Skip to content

Commit ee7e635

Browse files
ddos updates (cloudflare#17149)
1 parent e61fa19 commit ee7e635

File tree

5 files changed

+43
-3
lines changed

5 files changed

+43
-3
lines changed

src/content/docs/ddos-protection/about/how-ddos-protection-works.mdx

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,34 @@ The analyzed samples include:
1616
- **HTTP request metadata** such as HTTP headers, user agent, query-string, path, host, HTTP method, HTTP version, TLS cipher version, and request rate.
1717
- **HTTP response metrics** such as error codes returned by customers’ origin servers and their rates.
1818

19+
Cloudflare uses a set of dynamic rules that scan for attack patterns, known attack tools, suspicious patterns, protocol violations, requests causing large amounts of origin errors, excessive traffic hitting the origin or cache, and additional attack vectors. Each rule has a predefined sensitivity level and default action that varies based on the rule's confidence that the traffic is indeed part of an attack.
20+
21+
:::note
22+
23+
You can set an override expression for the [HTTP DDoS Attack Protection](/ddos-protection/managed-rulesets/http/override-expressions/) or [Network-layer DDoS Attack Protection](/ddos-protection/managed-rulesets/network/override-expressions/) managed ruleset to define a specific scope for sensitivity level or action adjustments.
24+
:::
25+
1926
Once attack traffic matches a rule, Cloudflare's systems will track that traffic and generate a real-time signature to surgically match against the attack pattern and mitigate the attack without impacting legitimate traffic. The rules are able to generate different signatures based on various properties of the attacks and the signal strength of each attribute. For example, if the attack is distributed — that is, originating from many source IPs — then the source IP field will not serve as a strong indicator, and the rule will not choose the source IP field as part of the attack signature. Once generated, the fingerprint is propagated as a mitigation rule to the most optimal location on the Cloudflare global network for cost-efficient mitigation. These mitigation rules are ephemeral and will expire shortly after the attack has ended, which happens when no additional traffic has been matched to the rule.
2027

28+
| Actions | Description |
29+
| --- | --- |
30+
| Block | Matching requests are denied access to the site. |
31+
| Interactive Challenge | The client that made the request must pass an interactive Challenge. |
32+
| Managed Challenge | Depending on the characteristics of a request, Cloudflare will choose an appropriate type of challenge. |
33+
| Log | Records matching requests in the Cloudflare Logs. |
34+
| Use rule defaults | Uses the default action that is pre-defined for each rule. |
35+
36+
:::note
37+
38+
DDoS attack traffic is automatically excluded from billing systems.
39+
:::
40+
41+
## Time to mitigate
42+
43+
- Immediate mitigation for Advanced TCP and DNS Protection systems.
44+
- Up to three seconds on average for the detection and mitigation of L3/4 DDoS attacks at the edge using the Network-layer DDoS Protection Managed rules.
45+
- Up to 15 seconds on average for the detection and mitigation of HTTP DDoS attacks at the edge using the HTTP DDoS Protection Managed rules.
46+
2147
## Data localization
2248

2349
To learn more about how DDoS protection works with data localization, refer to the Data Localization Suite [product compatibility](/data-localization/compatibility/).

src/content/docs/ddos-protection/managed-rulesets/http/configure-api.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,7 @@ You can create overrides at the zone level and at the account level. Account-lev
3737
Only available to Enterprise customers with the Advanced DDoS Protection subscription, which can create up to 10 rules.
3838
:::
3939

40-
Create multiple rules in the `ddos_l7` phase entry point ruleset to define different overrides for different sets of incoming requests. Set each rule expression according to the traffic whose HTTP DDoS protection you wish to customize.
41-
42-
Rules in the phase entry point ruleset, where you create overrides, are evaluated in order until there is a match for a rule expression and sensitivity level, and Cloudflare will apply the first rule that matches the request. Therefore, the rule order in the entry point ruleset is very important.
40+
<Render file="managed-rulesets/evaluation-behavior" />
4341

4442
## Example API calls
4543

src/content/docs/ddos-protection/managed-rulesets/http/configure-dashboard.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ If you are an Enterprise customer with the Advanced DDoS Protection subscription
2222
If you cannot deploy any additional overrides, consider editing an existing override to adjust rule configuration.
2323
:::
2424

25+
<Render file="managed-rulesets/evaluation-behavior" />
26+
2527
## Create a DDoS override
2628

2729
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and website.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
{}
3+
4+
---
5+
6+
import { Markdown } from "~/components"
7+
8+
Create multiple rules in the `ddos_l7` phase entry point ruleset to define different overrides for different sets of incoming requests. Set each rule expression according to the traffic whose HTTP DDoS protection you wish to customize.
9+
10+
Rules in the phase entry point ruleset, where you create overrides, are evaluated in order until there is a match for a rule expression and sensitivity level, and Cloudflare will apply the first rule that matches the request. Therefore, the rule order in the entry point ruleset is very important.

src/content/partials/ddos-protection/managed-rulesets/sensitivity-level-reference.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,3 +19,7 @@ The available sensitivity levels are:
1919
The default sensitivity level is *High*.
2020

2121
In most cases, when you select the *Essentially Off* sensitivity level the rule will not trigger for any of the selected actions, including *Log*. However, if the attack is extremely large, Cloudflare's protection systems will still trigger the rule's mitigation action to protect Cloudflare's network.
22+
23+
*Essentially Off* means that we have set an exceptionally low sensitivity level so in most cases traffic will not be mitigated for you. However, attack traffic will be mitigated at exceptional levels to ensure the safety and stability of the Cloudflare network.
24+
25+
**Log** means that requests will not be mitigated but only logged and shown on the dashboard. However, attack traffic will be mitigated at exceptional levels to ensure the safety and stability of the Cloudflare network.

0 commit comments

Comments
 (0)