HomeTech NewsHow did Google thwart the biggest cyberattack in history?

How did Google thwart the biggest cyberattack in history?

In June, a Google Cloud Armor customer was targeted in a series of HTTPS DDoS attacks that peaked at 46 million requests per second. This is the largest Tier 7 DDoS ever reported.

Google has observed that the frequency and size of distributed denial of service (DDoS) attacks has increased exponentially in recent years. Today’s internet-facing workloads are at constant risk of attack, with impacts ranging from poor performance and user experience for legitimate users to increased operating and hosting costs and the inability to fully utilize mission-critical workloads.

Image source: Google Cloud (DDoS attack graph peaking at 46 million requests per second.)

On June 1, a Google Cloud Armor customer was targeted in a series of HTTPS DDoS attacks that peaked at 46 million requests per second. This is the largest Tier 7 DDoS ever reported – at least 76% larger than the previously reported record.

To give you an idea of the scale of the attack, this is like getting all the daily requests to Wikipedia (one of the 10 most trafficked websites in the world) in just 10 seconds.

Cloud Armor Adaptive Protection was able to detect and analyze traffic early in the attack lifecycle. Cloud Armor alerted the customer with a recommended protective rule that was deployed before the attack reached its full magnitude. Cloud Armor blocked the attack by ensuring that the customer’s service stays online and continues to serve its end users.

Cyber Attacks come from 32 countries

In addition to the unexpectedly high traffic volume, the attack had other notable features. There were 5,256 source IPs from 132 countries that contributed to the cyber attack. The top 4 countries contributed about 31% of the total attack traffic.

When the attack peaked at 46 million rps (requests per second), Cloud Armor’s proposed rule was in effect to block most of the attack and ensure that targeted applications and services remained available. This enabled the attack to be eliminated immediately.

Source: Unsplash

How was the attack stopped?

The attack was halted above Google’s network, and malicious data requests were blocked upstream from the client’s app. Before the attack began, the client had already configured Adaptive Protection in the corresponding Cloud Armor security policy to learn and create the basic model of normal traffic patterns for their service.

As a result, Adaptive Protection was able to detect the DDoS attack early in the event, analyze its incoming traffic, and generate an alert with a recommended protection rule before all these attacks escalate.

First visual resource: Unsplash

SOURCE google
Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!

12FansLike
15,848FollowersFollow
13FollowersFollow
676SubscribersSubscribe

Related Articles

Future trends and innovations in Healthcare app development

IntroductionList of Future trends and Innovations in Healthcare app development●    Advantages●    DisadvantagesConclusionIntroductionAs technology continues to rapidly evolve, healthcare app development is also experiencing some...

Intel Publishes 12-Qubit Chip new Quantum processor

Intel on the 15th announced the latest quantum processor called "Tunnel Falls", which is a 12-qubit (quantum bit, qubit) silicon chip, which is a...

Apple’s Vision Pro battery appears to be replaceable

Apple unveiled the long-rumored new Vision Pro at last week's WWDC conference. It is not difficult to see from the design of the product...

The world’s first manned “UFO” was tested in Shenzhen

Many companies are currently developing pure electric vertical take-off and landing vehicles, but this Chinese company had a sudden idea to create this "flying...

Explore More Articles

Starfield How to Sell from Ship Inventory main

Starfield: How to Sell from Ship Inventory?

0
There's a bunch of different places you can sell your hard-earned items and gears. The only thing is there's no maps in this game....
Starfield How to use Scanner-min

Starfield: How to use Scanner?

0
Scanner is a tool that you'll be needing a lot of in Starfield. It allows you to see which resources and materials a planet...
Starfield How to upgrade Ship Weapons-min

Starfield: How to upgrade Ship Weapons?

0
Within Starfield you can actually purchase upgrade or fully build your own spaceship via modules. The thing is that, a lot of this isn't...
Proofing Your World 8 Best Strategies for Ultimate Technology Security-min

Proofing Your World: 8 Best Strategies for Ultimate Technology Security

0
Expanding the size of the attack surface inevitably amplifies the risk of cybersecurity breaches. Consequently, reducing the attack surface logically diminishes cybersecurity risk. It...