Cloudflare DDoS Threat Report For 2024 Q1 10
Cloudflare, in a blog post: Key insights from the first quarter of 2024 include:
1. 2024 started with a bang. Cloudflare's defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter -- representing a 50% year-over-year (YoY) increase.
2. DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.
3. DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.
We've just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks -- an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023. Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ. When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ. In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic -- just on the network-layer.
1. 2024 started with a bang. Cloudflare's defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter -- representing a 50% year-over-year (YoY) increase.
2. DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.
3. DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.
We've just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks -- an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023. Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ. When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ. In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic -- just on the network-layer.
Wee Cloudflare (Score:3)
Cloudflare is something you sell to dumb CIO's monthly can pretend they took some initiative.
Cloudflare makes up numbers and installs their bloatware on your servers.
It's basically McAffe anti-virus for your infrastructure. :(
Re: (Score:3)
Dear Douchebag Salesman -
I'm pretty sure Cloudflare can do exactly nothing when an EC2 instance running a database goes down unexpectedly due to presumed hardware issues, so what exactly do you want to discuss besides your own sales commissions?
I think we're still at 99.99989% uptime over the last year, give or take a few minutes, so I don't think my job ("co-founder/cto") is in any danger on this front despite your best efforts to bypass and embarrass me by emailing the client of my company when your watchdog script (or whatever you guys are using) alerted you.
Total sleazebags.
How do I tell cloudflare I'm not an attacker? (Score:1)
"Your browser is out of date!
Update your browser to view this website correctly. More Information.
Ray ID: 875d19feac104dc4
Performance & security by Cloudflare"
Re: How do I tell cloudflare I'm not an attacker? (Score:2)
Time to enable Javascript.
Which is all that Cloudflare seems to be doing. Checking to see that I have Javascript turned on (and ad blockers off) so that their clients can serve me garbage and track my movements.
Javascript has f--- all to do with level 3/4 attacks.
Re: (Score:2)
Re: (Score:2)
also thwarted my browser testing (Score:2)