HomeTech NewsHow did Google thwart the biggest cyberattack in history?

How did Google thwart the biggest cyberattack in history?

In June, a Google Cloud Armor customer was targeted in a series of HTTPS DDoS attacks that peaked at 46 million requests per second. This is the largest Tier 7 DDoS ever reported.

Google has observed that the frequency and size of distributed denial of service (DDoS) attacks has increased exponentially in recent years. Today’s internet-facing workloads are at constant risk of attack, with impacts ranging from poor performance and user experience for legitimate users to increased operating and hosting costs and the inability to fully utilize mission-critical workloads.

Image source: Google Cloud (DDoS attack graph peaking at 46 million requests per second.)

On June 1, a Google Cloud Armor customer was targeted in a series of HTTPS DDoS attacks that peaked at 46 million requests per second. This is the largest Tier 7 DDoS ever reported – at least 76% larger than the previously reported record.

To give you an idea of the scale of the attack, this is like getting all the daily requests to Wikipedia (one of the 10 most trafficked websites in the world) in just 10 seconds.

Cloud Armor Adaptive Protection was able to detect and analyze traffic early in the attack lifecycle. Cloud Armor alerted the customer with a recommended protective rule that was deployed before the attack reached its full magnitude. Cloud Armor blocked the attack by ensuring that the customer’s service stays online and continues to serve its end users.

Cyber Attacks come from 32 countries

In addition to the unexpectedly high traffic volume, the attack had other notable features. There were 5,256 source IPs from 132 countries that contributed to the cyber attack. The top 4 countries contributed about 31% of the total attack traffic.

When the attack peaked at 46 million rps (requests per second), Cloud Armor’s proposed rule was in effect to block most of the attack and ensure that targeted applications and services remained available. This enabled the attack to be eliminated immediately.

Source: Unsplash

How was the attack stopped?

The attack was halted above Google’s network, and malicious data requests were blocked upstream from the client’s app. Before the attack began, the client had already configured Adaptive Protection in the corresponding Cloud Armor security policy to learn and create the basic model of normal traffic patterns for their service.

As a result, Adaptive Protection was able to detect the DDoS attack early in the event, analyze its incoming traffic, and generate an alert with a recommended protection rule before all these attacks escalate.

First visual resource: Unsplash

SOURCE google
Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!

12FansLike
15,848FollowersFollow
13FollowersFollow
676SubscribersSubscribe

Related Articles

Microsoft rumored to be investing $10 billion in OpenAI

According to comprehensive foreign media reports, Microsoft intends to invest $10 billion in ChatGPT developer OpenAI, which will make OpenAI’s valuation reach $29 billion.The...

New VR Gear “Aroma Shooter” allows you to smell Games and Videos

With the gradual increase of VR reality games, in order to pursue a better sense of presence, Japanese game manufacturer Aromajoin released the Aroma...

iKnife: This smart scalpel detects tumors almost instantly

Facilitating the diagnosis of cancers thanks to an intelligent scalpel, this is the promise of iKnife! This device, developed by Imperial College London, can...

Acer’s new Bike Desk allows exercising while working in office

Do New Year's resolutions balance work performance and personal health? In addition to using time to exercise after get off work, Acer's newly released...

Explore More Articles

Gene customizing and cloning business become more Popular

Gene customizing and cloning business becomes more Popular

0
Replicating beauty pageant camels, replicating equestrian racing horses, replicating high-yielding super cows... With the gradual popularization of animal replication technology, people can use technology...

Sons of the Forest: How to Get the Zipline Rope Gun?

0
The Sons of the Forest zipline Rope Gun, otherwise known as the rope gun, is an important key item that is easy to miss....
The night sky is full of black holes instead of stars

The night sky is full of black holes instead of stars

0
This is a seemingly ordinary starry sky photo (see the first picture), but it is a more special celestial body than luminous stars, that...
What are the Differences between quail eggs and chicken eggs

What are the Differences between quail eggs and chicken eggs?

0
Quail eggs and chicken eggs have several differences in terms of size, nutritional content, taste, and culinary uses. Here are some of the key...