What is DDoS Attack ? & How Google Stopped the Largest -ever DDoS Attack ?

What is DDoS ? Read more How to secure from DDoS Attack

DDoS stands for Distributed -Denial of -service. It is a malicious user trying to make a machine or network resources unavailable to use. In which multiple compromised computer systems attack a target, such as a server, website, or another network resource, and cause a denial of service for users of the targeted resource. service may include email, online accounts (e.g.., banking), or other services.

what is Google cloud Armor :

Google Cloud Armor ,it help protect your applications and websites against denial of service and web attacks. Google Cloud Armor helps you protect your Google Cloud deployments from multiple types of threats, and application attacks like cross-site scripting (XSS) and SQL injection (SQLi).

Distributed Denial of Service attacks(DDoS) are a common concern for today’s companies moving to the cloud. Cloud Armor is Google’s solution to solving the consistent threat of DDoS attacks, through high-level protection against application and infrastructure focused DDoS threats. It features some automatic protections and some that you need to configure manually. This document provides a high-level overview of these features, several of which are only available for global external (HTTP(S)) load balancer (classics).

How Google stooped the DDoS Attacks ?

The attack was stopped at the edge of Google’s network, as Google Cloud Armor blocked the malicious requests from the customer’s application. Google Cloud Armor is a tool that enables users to safeguard their Cloud environment from DDoS attacks.

Before the attack started, Google notes that the customer has configured Adaptive Protection in their relevant Cloud Armor security policy. With that, the Cloud Armor Adaptive Protection was able to detect and analyses the traffic early in the attack. The service alerted the customer with a suggest protective rule which was deployed before the attack reached its full magnitude. The Cloud Armor then blocked the cyber attack ensuring the customer’s service stayed online.

customers are acting choicely by deploying suggest rules to take advantage of Cloud Armor’s newly launched rate-limiting capabilities to reduce attack traffic.

Leave a Reply