Case Studies

Large-Scale CC Attack Combined with L4 DDoS

Attack Type: Primarily UDP Flood and TCP SYN Flood, aiming to exhaust network bandwidth.

Attack Scale: Total traffic peak reached 122.18 Gbps, with 121.25 Gbps of attack traffic successfully blocked, allowing only 1.28 Gbps of normal traffic through.

Defense Measures:

  • Upon the attack’s onset, the Anycast architecture disperses the attack traffic across global nodes, reducing pressure on any single region.
  • A small amount of HTTP Flood and application-layer CC attacks mimicking normal requests were detected and filtered by the WAF.

Defense Technology Advantages

Globally Distributed Node Network (Anycast Architecture):

Attack traffic is distributed across multiple nodes for cleaning, preventing overload on a single node.

Multi-Layer Cleaning Architecture:

From large-scale L3/L4 traffic cleaning to deep L7 application-layer cleaning, providing comprehensive protection.

Real-Time Traffic Monitoring and Dynamic Adjustment:

Cleaning strategies are updated instantly based on changes in attack patterns.

Minimized Business Impact:

Only normal traffic is allowed through, ensuring that user experience remains unaffected.

Over 1 Tbps L4 DDoS Attack

Attack Type: The attack includes UDP Flood and TCP SYN Flood (upper image), as well as DNS amplification and NTP amplification attacks (lower image).

Attack Scale:

  • The upper image shows a total traffic peak of 1.09 Tbps, marking an extremely large-scale attack. Of this, 1.09 Tbps of attack traffic was successfully blocked, with only 12.14 Gbps of normal traffic passing through.
  • The lower image shows a total traffic peak of 371.42 Gbps, where 369.11 Gbps of attack traffic was successfully blocked, leaving only 3.17 Gbps of normal traffic.

Defense Measures: Using Tengyun Cloud’s traffic characteristic recognition technology, abnormal traffic patterns are precisely identified, enabling further filtering of small particle attack traffic.

Defense Technology Advantages

Efficient Cleaning Capacity:

Each node supports up to 1 Tbps cleaning, capable of handling large-scale attacks.

Multi-Layer Defense Strategy:

Protection across all layers from L3/L4 to L7, offering comprehensive defense.

Intelligent DNS Scheduling:

Ensures that attack traffic is cleaned close to its source, minimizing latency.

Application Layer Cleaning:

A powerful WAF effectively handles HTTP Flood and CC attacks, demonstrating the company’s technical advantages in application layer protection.

Intermittent Large-Scale Traffic and Packet Flood

Attack Type: Periodic peak attacks manifest as intermittent large-scale traffic and packet floods.

Attack Scale:

  • Total traffic peak: 43.86 Gbps
  • Peak packet rate: 5.72 million packets per second (M PPS)
  • Blocked Traffic: 43.83 Gbps and 5.72 M PPS of malicious traffic were successfully intercepted.
  • Normal Business Traffic: 5.02 Gbps and 657.15 K PPS of normal traffic passed through unaffected.

Defense Measures: Malicious traffic and high packet rate attacks were intercepted at the L3/L4 layer, with secondary cleaning identifying and blocking residual traffic.

Defense Technology Advantages

Efficient Cleaning Capability:

In the primary cleaning stage, most attack traffic (43.83 Gbps and 5.72 M PPS) was intercepted.

Multi-Layer Cleaning Architecture:

A complete defense loop is formed through L3/L4 layer high-volume interception and L7 layer deep application protection.

Intelligent Scheduling Technology:

Quick diversion and efficient interception of attack traffic minimize the impact on normal business traffic.

Application Layer Protection:

A powerful WAF provides deep detection and interception capabilities, delivering precise application layer protection.

20 Million Connection Request CC Attack

Attack Scale:

  • Maximum connection peak: Nearly 20 million connection requests
  • Attack Mode: Application-layer CC attack simulating legitimate user connection behavior, aimed at exhausting the server’s application resources and causing service downtime.

Defense Measures:

  • Web Application Firewall (WAF): Detects and intercepts abnormal high-frequency requests, such as a large number of repetitive requests within a short time frame.
  • Deep HTTP Request Behavior Analysis: Filters out malicious connections simulating legitimate user actions.
  • Behavior Analysis & Limitation: Dynamically limits connection count and request frequency from a single source IP, quickly identifying and isolating the attack source.

Defense Technology Advantages

Application Layer Deep Protection:

WAF focuses on defending against L7 layer attacks, effectively handling CC attacks and HTTP Floods, which are complex threats.

Network Feature Analysis:

Real-time monitoring and dynamic adjustment of limitation rules enable quick adaptation to attack patterns.

Multi-Layer Cleaning Collaboration:

Works in coordination with L3/L4 layer primary interception and L7 layer deep cleaning, forming a comprehensive defense system.