Skip to content

Commit c261740

Browse files
pop entry
1 parent a216a66 commit c261740

File tree

1 file changed

+46
-14
lines changed

1 file changed

+46
-14
lines changed

src/content/docs/ddos-protection/frequently-asked-questions.mdx

Lines changed: 46 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,33 +16,33 @@ When Cloudflare's DDoS systems detect and mitigate attacks, they drop, rate-limi
1616

1717
There are three main DDoS mitigation systems:
1818

19-
1. [DDoS Managed Ruleset](/ddos-protection/managed-rulesets/)
19+
1. [DDoS managed rulesets](/ddos-protection/managed-rulesets/)
2020

21-
a. [Network-layer DDoS Managed Ruleset](/ddos-protection/managed-rulesets/network/)
21+
a. [Network-layer DDoS managed ruleset](/ddos-protection/managed-rulesets/network/)
2222

23-
b. [HTTP DDoS Managed Ruleset](/ddos-protection/managed-rulesets/http/)
23+
b. [HTTP DDoS managed ruleset](/ddos-protection/managed-rulesets/http/)
2424

2525
3. [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/)
2626
4. [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/)
2727

28-
The DDoS Managed Ruleset includes many individual rules. Each rule provides the heuristics that instructs the system how to identify DDoS attack traffic. When the DDoS Managed Ruleset identifies an attack, it will generate a real-time fingerprint to match against the attack traffic, and install an ephemeral mitigation rule to mitigate the attack using that fingerprint.
28+
The DDoS managed ruleset includes many individual rules. Each rule provides the heuristics that instructs the system how to identify DDoS attack traffic. When the DDoS managed ruleset identifies an attack, it will generate a real-time fingerprint to match against the attack traffic, and install an ephemeral mitigation rule to mitigate the attack using that fingerprint.
2929

3030
The start time of the attack is when the mitigation rule is installed. The attack ends when there is no more traffic matching the rule. This is a single DDoS attack event.
3131

32-
A DDoS attack therefore has a start time, end time, and additional attack metadata such as:
32+
A DDoS attack has a start time, end time, and additional attack metadata such as:
3333

34-
1. Attack ID
35-
2. Attack vector
36-
3. Mitigating rule
37-
4. Total bytes and packets
38-
5. Attack target
39-
6. Mitigation action
34+
- Attack ID
35+
- Attack vector
36+
- Mitigating rule
37+
- Total bytes and packets
38+
- Attack target
39+
- Mitigation action
4040

4141
This information is used to populate the [Executive Summary](/analytics/network-analytics/understand/main-dashboard/#executive-summary) section in the [Network Analytics](/analytics/network-analytics/) dashboard.
4242

4343
It can also be retrieved via GraphQL API using the `dosdAttackAnalyticsGroups` node.
4444

45-
Currently, the concept of a DDoS attack event only exists for the Network-layer DDoS Managed Ruleset. There is no such grouping of individual packets, queries, or HTTP requests for the other systems, although we plan to implement it.
45+
Currently, the concept of a DDoS attack event only exists for the [Network-layer DDoS managed ruleset](/ddos-protection/managed-rulesets/network/). There is no such grouping of individual packets, queries, or HTTP requests for the other systems yet.
4646

4747
---
4848

@@ -86,7 +86,7 @@ Yes. Using our anycast network, along with Traffic Manager, Unimog, and Plurimog
8686

8787
## Where can I see latest DDoS trends?
8888

89-
Cloudflare publishes quarterly DDoS reports and coverage of signficant DDoS attacks. The publications are available on our [blog website](https://blog.cloudflare.com/tag/ddos-reports/) and as interactive reports on the [Cloudflare Radar Reports website](https://radar.cloudflare.com/reports?q=DDoS).
89+
Cloudflare publishes quarterly DDoS reports and coverage of significant DDoS attacks. The publications are available on our [blog website](https://blog.cloudflare.com/tag/ddos-reports/) and as interactive reports on the [Cloudflare Radar Reports website](https://radar.cloudflare.com/reports?q=DDoS).
9090

9191
Learn more about the [methodologies](/radar/reference/quarterly-ddos-reports/) behind these reports.
9292

@@ -110,7 +110,7 @@ These tools and attacks exploit different aspects of network protocols and behav
110110

111111
---
112112

113-
## Can I exclude a specific user agent from the HTTP DDoS protection?
113+
## Can I exclude a specific user agents from HTTP DDoS protection?
114114

115115
Yes, you can create an [override](/ddos-protection/managed-rulesets/http/override-expressions/) and use the expression fields to match against HTTP requests with the user agent. There are a variety of [fields](/ddos-protection/managed-rulesets/http/override-expressions/#available-expression-fields) that you can use.
116116

@@ -134,4 +134,36 @@ Cloudflare mitigates SYN flood packets statelessly in `dosd` or using [DDoS mana
134134

135135
When SYN flood packets are highly randomized or indistinguishable from legitimate packets, Cloudflare uses [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) to protect your site.
136136

137+
---
138+
139+
## How does Cloudflare handle hyper-localized DDoS attacks that may aim to overwhelm a specific Point of Presence (PoP)?
140+
141+
Cloudflare uses a combination of intelligent traffic engineering, global anycast, and real-time, autonomous DDoS mitigation to handle hyper-localized DDoS attacks—even those that may temporarily exceed the capacity of a specific Point of Presence (PoP).
142+
143+
### Global Anycast Network
144+
145+
Anycast allows multiple servers (PoPs) to share the same IP address, and the Border Gateway Protocol (BGP) routing system ensures user traffic is routed to the nearest or lowest-cost node.
146+
147+
#### Process
148+
149+
When one PoP is overwhelmed due to a local DDoS flood or as a result of limited capacity, BGP route propagation can be adjusted to shift traffic away from that PoP. Cloudflare can also withdraw BGP announcements from specific peers or upstreams to force traffic to reroute through better-equipped PoPs. Because DDoS traffic originates from multiple geographic regions, Anycast and traffic engineering distributes the attack across Cloudflare’s larger 348 Tbps Anycast network to reduce the burden on a single PoP.
150+
151+
### Intelligent Traffic Engineering
152+
153+
Cloudflare uses real-time data and intelligence systems to make decisions about traffic routing, load balancing, and congestion management.
154+
155+
#### Process
156+
157+
If a specific PoP becomes saturated or experiences attack traffic, Cloudflare's internal traffic engineering systems dynamically steer traffic across alternative paths using: traffic shaping, path-aware routing, and dynamic DNS responses
158+
159+
The system monitors CPU load, network congestion, and traffic type to make smart decisions about whether to reroute or throttle connections.
160+
161+
For Layer 7 (application-level) attacks, Cloudflare can challenge or rate-limit traffic before it reaches application servers. This scenario is similar to some extent to when we take down certain PoPs for maintenance. This can be done automatically via Traffic Manager, and if needed, by our Site Reliability Engineers (SRE).
162+
163+
### Real-Time DDoS Mitigation
164+
165+
DDoS managed rules and Advanced DDoS Protection are autonomous and run on every single server independently, while also coordinating locally and globally, contributing to the resilience of each server and PoP. These systems run close to the network edge in every PoP, meaning detection and mitigation happen rapidly, often before any noticeable impact. If traffic exceeds the capacity of one PoP, mitigation rules are replicated to other PoPs to help absorb overflow.
137166

167+
- **DDoS managed rules**: Detects and mitigates DDoS attacks in real-time. When it detects an attack, it deploys rules within seconds to mitigate the malicious traffic.
168+
- **Advanced TCP Protection**: Identifies and drops abnormal TCP/IP behavior before it hits application servers.
169+
- **Advanced DNS Protection**: Identifies and drops abnormal DNS queries behavior before it hits DNS servers.

0 commit comments

Comments
 (0)