Skip to content

Commit ff1dbd6

Browse files
patriciasantaanaOxyjun
authored andcommitted
[DDoS Protection] Various updates (#17865)
* botnet threat feed offense * recommendations for ddos tests * edit * remove ddos billing note * space * Update src/content/docs/ddos-protection/botnet-threat-feed.mdx Co-authored-by: Jun Lee <[email protected]> --------- Co-authored-by: Jun Lee <[email protected]>
1 parent 5922f4b commit ff1dbd6

File tree

3 files changed

+6
-7
lines changed

3 files changed

+6
-7
lines changed

src/content/docs/ddos-protection/about/how-ddos-protection-works.mdx

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,6 @@ Once attack traffic matches a rule, Cloudflare's systems will track that traffic
3333
| Log | Records matching requests in the Cloudflare Logs. |
3434
| Use rule defaults | Uses the default action that is pre-defined for each rule. |
3535

36-
:::note
37-
38-
DDoS attack traffic is automatically excluded from billing systems.
39-
:::
40-
4136
## Time to mitigate
4237

4338
- Immediate mitigation for Advanced TCP and DNS Protection systems.

src/content/docs/ddos-protection/botnet-threat-feed.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,11 @@ head:
1111

1212
The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating from within their networks.
1313

14-
Each service provider can only get information about IP addresses associated with their autonomous system numbers (ASNs). The affiliation of a service provider with their ASNs will be checked against [PeeringDB](https://www.peeringdb.com/), a reliable and globally recognized interconnection database.
14+
Each offense is a mitigated HTTP request from the specific IP address. For example, if an IP has 3,000 offenses, it means that Cloudflare has mitigated 3,000 HTTP requests from that IP.
1515

16-
To ensure the feed’s accuracy, Cloudflare will only include in the feed IP addresses that have participated in multiple HTTP DDoS attacks and have triggered high-confidence rules.
16+
A service provider can only get information about IP addresses associated with their autonomous system numbers (ASNs). The affiliation of a service provider with their ASNs will be checked against [PeeringDB](https://www.peeringdb.com/), a reliable and globally recognized interconnection database.
17+
18+
To ensure the feed's accuracy, Cloudflare will only include IP addresses that have participated in multiple HTTP DDoS attacks and have triggered high-confidence rules.
1719

1820
## Context
1921

src/content/docs/ddos-protection/reference/simulate-ddos-attack.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,6 @@ You can only launch DDoS attacks against your own Internet properties — your z
1919

2020
You do not have to obtain permission from Cloudflare to launch a DDoS attack simulation against your own Internet properties. However, before launching the simulated attack, you must [open a Support ticket](/support/contacting-cloudflare-support/) and provide the information below. All fields are mandatory.
2121

22+
It is recommended that you choose the right service and enable the correct features to test against the corresponding DDoS attacks. For example, if you want to test Cloudflare against an HTTP DDoS attack and you are only using Magic Transit, the test is going to fail because you need to onboard your HTTP application to Cloudflare's reverse proxy service to test our HTTP DDoS Protection.
23+
2224
<Render file="support-ticket-information" product="fundamentals" params={{ one: "Attack" }} />

0 commit comments

Comments
 (0)