botnets. Only <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> is primarily an ISPs/telecom carriers without significant public VM/cloud offerings.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17jMjLVEx0puvK14GOozDo/7a12fbb2816ace763098d0ef86203740/image2.png" />
          </figure><p><sup>IoT-based botnets versus VM-based botnets</sup></p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed, and we’ve already seen great collaboration across the community to take down botnet nodes. This is possible thanks to the threat feed which provides these service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p><p>With a simple API call, service providers can get a list of offending IPs from within their network. An example response is provided below.</p>
            <pre><code>{
  "result": [
    {
      "cidr": "127.0.0.1/32",
      "date": "2024-05-05T00:00:00Z",
      "offense_count": 10000
    },
    // ... other entries ...
  ],
  "success": true,
  "errors": [],
  "messages": []
}</code></pre>
            <p><sup>Example response from the free ISP DDoS Botnet Threat Feed API</sup></p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h3>Defending against DDoS Botnets</h3>
      <a href="#defending-against-ddos-botnets">
        
      </a>
    </div>
    <p>In Q2 2025, the majority (71%) of HTTP DDoS attacks were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/"><u>botnets</u></a>. Rapid detection and blocking of these attacks was possible as a result of operating a massive network and seeing many different types of attacks and botnets. By leveraging real-time threat intelligence, our systems are able to incriminate DDoS botnets very fast, contributing to a more effective mitigation. Even if a DDoS botnet has been incriminated while targeting only one website or IP address, our entire network and customer base is immediately protected against it. This real-time threat intelligence system adapts with botnets as they morph and change nodes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PtgDqHMGY52nVPAoBy6o2/f51af7ded6817ff568ad22701a17a47e/image1.png" />
          </figure><p><sup>The top HTTP DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h2>L3/4 attack vectors</h2>
      <a href="#l3-4-attack-vectors">
        
      </a>
    </div>
    <p>In Q2 2025, <a href="#dns-flood-attack">DNS flood</a> attacks were the top L3/4 attack vector accounting for almost a third of all L3/4 DDoS attacks. <a href="#syn-flood-attack">SYN floods</a> was the second most common attack vector, dipping from 31% in Q1 to 27% in Q2. </p><p>In third place, <a href="#udp-ddos-attack">UDP floods</a> also grew meaningfully, rising from 9% in Q1 to 13% in Q2. RST floods, another form of TCP-based DDoS attacks, accounting for 5% of all L3/4 attacks, was the fourth most common vector. Rounding out the top five, <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP floods</u></a> edged into fifth place at 3% despite a decline from 4.3% last quarter, but enough to push the previously prevalent <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai attacks</u></a> (which fell from 18% in Q1 to just 2% in Q2) out of the top five altogether.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QzJzqm583fTd4r5fGiz3q/af7aad3201ccee3004c18d9a8c326b76/image15.png" />
          </figure><p><sup>The top L3/4 DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top 3 L3/4 DDoS attack vectors</h3>
      <a href="#breakdown-of-the-top-3-l3-4-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Below are details about the top 3 most common L3/4 DDoS attacks. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>DNS Flood Attack</h4>
      <a href="#dns-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> A DNS flood aims to overwhelm a DNS server with a high volume of DNS queries—either valid, random, or malformed—to exhaust CPU, memory, or bandwidth. Unlike amplification attacks, this is a direct flood aimed at degrading performance or causing outages, often over UDP port 53, but sometimes over TCP as well (especially for DNS-over-TCP or <a href="https://www.cloudflare.com/learning/dns/dnssec/how-dnssec-works/"><u>DNSSEC</u></a>-enabled zones). Learn more about <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#dns-flood-attack">DNS attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/dns/"><u>Cloudflare DNS</u></a> as primary or secondary, <a href="https://www.cloudflare.com/dns/dns-firewall/"><u>Cloudflare DNS Firewall</u></a> and/or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and mitigate query floods before they reach your origin. Cloudflare’s global network handles tens of millions of DNS queries per second with built-in DDoS filtering and query caching, blocking malformed or excessive traffic while answering legitimate requests.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid blocking all DNS traffic or disabling UDP port 53, which would break normal resolution. Rely on Cloudflare’s DNS-specific protection such as the <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/"><u>Advanced DNS Protection system</u></a>, and deploy DNSSEC-aware protection to handle TCP-based query floods safely.</p></li></ul>
    <div>
      <h4>SYN Flood Attack</h4>
      <a href="#syn-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> In a SYN flood, threat actors send a large volume of TCP SYN packets—often with spoofed IP addresses—to initiate connections that are never completed. This leaves the target system with half-open connections, consuming memory and connection tracking resources, potentially exhausting server limits and preventing real clients from connecting. Learn more about <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to intercept and mitigate TCP SYN floods at the edge. Cloudflare leverages SYN cookies, connection tracking, and behavioral analysis to distinguish real clients from spoofed or malicious sources, ensuring legitimate TCP connections are completed successfully. Using Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/cdn/"><u>CDN</u></a>/<a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> services or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> which are both reverse-proxy services for HTTP or TCP, respectively. Using a reverse-proxy basically eliminates the possible impact of TCP-based DDoS attacks.</p></li><li><p><b>How to avoid unintended impact:</b> Blocking all SYN traffic or applying aggressive timeouts can block real users. Instead, rely on <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/"><u>Cloudflare’s Advanced TCP protection system</u></a>, which uses SYN rate shaping, anomaly detection, and spoofed-packet filtering to mitigate attacks without affecting genuine client connections.</p></li></ul>
    <div>
      <h4>UDP DDoS attack</h4>
      <a href="#udp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Flood</p></li><li><p><b>How it works</b>: A high volume of UDP packets is sent to random or specific ports on the target IP address(es). It may attempt to saturate the Internet link or overwhelm its in-line appliances with more packets than it can handle in order to create disruption or an outage. Learn more about <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP attacks</a>.</p></li><li><p><b>How to defend against the attack</b>: Deploy cloud-based volumetric DDoS protection that can fingerprint attack traffic in real-time such as <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a>, apply smart rate-limiting on UDP traffic, and drop unwanted UDP traffic altogether with the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a>.</p></li><li><p><b>How to avoid unintended impact</b>: Aggressive filtering may disrupt legitimate UDP services such as VoIP, video conferencing, or online games. Apply thresholds carefully.</p></li></ul>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Among emerging L3/4 DDoS threats in 2025 Q2, <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#teeworlds-ddos-attack">Teeworlds flood</a> saw the biggest spike. These attacks jumped 385% QoQ, followed by the <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#ripv1-ddos-attack"><u>RIPv1 flood</u></a>, which surged 296%. <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#rdp-ddos-attack"><u>RDP floods</u></a> climbed by 173%, and <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#demonbot-ddos-attack"><u>Demon Bot floods</u></a> increased by 149%. Even the venerable <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#vxworks-flood-ddos-attack"><u>VxWorks flood</u></a> made a comeback, rising 71% quarter-over-quarter. These dramatic upticks highlight threat actors’ ongoing experimentation with lesser-known and legacy protocols to evade standard defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70OHdfj3auYqnHGCc2s1P0/1beaa1427cc5007fa069f028c0c1bb4c/image14.png" />
          </figure><p><sup>The top emerging threats for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top emerging threats</h3>
      <a href="#breakdown-of-the-top-emerging-threats">
        
      </a>
    </div>
    <p>Below are details about the emerging threats for 2025 Q2, mostly recycling of very old attack vectors. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>Teeworlds DDoS Attack</h4>
      <a href="#teeworlds-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/Teeworlds"><u>Teeworlds</u></a> is a fast-paced, open-source 2D multiplayer shooter game that uses a custom UDP-based protocol for real-time gameplay. Threat actors flood the target’s game server with spoofed or excessive UDP packets that mimic in-game actions or connection attempts. This can overwhelm server resources and cause lag or outages.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect the servers. Cloudflare automatically detects and mitigates these types of attacks using real-time fingerprinting, blocking attack traffic while allowing real players through. Magic Transit also provides a packet-level firewall capability, the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a> which can be used to craft custom protection.</p></li><li><p><b>How to avoid unintended impact:</b> When crafting custom rules, avoid blocking or aggressively rate-limiting UDP port 8303 directly as it can disrupt overall gameplay. Instead, rely on intelligent detection and mitigation services to avoid affecting legitimate users.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/608xA7d6AuPV38WCXWcfxj/1d00cec07300ecd15b99c9ca5d0bb07c/image17.png" />
          </figure><p><sup>Teeworlds Screenshot Jungle. Source: </sup><a href="https://commons.wikimedia.org/wiki/File:Teeworlds_Screenshot_Jungle_0.6.1.png"><sup><u>Wikipedia</u></sup></a></p>
    <div>
      <h4>RIPv1 DDoS attack</h4>
      <a href="#ripv1-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + (Low) Amplification</p></li><li><p><b>How it works</b>: Exploits the Routing Information protocol version 1 (RIPv1), an old unauthenticated distance-vector routing protocol that uses UDP/520. Threat actors send spoofed routing updates to flood or confuse networks.</p></li><li><p><b>How to prevent becoming a reflection / amplification element</b>: Disable RIPv1 on routers. Use RIPv2 with authentication where routing is needed.</p></li><li><p><b>How to defend against the attack</b>: Block inbound UDP/520 from untrusted networks. Monitor for unexpected routing updates.</p></li><li><p><b>How to avoid unintended impact</b>: RIPv1 is mostly obsolete; disabling it is generally safe. If legacy systems rely on it, validate routing behavior before changes.</p></li></ul>
    <div>
      <h4>RDP DDoS Attack</h4>
      <a href="#rdp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + Amplification</p></li><li><p><b>How it works</b>: The <a href="https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/"><u>Remote Desktop Protocol (RDP)</u></a> is used for remote access to Windows systems and typically runs over <a href="https://www.speedguide.net/port.php?port=3389"><u>TCP port 3389</u></a>. In some misconfigured or legacy setups, RDP can respond to unauthenticated connection attempts, making it possible to abuse for reflection or amplification. Threat actors send spoofed RDP initiation packets to exposed servers, causing them to reply to a victim, generating high volumes of unwanted traffic.</p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect your network infrastructure. Magic Transit provides L3/L4 DDoS protection, filtering out spoofed or malformed RDP traffic before it reaches your origin. For targeted application-layer abuse, <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a> or <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> can help secure remote desktop access behind authenticated tunnels.</p></li><li><p><b>How to avoid unintended impact</b>: Do not block TCP/3389 globally if RDP is actively used. Instead, restrict RDP access to known IPs or internal networks, or use <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/"><u>Cloudflare Tunnel</u></a> with <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> to remove public exposure altogether while maintaining secure access for legitimate users.</p></li></ul>
    <div>
      <h4>DemonBot DDoS Attack</h4>
      <a href="#demonbot-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Botnet-based Flood</p></li><li><p><b>How it works</b>: DemonBot is a malware strain that infects Linux-based systems—particularly unsecured IoT devices—via open ports or weak credentials. Once infected, devices become part of a botnet that can launch high-volume UDP, TCP, and application-layer floods. Attacks are typically command-and-control (C2) driven and can generate significant volumetric traffic, often targeting gaming, hosting, or enterprise services. To avoid infection, leverage antivirus software and domain filtering. </p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and filter large-scale network-layer floods before they reach your infrastructure. Cloudflare’s real-time traffic analysis and signature-based detection neutralize traffic originating from DemonBot-infected devices. For application-layer services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare DDoS protection</u></a> and <a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> can mitigate targeted <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a> and connection abuse.</p></li><li><p><b>How to avoid unintended impact</b>: Instead of broadly blocking traffic types or ports, rely on Cloudflare’s adaptive mitigation to distinguish between legitimate users and botnet traffic. Combine with IP reputation filtering, geo-blocking, and rate limiting to reduce false positives and maintain service availability.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41SKW3kjd0hp7wmySRb7OP/97a59d135cd7c3c975cda581acdec88c/image18.png" />
          </figure>
    <div>
      <h4>VxWorks Flood DDoS Attack</h4>
      <a href="#vxworks-flood-ddos-attack">
        
      </a>
    </div>
    <ul><li>
    <div>
      <h4><b>Type:</b> Flood (IoT-based)</h4>
      <a href="#type-flood-iot-based">
        
      </a>
    </div>
    </li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/VxWorks"><u>VxWorks</u></a> is a real-time operating system (<a href="https://en.wikipedia.org/wiki/Real-time_operating_system"><u>RTOS</u></a>) used in millions of embedded and IoT devices (e.g., routers, industrial controllers). Devices running outdated or misconfigured versions of VxWorks can be compromised and used to launch DDoS attacks. Once infected—often via public exploits or weak credentials—they send high volumes of UDP, TCP, or ICMP traffic to overwhelm targets, similar to traditional IoT botnets.</p></li><li><p><b>How to defend against the attack:</b> Deploy <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to block volumetric traffic at the network edge. Cloudflare uses real-time fingerprinting and  proprietary heuristics to identify traffic from compromised VxWorks devices and mitigate it in real-time. For application services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare’s DDoS mitigation</u></a><b> </b>and<b> </b><a href="https://www.cloudflare.com/zero-trust/products/gateway/"><b><u>Gateway services</u></b></a> provide additional protection against protocol-level abuse.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid over-blocking UDP or ICMP traffic, as it may disrupt legitimate diagnostics or real-time services. Instead, use Cloudflare’s intelligent filtering, rate limiting, and geo/IP reputation tools to safely mitigate attacks while avoiding impact to legitimate traffic.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6b6CqQNrSd3QFE2yTaDaFU/3ecc930ecf487067dac0dc2f4d50d390/image21.png" />
          </figure><p><sup>Cloudflare’s real-time fingerprint generation flow</sup></p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Most DDoS attacks are small and short. In 2025 Q2, 94% of L3/4 DDoS attacks didn’t exceed 500 Mbps. Similarly, around 85% of L3/4 DDoS attacks didn’t exceed 50,000 pps. The majority of HTTP DDoS attacks are also small, 65% stay below 50K rps. “Small”, though, is a relative term.</p><p>An average modern server typically refers to a general-purpose physical or virtual machine with around 4–8 CPU cores (e.g. Intel Xeon Silver), 16–64 GB RAM, and a 1 Gbps NIC, running a Linux OS like Ubuntu or CentOS with NGINX or similar software. This setup can handle ~100,000–500,000 pps, up to ~940 Mbps throughput, and around 10,000–100,000 rps for static content or 500–1,000 rps for database-backed dynamic applications, depending on tuning and workload.</p><p>Assuming the server is unprotected by a cloud DDoS protection service, if it’s targeted by “small” DDoS attacks during peak time traffic rates, it is very likely that the server won’t be able to handle it. Even “small” DDoS attacks can cause significant impact to unprotected servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bAmx7jQRjWgJHit83V57j/d8ec58ee7b1b207e36cb8e5b20984d9c/image3.png" />
          </figure><p><sup>DDoS attacks size and duration in 2025 Q2</sup></p><p>While the majority of DDoS attacks are small, hyper-volumetric DDoS attacks are increasing in size and frequency. 6 out of every 100 HTTP DDoS attacks exceed 1M rps, and 5 out of every 10,000 L3/4 DDoS attacks exceed 1 Tbps — a 1,150% QoQ increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ukMkHvtJOpfQwfPWn6Co9/62e161fa9f091ce2d99d56e57a7cd354/image16.png" />
          </figure><p><sup>The largest attack in the world: 7.3 Tbps</sup></p><p>Most DDoS attacks are short in duration, even the largest and most intense ones. Threat actors often rely on brief bursts of concentrated traffic—sometimes lasting as little as 45 seconds as seen with the monumental 7.3 Tbps DDoS attack — in an attempt to avoid detection, overwhelm targets and cause maximum disruption before defenses can fully activate. This tactic of short, high-intensity bursts makes detection and mitigation more challenging and underscores the need for always-on, real-time protection. Thankfully, Cloudflare’s autonomous DDoS defenses kick in immediately.</p>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, we’re committed to helping build a better Internet. A part of that mission is offering free, unmetered DDoS protection regardless of size, duration and quantity. We don’t just defend against DDoS attacks. The best defense is a good offense, and using our free ISP Botnet Threat Feed, we contribute to botnet takedowns. </p><p>While many still adopt protection reactively or rely on outdated solutions, our data shows proactive, always-on security is far more effective. Powered by a global network with 388 Tbps capacity across 330+ cities, we provide automated, in-line, battle-proven defense against all types of DDoS attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <guid isPermaLink="false">4aLih3oZO76muFrc9vJufj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</link>
            <pubDate>Tue, 21 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ 2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020.</p><p>Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.</p>
    <div>
      <h2>Cloudflare’s unique vantage point</h2>
      <a href="#cloudflares-unique-vantage-point">
        
      </a>
    </div>
    <p>When we published our <a href="https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q1-2020/"><u>first report</u></a>, Cloudflare’s global network capacity was 35 Terabits per second (Tbps). Since then, our network’s capacity has grown by 817% to 321 Tbps. We also significantly expanded our global presence by 65% from 200 cities in the beginning of 2020 to 330 cities by the end of 2024.</p><p>Using this massive network, we now serve and protect nearly <a href="https://w3techs.com/technologies/overview/proxy"><u>20% of all websites</u></a> and close to 18,000 unique Cloudflare customer <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/"><u>IP networks</u></a>. This extensive infrastructure and customer base uniquely positions us to provide key insights and trends that benefit the wider Internet community.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In 2024, Cloudflare’s autonomous DDoS defense systems blocked around 21.3 million DDoS attacks, representing a 53% increase compared to 2023. On average, in 2024, Cloudflare blocked 4,870 DDoS attacks every hour.</p></li><li><p>In the fourth quarter, over 420 of those attacks were hyper-volumetric, exceeding rates of 1 billion packets per second (pps) and 1 Tbps. Moreover, the amount of attacks exceeding 1 Tbps grew by a staggering 1,885% quarter-over-quarter.</p></li><li><p>During the week of Halloween 2024, Cloudflare’s DDoS defense systems successfully and autonomously detected and blocked a 5.6 Terabit per second (Tbps) DDoS attack — the largest attack ever reported.</p></li></ul><p><i>To learn more about DDoS attacks and other types of cyber threats, visit our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>, access </i><a href="https://blog.cloudflare.com/tag/ddos-reports"><i><u>previous DDoS threat reports</u></i></a><i> on the Cloudflare blog, or visit our interactive hub, </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i>. There's also a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating these and other Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>In 2024 Q4 alone, Cloudflare mitigated 6.9 million DDoS attacks. This represents a 16% increase quarter-over-quarter (QoQ) and 83% year-over-year (YoY).</p><p>Of the 2024 Q4 DDoS attacks, 49% (3.4 million) were <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3</u></a>/<a href="https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/"><u>Layer 4</u></a> DDoS attacks and 51% (3.5 million) were HTTP DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33qc2yEBIE4Tmq6ke3dOIY/398216db2fb03e6093f55dac35394568/image13.png" />
          </figure><p><sup><i>Distribution of 6.9 million DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP DDoS attacks</h2>
      <a href="#http-ddos-attacks">
        
      </a>
    </div>
    <p>The majority of the HTTP DDoS attacks (73%) were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a>. Rapid detection and blocking of these attacks were made possible as a result of operating a massive network and seeing many types of attacks and botnets. In turn, this allows our security engineers and researchers to craft heuristics to increase mitigation efficacy against these attacks.</p><p>An additional 11% were HTTP DDoS attacks that were caught pretending to be a legitimate browser. Another 10% were attacks which contained suspicious or unusual HTTP attributes. The remaining 8% “Other” were generic <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a>, volumetric cache busting attacks, and volumetric attacks targeting login endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27nsCB9HReu48XtiJKufwg/cb8814d1cc390e4cd1ffea9316fd589e/image19.png" />
          </figure><p><sup><i>Top HTTP DDoS attack vectors: 2024 Q4</i></sup></p><p>These <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vectors</a>, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
    <div>
      <h3>Top user agents</h3>
      <a href="#top-user-agents">
        
      </a>
    </div>
    <p>As of this report’s publication, the current stable version of Chrome for Windows, Mac, iOS, and Android is 132, according to Google’s <a href="https://chromereleases.googleblog.com/"><u>release notes</u></a>. However, it seems that threat actors are still behind, as thirteen of the top user agents that appeared most frequently in DDoS attacks were Chrome versions ranging from 118 to 129.</p><p>The HITV_ST_PLATFORM user agent had the highest share of DDoS requests out of total requests (99.9%), making it the user agent that’s used almost exclusively in DDoS attacks. In other words, if you see traffic coming from the HITV_ST_PLATFORM user agent, there is a 0.1% chance that it is legitimate traffic.</p><p>Threat actors often avoid using uncommon user agents, favoring more common ones like Chrome to blend in with regular traffic. The presence of the HITV_ST_PLATFORM user agent, which is associated with smart TVs and set-top boxes, suggests that the devices involved in certain cyberattacks are compromised smart TVs or set-top boxes. This observation highlights the importance of securing all Internet-connected devices, including smart TVs and set-top boxes, to prevent them from being exploited in cyberattacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uUCjjPdGu63u7OmgRE6Yw/4b15c1e88cfe86ae0bc5824346908b24/image18.png" />
          </figure><p><sup><i>Top user agents abused in DDoS attacks: 2024 Q4</i></sup></p><p>The user agent <a href="https://github.com/benoitc/hackney"><u>hackney</u></a> came in second place, with 93% of requests containing this user agent being part of a DDoS attack. If you encounter traffic coming from the hackney user agent, there is a 7% chance that it is legitimate traffic. Hackney is an HTTP client library for Erlang, used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>Additional user agents that were used in DDoS attacks are <a href="https://www.utorrent.com/"><u>uTorrent</u></a>, which is associated with a popular BitTorrent client for downloading files. <a href="https://pkg.go.dev/net/http"><u>Go-http-client</u></a> and <a href="https://github.com/valyala/fasthttp"><u>fasthttp</u></a> were also commonly used in DDoS attacks. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. fasthttp is used to build fast web applications, but is often exploited for DDoS attacks and <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">web scraping</a> too.</p>
    <div>
      <h2>HTTP attributes commonly used in DDoS attacks</h2>
      <a href="#http-attributes-commonly-used-in-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>HTTP methods</h3>
      <a href="#http-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/"><u>HTTP methods</u></a> (also called HTTP verbs) define the action to be performed on a resource on a server. They are part of the HTTP protocol and allow communication between clients (such as browsers) and servers.</p><p>The GET method is most commonly used. Almost 70% of legitimate HTTP requests made use of the GET method. In second place is the POST method with a share of 27%.</p><p>With DDoS attacks, we see a different picture. Almost 14% of HTTP requests using the HEAD method were part of a DDoS attack, despite it hardly being present in legitimate HTTP requests (0.75% of all requests). The DELETE method came in second place, with around 7% of its usage being for DDoS purposes.</p><p>The disproportion between methods commonly seen in DDoS attacks versus their presence in legitimate traffic definitely stands out. Security administrators can use this information to optimize their security posture based on these headers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fD5aUHaIkRMUNPZJI0LKW/d5856e7ce13cb7d1e28727401b885b1a/image10.png" />
          </figure><p><sup><i>Distribution of HTTP methods in DDoS attacks and legitimate traffic: 2024 Q4</i></sup></p>
    <div>
      <h3>HTTP paths</h3>
      <a href="#http-paths">
        
      </a>
    </div>
    <p>An HTTP path describes a specific server resource. Along with the HTTP method, the server will perform the action on the resource.</p><p>For example, GET <a href="https://developers.cloudflare.com/ddos-protection/"><u>https://developers.cloudflare.com/ddos-protection/</u></a> will instruct the server to retrieve the content for the resource /ddos-protection/.</p><p>DDoS attacks often target the root of the website (“/”), but in other cases, they can target specific paths. In 2024 Q4, 98% of HTTP requests towards the /wp-admin/ path were part of DDoS attacks. The /wp-admin/ path is the default <a href="https://wordpress.com/support/dashboard/"><u>administrator dashboard for WordPress websites</u></a>.</p><p>Obviously, many paths are unique to the specific website, but in the graph below, we’ve provided the top <i>generic</i> paths that were attacked the most. Security administrators can use this data to strengthen their protection on these endpoints, as applicable. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/I9SweJVs4sLYjgHy469NN/b7d0e76648b0ec26af32143a45dc1dd6/image21.png" />
          </figure><p> <sup><i>Top HTTP paths targeted by HTTP DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP vs. HTTPS</h2>
      <a href="#http-vs-https">
        
      </a>
    </div>
    <p>In Q4, almost 94% of legitimate traffic was <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/"><u>HTTPS</u></a>. Only 6% was plaintext HTTP (not encrypted). Looking at DDoS attack traffic, around 92% of HTTP DDoS attack requests were over HTTPS and almost 8% were over plaintext HTTP.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1grfbkXvzjh8nXJYtrhiJP/8ff46ac59d296fcad89475f2bc242184/unnamed__2_.png" />
          </figure><p><sup><i>HTTP vs. HTTPS in legitimate traffic and DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Layer 3/Layer 4 DDoS attacks</h2>
      <a href="#layer-3-layer-4-ddos-attacks">
        
      </a>
    </div>
    <p>The top three most common Layer 3/Layer 4 (network layer) attack vectors were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> (38%), <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a> (16%), and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a> (14%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hXTXtKe2kVD9fjw26aIN8/7bbd5ef01b04a3bba28232cdcf876c3a/image1.png" />
          </figure><p><sup><i>Top L3/4 DDoS attack vectors: 2024 Q4</i></sup></p><p>An additional common attack vector, or rather, botnet type, is <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>. Mirai attacks accounted for 6% of all network layer DDoS attacks — a 131% increase QoQ. In 2024 Q4, a Mirai-variant botnet was responsible for the largest DDoS attack on record, but we’ll discuss that further in the <a href="#the-largest-ddos-attack-on-record"><u>next section</u></a>.</p>
    <div>
      <h2>Emerging attack vectors</h2>
      <a href="#emerging-attack-vectors">
        
      </a>
    </div>
    <p>Before moving on to the next section, it’s worthwhile to discuss the growth in additional attack vectors that were observed this quarter. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Hz074MxtzzdG4uvCM8P93/af6c86b023160f66acf0fe209386acf7/image8.png" />
          </figure><p><sup><i>Top emerging threats: 2024 Q4</i></sup></p><p><sup><i></i></sup><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/"><u>Memcached DDoS attacks</u></a> saw the largest growth, with a 314% QoQ increase. <a href="https://memcached.org/"><u>Memcached</u></a> is a database caching system for speeding up websites and networks. Memcached servers that support <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> can be abused to launch amplification or reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses, which can be up to 51,200x larger than the initial request.</p><p>BitTorrent DDoS attacks also surged this quarter by 304%. The <a href="https://en.wikipedia.org/wiki/BitTorrent"><u>BitTorrent protocol</u></a> is a communication protocol used for peer-to-peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may utilize <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker"><u>BitTorrent Trackers</u></a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table"><u>Distributed Hash Tables (DHT)</u></a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding"><u>seeding</u></a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IP addresses. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p>
    <div>
      <h2>The largest DDoS attack on record</h2>
      <a href="#the-largest-ddos-attack-on-record">
        
      </a>
    </div>
    <p>On October 29, a 5.6 Tbps <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP DDoS attack</u></a> launched by a Mirai-variant botnet targeted a Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> customer, an Internet service provider (ISP) from Eastern Asia. The attack lasted only 80 seconds and originated from over 13,000 <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/"><u>IoT</u></a> devices. Detection and mitigation were fully autonomous by Cloudflare’s distributed defense systems. It required no human intervention, didn’t trigger any alerts, and didn’t cause any performance degradation. The systems worked as intended.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kx3Uj4y4G4KZ6yNritxg4/d47e8f1b51a630bce28e8b036a4e7b64/image16.png" />
          </figure><p><sup><i>Cloudflare’s autonomous DDoS defenses mitigate a 5.6 Tbps Mirai DDoS attack without human intervention</i></sup></p><p>While the total number of unique source IP addresses was around 13,000, the average unique source IP addresses per second was 5,500. We also saw a similar number of unique source ports per second. In the graph below, each line represents one of the 13,000 different source IP addresses, and as portrayed, each contributed less than 8 Gbps per second. The average contribution of each IP address per second was around 1 Gbps (~0.012% of 5.6 Tbps).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2biclYyny81QnJxQpP3PcF/8e1ec9c4b227043b1bd05914c1f543b1/image14.png" />
          </figure><p><sup><i>The 13,000 source IP addresses that launched the 5.6 Tbps DDoS attack</i></sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2024 Q3, we started seeing a rise in hyper-volumetric network layer DDoS attacks. In 2024 Q4, the amount of attacks exceeding 1 Tbps increased by 1,885% QoQ and attacks exceeding 100 Million pps (packets per second) increased by 175% QoQ. 16% of the attacks that exceeded 100 Million pps also exceeded 1 Billion pps.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3L3X48ztfIeGRVe3Su009z/b6798328b8926b33ea78b0617ee3aad5/image6.png" />
          </figure><p><sup><i>Distribution of hyper-volumetric L3/4 DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack size</h2>
      <a href="#attack-size">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (63%) did not exceed 50,000 requests per second. On the other side of the spectrum, 3% of HTTP DDoS attacks exceeded 100 million requests per second.</p><p>Similarly, the majority of network layer DDoS attacks are also small. 93% did not exceed 500 Mbps and 87% did not exceed 50,000 packets per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25TQ7mayQOrr3ZpG1yLADa/ce08756eec2fbb2b213aad1668d59b4f/unnamed.png" />
          </figure><p><sup><i>QoQ change in attack size by packet rate: 2024 Q4</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1eNqV8gIxZgukwropBeyvs/23f128993b6573a3acb6e2a33306813d/unnamed__1_.png" />
          </figure><p><sup><i>QoQ change in attack size by bit rate: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (72%) end in under ten minutes. Approximately 22% of HTTP DDoS attacks last over one hour, and 11% last over 24 hours.</p><p>Similarly, 91% of network layer DDoS attacks also end within ten minutes. Only 2% last over an hour.</p><p>Overall, there was a significant QoQ decrease in the duration of DDoS attacks. Because the duration of most attacks is so short, it is not feasible, in most cases, for a human to respond to an alert, analyze the traffic, and apply mitigation. The short duration of attacks emphasizes the need for an <a href="https://www.cloudflare.com/ddos/">in-line, always-on, automated DDoS protection service</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Yfb7JGpZ2GTXR2HYK5pAS/55a1dbf4eec229e7154cf223d542e3bf/unnamed__3_.png" />
          </figure><p><sup><i>QoQ change in attack duration: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack sources</h2>
      <a href="#attack-sources">
        
      </a>
    </div>
    <p>In the last quarter of 2024, Indonesia remained the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest source of DDoS attacks</u></a> worldwide for the second consecutive quarter. To understand where attacks are coming from, we map the source IP addresses launching HTTP DDoS attacks because they cannot be spoofed, and for Layer 3/Layer 4 DDoS attacks, we use the location of our data centers where the DDoS packets were ingested. This lets us overcome the spoofability that is possible in Layer 3/Layer 4. We’re able to achieve geographical accuracy due to our extensive network spanning over 330 cities around the world.</p><p>Hong Kong came in second, having moved up five spots from the previous quarter. Singapore advanced three spots, coming in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Z7DgqDBlKbd3eDRv7ZVmL/49aabaee6301a3c93bb40851e645dd42/image2.png" />
          </figure><p><sup><i>Top 10 largest sources of DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h3>Top source networks</h3>
      <a href="#top-source-networks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (AS) is a large network or group of networks that has a unified routing policy. Every computer or device that connects to the Internet is connected to an AS. To find out what your AS is, visit <a href="https://radar.cloudflare.com/ip">https://radar.cloudflare.com/ip</a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out.</p><p>The AS that we saw the most HTTP DDoS attack traffic from in 2024 Q4 was German-based <a href="https://radar.cloudflare.com/security-and-attacks/as24940"><u>Hetzner (AS24940)</u></a>. Almost 5% of all HTTP DDoS requests originated from Hetzer’s network, or in other words, 5 out of every 100 HTTP DDoS requests that Cloudflare blocked originated from Hetzner.</p><p>In second place we have the US-based <a href="https://radar.cloudflare.com/security-and-attacks/as14061"><u>Digital Ocean (AS14061)</u></a>, followed by France-based <a href="https://radar.cloudflare.com/security-and-attacks/as16276"><u>OVH (AS16276)</u></a> in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pQUunzZ0ioH48lTOJOLVe/8dc42b7904b0f0b838f117ce5f35a35a/image12.png" />
          </figure><p><sup><i>Top 10 largest source networks of DDoS attacks: 2024 Q4</i></sup></p><p>For many network operators such as the ones listed above, it can be hard to identify the malicious actors that abuse their infrastructure for launching attacks. To help network operators and service providers crack down on the abuse, we provide a <b>free</b> <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>DDoS Botnet threat intelligence feed</u></a> that provides ASN owners a list of their IP addresses that we’ve seen participating in DDoS attacks. </p>
    <div>
      <h2>Top threat actors</h2>
      <a href="#top-threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (40%). Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack.</p><p>Another 14% reported that an extortionist was behind the attacks. 7% claimed it was a self-inflicted DDoS, 2% reported hacktivism as the cause of the attack, and another 2% reported that the attacks were launched by former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gThccj4k75gfFoGBn301W/403bd5cf3984611490e7d90f3435f3c1/image15.png" />
          </figure><p><sup><i>Top threat actors: 2024 Q4</i></sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In the final quarter of 2024, as anticipated, we observed a surge in <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a>. This spike was predictable, given that Q4 is a prime time for cybercriminals, with increased online shopping, travel arrangements, and holiday activities. Disrupting these services during peak times can significantly impact organizations' revenues and cause real-world disruptions, such as flight delays and cancellations.</p><p>In Q4, 12% of Cloudflare customers that were targeted by DDoS attacks reported being threatened or extorted for a ransom payment. This represents a 78% QoQ increase and 25% YoY growth compared to 2023 Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BV3NoLbxwzO0ShVyCwQ97/7ccb684195b6efef0db209aefffff476/image17.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by quarter: 2024</i></sup></p><p>Looking back at the entire year of 2024, Cloudflare received the most reports of Ransom DDoS attacks in May. In Q4, we can see the gradual increase starting from October (10%), November (13%), and December (14%) — a seven-month-high.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EllNHd6iUWkQ6Z481gLss/a20b10f96d4f7a649dfa23beceebad8e/image9.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by month: 2024</i></sup></p>
    <div>
      <h2>Target of attacks</h2>
      <a href="#target-of-attacks">
        
      </a>
    </div>
    <p>In 2024 Q4, China maintained its position as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>attacked country</u></a>. To understand which countries are subject to more attacks, we group DDoS attacks by our customers’ billing country. </p><p>Philippines makes its first appearance as the second most attacked country in the top 10. Taiwan jumped to third place, up seven spots compared to last quarter.</p><p>In the map below, you can see the top 10 most attacked locations and their ranking change compared to the previous quarter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4TosbZ02NmNGbgpwkskUNs/6f96885b4de89c34403551a03a01e634/image5.png" />
          </figure><p><sup><i>Top 10 most attacked locations by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>In the fourth quarter of 2024, the <i>Telecommunications, Service Providers and Carriers</i> industry jumped from the third place (last quarter) to the first place as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>attacked industry</u></a>. To understand which industries are subject to more attacks, we group DDoS attacks by our customers’ industry. The <i>Internet</i> industry came in second, followed by <i>Marketing and Advertising</i> in third.</p><p>The <i>Banking &amp; Financial Services</i> industry dropped seven places from number one in 2024 Q3 to number eight in Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/444JREdNrmb6yePqqfGI4B/a268a1d3d3cd1dd7d9e076ffcf5b06c5/image7.png" />
          </figure><p><sup><i>Top 10 most attacked industries by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Our commitment to unmetered DDoS protection</h2>
      <a href="#our-commitment-to-unmetered-ddos-protection">
        
      </a>
    </div>
    <p>The fourth quarter of 2024 saw a surge in hyper-volumetric Layer 3/Layer 4 DDoS attacks, with the largest one breaking our previous record, peaking at 5.6 Tbps. This rise in attack size renders capacity-limited cloud DDoS protection services or on-premise DDoS appliances obsolete.</p><p>The growing use of powerful botnets, driven by geopolitical factors, has broadened the range of vulnerable targets. A rise in Ransom DDoS attacks is also a growing concern.</p><p>Too many organizations only implement DDoS protection after suffering an attack. Our observations show that organizations with proactive security strategies are more resilient. At Cloudflare, we invest in automated defenses and a comprehensive security portfolio to provide proactive protection against both current and emerging threats.</p><p>With our 321 Tbps network spanning 330 cities globally, we remain committed to providing <a href="https://www.cloudflare.com/ddos/">unmetered and unlimited DDoS protection</a> no matter the size, duration and quantity of the attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1qstsc71dUKtPimn2nGewc</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Adaptive DDoS Protection - our new traffic profiling system for mitigating DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/adaptive-ddos-protection/</link>
            <pubDate>Mon, 19 Sep 2022 13:45:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s new Adaptive DDoS Protection system learns your unique traffic patterns and constantly adapts to protect you against sophisticated DDoS attacks ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Every Internet property is unique, with its own traffic behaviors and patterns. For example, a website may only expect user traffic from certain geographies, and a network might only expect to see a limited set of protocols.</p><p>Understanding that the traffic patterns of each Internet property are unique is what led us to develop the Adaptive DDoS Protection system. Adaptive DDoS Protection joins our existing suite of <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">automated DDoS defenses</a> and takes it to the next level. The new system learns your unique traffic patterns and adapts to <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">protect against sophisticated DDoS attacks</a>.</p><p>Adaptive DDoS Protection is now generally available to Enterprise customers:</p><ul><li><p><b>HTTP Adaptive DDoS Protection</b> - available to WAF/CDN customers on the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a>, who have also subscribed to the Advanced DDoS Protection service.</p></li><li><p><b>L3/4 Adaptive DDoS Protection</b> - available to Magic Transit and Spectrum customers on an Enterprise plan.</p></li></ul>
    <div>
      <h3>Adaptive DDoS Protection learns your traffic patterns</h3>
      <a href="#adaptive-ddos-protection-learns-your-traffic-patterns">
        
      </a>
    </div>
    <p>The Adaptive DDoS Protection system creates a traffic profile by looking at a customer’s maximal rates of traffic every day, for the past seven days. The profiles are recalculated every day using the past seven-day history. We then store the maximal traffic rates seen for every predefined dimension value. Every profile uses one dimension and these dimensions include the source country of the request, the country where the Cloudflare data center that received the IP packet is located, user agent, IP protocol, destination ports and more.</p><p>So, for example, for the <a href="/location-aware-ddos-protection/">profile that uses the source country as a dimension</a>, the system will log the maximal traffic rates seen per country. e.g. 2,000 requests per second (rps) for Germany, 3,000 rps for France, 10,000 rps for Brazil, and so on. This example is for HTTP traffic, but Adaptive DDoS protection also profiles L3/4 traffic for our Magic Transit and Spectrum Enterprise customers.</p><p>Another note on the maximal rates is that we use the 95th percentile rates. This means that we take a look at the maximal rates and discard the top 5% of the highest rates. The purpose of this is to eliminate outliers from the calculations.</p><p>Calculating traffic profiles is done asynchronously — meaning that it does not induce any latency to our customers’ traffic. The system  then distributes a compact profile representation across our network that can be consumed by our <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a> to be used to detect and mitigate DDoS attacks in a much more cost-efficient manner.</p><p>In addition to the traffic profiles, the Adaptive DDoS Protection also leverages Cloudflare’s <a href="https://developers.cloudflare.com/bots/concepts/bot-score/#machine-learning">Machine Learning</a> generated <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">Bot Scores</a> as an additional signal to differentiate between user and automated traffic. The purpose of using these scores is to differentiate between legitimate spikes in user traffic that deviates from the traffic profile, and a spike of automated and potentially malicious traffic.</p>
    <div>
      <h3>Out of the box and easy to use</h3>
      <a href="#out-of-the-box-and-easy-to-use">
        
      </a>
    </div>
    <p>Adaptive DDoS Protection just works out of the box. It automatically creates the profiles, and then customers can tweak and tune the settings as they need via <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/">DDoS Managed Rules</a>. Customers can change the sensitivity level, leverage expression fields to create overrides (e.g. exclude <i>this</i> type of traffic), and change the mitigation action to tailor the behavior of the system to their specific needs and traffic patterns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6avwDSeZVfreb140FKSB5e/f59e79bcdcb9e644d87fec94fcdc7d72/image2-11.png" />
            
            </figure><p>Adaptive DDoS Protection complements the existing DDoS protection systems which leverages dynamic fingerprinting to detect and mitigate DDoS attacks. The two work in tandem to protect our customers from DDoS attacks. When Cloudflare customers onboard a new Internet property to Cloudflare, the dynamic fingerprinting protects them automatically and out of the box — without requiring any user action. Once the Adaptive DDoS Protection learns their legitimate traffic patterns and creates a profile, users can turn it on to provide an extra layer of protection.</p>
    <div>
      <h3>Rules included as part of the Adaptive DDoS Protection</h3>
      <a href="#rules-included-as-part-of-the-adaptive-ddos-protection">
        
      </a>
    </div>
    <p>As part of this release, we’re pleased to announce the following capabilities as part of Cloudflare’s Adaptive DDoS Protection:</p>
<table>
<thead>
  <tr>
    <th><span>Profiling Dimension</span></th>
    <th><span>Availability</span></th>
  </tr>
  <tr>
    <th><span>WAF/CDN customers on the Enterprise plan with Advanced DDoS</span></th>
    <th><span>Magic Transit &amp; Spectrum Enterprise customers</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Origin errors</span></td>
    <td><span>✅</span></td>
    <td><span>❌</span></td>
  </tr>
  <tr>
    <td><span>Client IP Country &amp; region</span></td>
    <td><span>✅</span></td>
    <td><span>Coming soon</span></td>
  </tr>
  <tr>
    <td><span>User Agent (globally, not per customer*)</span></td>
    <td><span>✅</span></td>
    <td><span>❌</span></td>
  </tr>
  <tr>
    <td><span>IP Protocol</span></td>
    <td><span>❌</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Combination of IP Protocol and Destination Port</span></td>
    <td><span>❌</span></td>
    <td><span>Coming soon</span></td>
  </tr>
</tbody>
</table><p>*The User-Agent-aware feature analyzes, learns and profiles all the top user agents that we see across the Cloudflare network. This feature helps us identify DDoS attacks that leverage legacy or wrongly configured user agents.</p><p>Excluding UA-aware DDoS Protection, Adaptive DDoS Protection rules are deployed in Log mode. Customers can observe the traffic that’s flagged, tweak the sensitivity if needed, and then deploy the rules in mitigation mode. You can follow the steps outlined in <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-positive/">this guide</a> to do so.</p>
    <div>
      <h3>Making the impact of DDoS attacks a thing of the past</h3>
      <a href="#making-the-impact-of-ddos-attacks-a-thing-of-the-past">
        
      </a>
    </div>
    <p>Our mission at Cloudflare is to help build a better Internet. The DDoS Protection team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Cloudflare’s Adaptive DDoS Protection takes us one step closer to achieving that vision: making Cloudflare’s DDoS protection even more intelligent, sophisticated, and tailored to our customer’s unique traffic patterns and individual needs.</p><p>Want to learn more about Cloudflare’s Adaptive DDoS Protection? Visit our <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adaptive-protection/">developer site</a>.</p><p>Interested in upgrading to get access to Adaptive DDoS Protection? Contact your account team.</p><p>New to Cloudflare? <a href="https://www.cloudflare.com/plans/enterprise/discover/contact/">Speak to a Cloudflare expert</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Spectrum]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">7oc5ew54cAi5VUpN6q9ZtS</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>