Google blocks the world’s largest web-based distributed DDoS attack


Google blocked the web’s largest distributed denial-of-service (DDoS) cyberattack against a customer, which peaked at 46 million requests per second (RPS).

This is the largest “Layer 7 DDoS” reported to date – at least 76% higher than the previously reported record, according to the company.

“Giving an idea of ​​the scale of the attack is like receiving all daily queries to Wikipedia (one of the top 10 most visited websites in the world) in just 10 seconds,” said Satya Konduru, technical manager of Google Cloud. in a statement Friday evening.

DDoS cyberattacks are increasing in frequency and size exponentially.

“Our client’s network security team deployed the rule recommended by Google Cloud Armor in their security policy, and they immediately began blocking attack traffic,” said Emil Kiner, senior product manager at Cloud. Armor.

Within two minutes, the attack began to ramp up, going from 100,000 RPS to a peak of 46 million RPS.

Since Cloud Armor was already blocking attack traffic, the target workload continued to function normally.

“Over the next few minutes, the attack began to diminish in size, eventually ending 69 minutes later. Presumably, the striker probably determined he was not having the desired impact while incurring a significant expense to execute the attack,” the company said.

The geographical distribution and the types of insecure services exploited to generate the attack correspond to the Meris family of attacks.

Known for massive attacks that broke DDoS records, the Meris method abuses insecure proxies to hide the true origin of attacks, Google said.

The attack was stopped at the edge of Google’s network, with malicious requests being blocked upstream of the customer’s application.

The size of attacks will continue to grow and tactics will continue to evolve.

To prepare, Google recommended using a defense-in-depth strategy by deploying defenses and controls across multiple layers of your environment and your infrastructure providers’ network “to protect your web applications and services from web-based attacks. targeted”.



(Only the title and image of this report may have been edited by Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear reader,

Business Standard has always endeavored to provide up-to-date information and commentary on developments that matter to you and that have wider political and economic implications for the country and the world. Your constant encouragement and feedback on how to improve our offering has only strengthened our resolve and commitment to these ideals. Even in these challenging times stemming from Covid-19, we remain committed to keeping you informed and updated with credible news, authoritative opinions and incisive commentary on relevant topical issues.
However, we have a request.

As we battle the economic impact of the pandemic, we need your support even more so that we can continue to bring you more great content. Our subscription model has received an encouraging response from many of you who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of bringing you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practice the journalism we are committed to.

Support quality journalism and subscribe to Business Standard.

digital editor


About Author

Comments are closed.