Huge DDoS Attack Launched Against Cloudflare in Late June
The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Cloudflare revealed this week that on June 21 it detected and mitigated a packet-based volumetric DDoS attack that peaked at 754 million packets-per-second. According to researchers, that peak was part of a four-day attack from June 18-21 that saw traffic from more than 316,000 different IP addresses directed at a single Cloudflare address.
In a blog post, Cloudflare researchers reported that the attack used a combination of three TCP attack vectors: SYN floods, ACK floods, and SYN-ACK floods. Over the four-day period, the attack sustained rates exceeding 400-to 600 million packets-per-second for hours at a time, and peaked above 700 million packets-per-second multiple times.
The packet-based attack attempted to overwhelm Cloudflare's routers and data center appliances rather than flood the in-bound data connections. The company says that these huge attacks persist despite a general decrease in the size and duration of DDoS attacks during the last year.
For more, read here.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024