You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/about/how-ddos-protection-works.mdx
+26Lines changed: 26 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,8 +16,34 @@ The analyzed samples include:
16
16
-**HTTP request metadata** such as HTTP headers, user agent, query-string, path, host, HTTP method, HTTP version, TLS cipher version, and request rate.
17
17
-**HTTP response metrics** such as error codes returned by customers’ origin servers and their rates.
18
18
19
+
Cloudflare uses a set of dynamic rules that scan for attack patterns, known attack tools, suspicious patterns, protocol violations, requests causing large amounts of origin errors, excessive traffic hitting the origin or cache, and additional attack vectors. Each rule has a predefined sensitivity level and default action that varies based on the rule's confidence that the traffic is indeed part of an attack.
20
+
21
+
:::note
22
+
23
+
You can set an override expression for the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/override-expressions/) or [Network-layer DDoS Attack Protection](/ddos-protection/managed-rulesets/network/override-expressions/) managed ruleset to define a specific scope for sensitivity level or action adjustments.
24
+
:::
25
+
19
26
Once attack traffic matches a rule, Cloudflare's systems will track that traffic and generate a real-time signature to surgically match against the attack pattern and mitigate the attack without impacting legitimate traffic. The rules are able to generate different signatures based on various properties of the attacks and the signal strength of each attribute. For example, if the attack is distributed — that is, originating from many source IPs — then the source IP field will not serve as a strong indicator, and the rule will not choose the source IP field as part of the attack signature. Once generated, the fingerprint is propagated as a mitigation rule to the most optimal location on the Cloudflare global network for cost-efficient mitigation. These mitigation rules are ephemeral and will expire shortly after the attack has ended, which happens when no additional traffic has been matched to the rule.
20
27
28
+
| Actions | Description |
29
+
| --- | --- |
30
+
| Block | Matching requests are denied access to the site. |
31
+
| Interactive Challenge | The client that made the request must pass an interactive Challenge. |
32
+
| Managed Challenge | Depending on the characteristics of a request, Cloudflare will choose an appropriate type of challenge. |
33
+
| Log | Records matching requests in the Cloudflare Logs. |
34
+
| Use rule defaults | Uses the default action that is pre-defined for each rule. |
35
+
36
+
:::note
37
+
38
+
DDoS attack traffic is automatically excluded from billing systems.
39
+
:::
40
+
41
+
## Time to mitigate
42
+
43
+
- Immediate mitigation for Advanced TCP and DNS Protection systems.
44
+
- Up to three seconds on average for the detection and mitigation of L3/4 DDoS attacks at the edge using the Network-layer DDoS Protection Managed rules.
45
+
- Up to 15 seconds on average for the detection and mitigation of HTTP DDoS attacks at the edge using the HTTP DDoS Protection Managed rules.
46
+
21
47
## Data localization
22
48
23
49
To learn more about how DDoS protection works with data localization, refer to the Data Localization Suite [product compatibility](/data-localization/compatibility/).
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/managed-rulesets/http/configure-api.mdx
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,9 +37,7 @@ You can create overrides at the zone level and at the account level. Account-lev
37
37
Only available to Enterprise customers with the Advanced DDoS Protection subscription, which can create up to 10 rules.
38
38
:::
39
39
40
-
Create multiple rules in the `ddos_l7` phase entry point ruleset to define different overrides for different sets of incoming requests. Set each rule expression according to the traffic whose HTTP DDoS protection you wish to customize.
41
-
42
-
Rules in the phase entry point ruleset, where you create overrides, are evaluated in order until there is a match for a rule expression and sensitivity level, and Cloudflare will apply the first rule that matches the request. Therefore, the rule order in the entry point ruleset is very important.
Create multiple rules in the `ddos_l7` phase entry point ruleset to define different overrides for different sets of incoming requests. Set each rule expression according to the traffic whose HTTP DDoS protection you wish to customize.
9
+
10
+
Rules in the phase entry point ruleset, where you create overrides, are evaluated in order until there is a match for a rule expression and sensitivity level, and Cloudflare will apply the first rule that matches the request. Therefore, the rule order in the entry point ruleset is very important.
Copy file name to clipboardExpand all lines: src/content/partials/ddos-protection/managed-rulesets/sensitivity-level-reference.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,3 +19,7 @@ The available sensitivity levels are:
19
19
The default sensitivity level is *High*.
20
20
21
21
In most cases, when you select the *Essentially Off* sensitivity level the rule will not trigger for any of the selected actions, including *Log*. However, if the attack is extremely large, Cloudflare's protection systems will still trigger the rule's mitigation action to protect Cloudflare's network.
22
+
23
+
*Essentially Off* means that we have set an exceptionally low sensitivity level so in most cases traffic will not be mitigated for you. However, attack traffic will be mitigated at exceptional levels to ensure the safety and stability of the Cloudflare network.
24
+
25
+
**Log** means that requests will not be mitigated but only logged and shown on the dashboard. However, attack traffic will be mitigated at exceptional levels to ensure the safety and stability of the Cloudflare network.
0 commit comments